北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2020, Vol. 43 ›› Issue (1): 135-142.doi: 10.13190/j.jbupt.2019-031

• 研究报告 • 上一篇    

基于相似轨迹替代查询的位置隐私保护方案研究

宋成, 张亚东, 彭维平, 王磊, 刘志中   

  1. 河南理工大学 计算机科学与技术学院, 焦作 454003
  • 收稿日期:2019-02-28 出版日期:2020-02-28 发布日期:2020-03-27
  • 通讯作者: 张亚东(1993-),男,硕士生,E-mail:18339161026@163.com. E-mail:18339161026@163.com
  • 作者简介:宋成(1980-),男,副教授.
  • 基金资助:
    国家自然科学基金面上项目(61872126,61772159);国家自然科学基金青年基金项目(61300124,61300216);河南省科技攻关计划项目(182102110333,172102310677)

Research on Location Privacy Protection Scheme Based on Similar Trajectory Replacement

SONG Cheng, ZHANG Ya-dong, PENG Wei-ping, WANG Lei, LIU Zhi-zhong   

  1. School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China
  • Received:2019-02-28 Online:2020-02-28 Published:2020-03-27
  • Supported by:
     

摘要: 针对基于位置服务中移动终端用户位置隐私泄露问题,提出了一个基于相似轨迹替代查询的位置隐私保护方案.该方案在基于位置服务请求的用户及候选者身份匿名化的基础上,采用相似轨迹函数挑选出一定时间间隔内和用户轨迹相似度最高的候选者;然后由该时刻所挑选出的候选者替代用户发起位置服务请求,从而实现用户身份、查询和轨迹的隐私性保护.通过安全性分析,该方案满足匿名性、不可伪造性、以及抵抗连续查询服务追踪攻击等安全特性.仿真实验结果表明,本方案有效提高了最优候选者轨迹相似度以及最优候选者挑选效率.

关键词: 基于位置的服务, 相似轨迹, 隐私保护, 替代查询

Abstract: Aiming at the problem of privacy leakage of mobile terminal users in location based service, a location privacy protection scheme is proposed based on similar trajectory replacement query. In this scheme, identities of the requesting user and all the candidates are annonymized. By adopting the similar trajectory function to calculate the trajectory similarities between all the candidates and the requesting user at certain time intervals, the optimal candidate with highest similarity is selected to represent requesting user in requesting LBS. So the identities of the requesting user. The privacy of queries and the trajectories is protected. Security analyses prove that the scheme satisfies such security features as anonymity, unforgeability, and resisting continuous query service tracking attack. Simulation shows that the proposed scheme effectively improves the trajectory similarity of the optimal candidate and the efficiency of the best candidate selection.

Key words: location based services, similar trajectory, privacy protection, query-replace

中图分类号: