全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

一种基于类四叉树的位置K-匿名算法

Keywords: 类四叉树,位置K-匿名,Casper优化,自底向上

Full-Text   Cite this paper   Add to My Lib

Abstract:

通过对Casper模型在匿名度和位置服务精准度方面优化,提出了一种基于类四叉树的位置K-匿名算法.该算法采用自底向上的机制,在扩大扫描区域时,对请求用户所在网格的周边网格进行优先扫描,然后再进行层级和空间分辨率上的提高.实验结果表明,该算法能够更好地提高位置服务的质量和匿名区域的准确度.

References

[1]  Mokbel M F. Privacy in location-based services: state-of-the-art and research directions[C]//Proceedings of 2007 International Conference on Mobile Data Management. [S.l.]: IEEE, 2007:228-228.
[2]  Krumm J. A survey of computational location privacy[J]. Personal and Ubiquitous Computing, 2009,13(6):391-399.
[3]  潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281.Pan Xiao,Xiao Zhen,Meng Xiaofeng. Survey of location privacy[J]. Computer Science and Exploration,2007,1(3):268-281.(in Chinese)
[4]  Liu L. From data privacy to location privacy: models and algorithms[C]//Proceedings of the 33rd International Conference on Very large Data Bases. [S.l.]:VLDB Endowment, 2007:1429-1430.
[5]  Chow C Y, Mokbel M F, He T. A privacy-preserving location monitoring system for wireless sensor networks[J]. IEEE Transactions on, Mobile Computing, 2011,10(1):94-107.
[6]  Wang T, Liu L. Privacy-aware mobile services over road networks[J]. Proceedings of the VLDB Endowment, 2009,2(1):1042-1053.
[7]  Bamba B, Liu L, Pesti P, et al. Supporting anonymous location queries in mobile environments with privacygrid[C]//Proceedings of the 17th International Conference on World Wide Web. [S.l.]:ACM, 2008:237-246.
[8]  Chow C Y, Mokbel M F, Aref W G. Casper: query processing for location services without compromising privacy[J]. ACM Transactions on Database Systems (TODS), 2009,34(4):24.
[9]  Chow C Y, Mokbel M F. Enabling private continuous queries for revealed user locations[M]. Berlin, Heidelberg: Springer, 2007:258-275.
[10]  Gkoulalas-Divanis A, Verykios V S. A free terrain model for trajectory K-anonymity[C]//Proceedings of Database and Expert Systems Applications. Berlin, Heidelberg: Springer, 2008:49-56.
[11]  Gkoulalas-Divanis A, Verykios V S, Mokbel M F. Identifying unsafe routes for network-based trajectory privacy[C]//Proceedings of SDM. Sparks, Nevada, USA: SIAM, 2009:942-953.
[12]  Gedik B, Liu L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1):1-18.
[13]  Mokbel M F, Chow C Y, Aref W G. The new Casper: query processing for location services without compromising privacy[C]//Proceedings of the 32nd International Conference on Very Large Data Bases. Seoul, Korea: ACM, 2006:763-774.
[14]  Brinkhoff T. Generating traffic data[J]. IEEE Data Eng Bull, 2003,26(2):19-25.
[15]  Brinkhoff T. A framework for generating network-based moving objects[J]. GeoInformatica, 2002,6(2):153-180.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133