|
- 2017
一种基于隐私偏好的二次匿名位置隐私保护方法
|
Abstract:
摘要: 针对基于位置的服务带来的用户位置隐私暴露问题,提出了一种基于隐私偏好的二次匿名位置隐私保护方法,融合k-匿名技术和差分隐私技术确保用户位置隐私,设计隐私等级划分策略,支持用户个性化设置隐私保护级别。根据隐私级别确定k匿名集大小,通过基于位置熵的k匿名算法求解k-1个匿名点,使k匿名集的点具有最大概率相似性;在此基础上进一步求解获取位置服务的匿名位置,提出了基于差分隐私的匿名位置生成算法,在保护用户位置隐私的同时确保获取精确的位置服务。实验结果表明在用户隐私等级设置范围内,所提方法能有效兼顾位置隐私保护和LBS服务质量。
Abstract: Location based service brings the challenging problem of privacy leakage. The method proposes a parameterized location privacy protection method based on two-level anonymity for the problem. The system applies the k-anonymity and differential privacy methods with customized protection level for different users. This method selects the k-1 anonymous coordinates from the set, which achieves the best probability likelihood of the request, using location entropy based k-anonymity algorithm according to users’ protection level. Moreover, the system propose a differential privacy based method to generate a dummy position which is indistinguishable and in proper distance with the real position. The experiment results show that our method can protect users’ privacy as well as preserving the accuracy of location based service
[1] | 张学军, 桂小林, 伍忠东. 位置服务隐私保护研究综述[J]. 软件学报, 2015(9):2373-2395. ZHANG Xuejun, GUI Xiaolin, WU Zhongdong. Privacy preservation for location—based services: a survey[J]. Journal of Software, 2015, 26(9):2373-2395. |
[2] | 倪巍伟,陈萧. 保护位置隐私近邻查询中隐私偏好问题研究[J].软件学报,2016. NI Weiwei, CHEN Xiao. User privacy preference support in location privacy-preserving nearest neighbor query. Ruan[J]. Journal of Software, 2016, 27(7):1805-1821. |
[3] | DWORK C, MCSHERRY F, NISSIM K, et al. Calibrating noise to sensitivity in private data analysis[M] // Theory of cryptography. Berlin: Springer, 2006: 265-284. |
[4] | DEWRI R. Local differential perturbations: location privacy under approximate knowledge attackers[J]. Mobile Computing, IEEE Transactions on, 2013, 12(12):2360-2372. |
[5] | 康海燕, 杨孔雨, 陈建明. 基于<i>K</i>-匿名的个性化隐私保护方法研究[J]. 山东大学学报(理学版), 2014, 49(9):142-149. KANG Haiyan, YANG Kongyu, CHEN Jianming. A method of personalized privacy preservation based on <i>K</i>-anonymization[J]. Journal of Shandong University(Natural Science), 2014, 49(9):142-149. |
[6] | GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[C] // Proceedings of the 1st international conference on Mobile systems, applications and services. New York: ACM, 2003: 31-42. |
[7] | GEDIK B, LIU L. Protecting location privacy with personalized <i>k</i>-anonymity: Architecture and algorithms[J]. Mobile Computing, IEEE Transactions on, 2008, 7(1):1-18. |
[8] | 朱麟, 黄胜波. 不确定环境下轨迹<i>k</i>-匿名隐私保护[J]. 计算机应用, 2015, 35(12):3437-3441. ZHU Lin, HUANG Shengbo. <i>k-</i>anonymity privacy—preserving for trajectory in uncertain environment[J]. Journal of Computer Applications, 2015, 35(12):3437-3441. |
[9] | DWORK C. Differential privacy[M] // Automata, languages and programming. Berlin: Springer, 2006: 1-12. |
[10] | ZHENG Y, LI Q, CHEN Y, et al. Understanding mobility based on GPS data[C] // Proceedings of the 10th international conference on Ubiquitous computing. New York: ACM, 2008: 312-321. |
[11] | ZHENG Y, ZHANG L, XIE X, et al. Mining interesting locations and travel sequences from GPS trajectories[C] // Proceedings of the 18th international conference on World wide web. New York: ACM, 2009: 791-800. |
[12] | GAMBS S, KILLIJIAN M, NU?EZ D. Show me how you move and I will tell you who you are[J]. Transactions on Data Privacy, 2010, 4(2):34-41. |
[13] | ANDRéS M, BORDENABEN, CHATZIKOKOLAKIS K, et al. Geo-indistinguishability: Differential privacy for location-based systems[C] // Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York: ACM, 2013: 901-914. |
[14] | 王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014, 25(4):693-712. WANG Lu, MENG Xiaofeng. Location privacy preservation in big data era: a survey[J]. Journal of Software, 2014, 25(4):693-712. |
[15] | 潘晓, 肖珍, 孟小峰. 位置隐私研究综述[J]. 计算机科学与探索, 2007, 1(3):268-281. PAN Xiao, XIAO Zhen, MENG Xiaofeng. Survey of location privacy-preserving[J]. Journal of Computer Science and Frontiers, 2007, 1(3):268-281. |
[16] | FAWAZ K, SHIN K. Location privacy protection for smartphone users[C] // Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014: 239-250. |
[17] | MCSHERRY F, TALWAR K. Mechanism design via differential privacy[C] // Foundations of Computer Science, 2007. FOCS'07. 54th Annual IEEE Symposium on. 2007: 94-103. DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/FOCS.2007.66 |
[18] | SHOKRI R, TRONCOSO C, DIAZ C, et al. Unraveling an old cloak: <i>k</i>-anonymity for location privacy[C] // Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. New York: ACM, 2010: 115-118. |
[19] | KOSTAS Chatzikokolakis. Location-guard[EB/OL].[2016-07-01.] https://github.com/chatziko/location-guard. |
[20] | SWEENEY L. <i>k</i>-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(05):557-570. |