基于位置服务的轨迹隐私保护技术研究
发布时间:2018-05-18 13:20
本文选题:位置服务 + LBS ; 参考:《杭州电子科技大学》2014年硕士论文
【摘要】:随着无线传感网络技术和移动无线全球定位技术的迅速发展,基于位置的移动应用服务(Location-Based Service,LBS)越来越被广泛的应用于生活的方方面面,在使用位置服务的时候,用户需要将自己的位置信息和查询消息一起发送给位置服务提供商,这就有很大可能导致用户的位置隐私和查询隐私的泄漏。因此,针对位置隐私保护技术的研究得到了广泛的关注,并且提出了众多的方法来保护用户的位置隐私。但是,现有的方法很多都是针对用户单个位置的隐私保护,而现实情况是,用户始终处在一个连续运动的状态下,在每一个地点都有可能发出位置查询服务,由此可以产生一个用户运动的轨迹。因此如何保证这条轨迹不被攻击者识别出来就是连续查询条件下要解决的问题。本文根据隐私保护的系统结构,针对轨迹隐私保护的问题,,作了如下几个方面的研究和探讨: (1)深入介绍了基于位置的服务及位置服务中的隐私保护问题。 (2)针对轨迹中用户的敏感位置,提出了一种基于抑制法的轨迹隐私保护模型,通过抑制用户轨迹中敏感位置的发布,再从概率统计出发,选择用户到达概率最大的非敏感位置代替敏感位置发布。从而保护了用户轨迹上敏感位置的泄露,进而使得用户轨迹得到保护。此方法可有效阻止攻击者实施基于敏感位置的攻击。并给出了基于抑制法的轨迹隐私保护度的计算方法。 (3)提出了一种基于假轨迹的轨迹隐私保护方法,通过生成与真实轨迹相似的假轨迹来降低攻击者识别真实轨迹的概率,从而提高轨迹隐私保护度。最后,通过仿真实验与随机生成假轨迹方法相对比,验证了假轨迹方法的有效性。
[Abstract]:With the rapid development of wireless sensor network technology and mobile wireless global positioning technology, Location-Based Service LBSs (LBSs), a location-based mobile application service, are more and more widely used in all aspects of life. Users need to send their location information and query message to the location service provider together, which may lead to the leak of location privacy and query privacy. Therefore, the research of location privacy protection technology has been widely concerned, and many methods are proposed to protect the location privacy of users. However, many of the existing methods are aimed at the privacy protection of the user's individual location, and the reality is that the user is always in a state of continuous motion, and it is possible to issue a location query service at each location. Thus, a trajectory of user motion can be generated. Therefore, how to ensure that the trajectory is not recognized by the attacker is a problem to be solved under the condition of continuous query. According to the system structure of privacy protection and the problem of trajectory privacy protection, this paper studies and discusses the following aspects: This paper introduces the privacy protection of location-based services and location services. (2) aiming at the sensitive position of the user in the trajectory, a trajectory privacy protection model based on the suppression method is proposed. By suppressing the release of the sensitive position in the user's trajectory, and then starting from the probability statistics, Select the non-sensitive location where the user has the highest probability of arrival instead of the sensitive location. Thus, the leakage of sensitive position on the user's trajectory is protected, and then the user's trajectory is protected. This method can effectively prevent an attacker from carrying out an attack based on sensitive location. The calculation method of trajectory privacy protection based on suppression method is also presented. (3) A new path privacy protection method based on false trajectory is proposed. By generating false trajectory similar to real trajectory, the probability of identifying real trajectory is reduced, and the degree of privacy protection of trajectory is improved. Finally, the validity of the false trajectory method is verified by comparing the simulation experiment with the random generated false trajectory method.
【学位授予单位】:杭州电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN929.5
【参考文献】
相关期刊论文 前4条
1 陈洌;冯云霞;戴国骏;;LBS中基于移动终端的连续查询用户轨迹隐匿方法[J];计算机应用研究;2011年12期
2 潘晓;肖珍;孟小峰;;位置隐私研究综述[J];计算机科学与探索;2007年03期
3 林欣;李善平;杨朝晖;;LBS中连续查询攻击算法及匿名性度量[J];软件学报;2009年04期
4 陆锋;郑年波;段滢滢;张健钦;;出行信息服务关键技术研究进展与问题探讨[J];中国图象图形学报;2009年07期
本文编号:1905982
本文链接:https://www.wllwen.com/kejilunwen/wltx/1905982.html