CN113297597B - Social networking communication group establishing method based on position privacy protection - Google Patents
Social networking communication group establishing method based on position privacy protection Download PDFInfo
- Publication number
- CN113297597B CN113297597B CN202110643057.3A CN202110643057A CN113297597B CN 113297597 B CN113297597 B CN 113297597B CN 202110643057 A CN202110643057 A CN 202110643057A CN 113297597 B CN113297597 B CN 113297597B
- Authority
- CN
- China
- Prior art keywords
- user
- vehicle
- management center
- communication group
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000006854 communication Effects 0.000 title claims abstract description 85
- 238000004891 communication Methods 0.000 title claims abstract description 84
- 230000006855 networking Effects 0.000 title claims abstract description 24
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000005540 biological transmission Effects 0.000 claims description 36
- 238000004364 calculation method Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 4
- 230000006399 behavior Effects 0.000 description 12
- 230000008569 process Effects 0.000 description 9
- 230000003993 interaction Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/23—Clustering techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Evolutionary Computation (AREA)
- Business, Economics & Management (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Computational Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Evolutionary Biology (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a social networking service communication group establishment method based on position privacy protection, which is characterized in that a plurality of management centers are arranged in a social networking service, when a vehicle user enters the administration range of the management center, registering and sending user information to the management center, summarizing the users sending the request for establishing the communication group by the management center to obtain a vehicle user set, inquiring by the management center from a user information database to obtain user attribute information of each vehicle user in the vehicle user set, calculating the user attribute similarity between every two vehicle users, inquiring to obtain user behavior information to calculate the communication intensity and the data type similarity between the users, and then calculating to obtain user similarity, clustering the vehicle users by the management center according to the user similarity to obtain communication group division, and setting a key for social communication in each communication group. The method and the system can effectively reduce the risk of the position privacy information leakage of the vehicle user when the communication group socializes.
Description
Technical Field
The invention belongs to the technical field of social car networking, and particularly relates to a social car networking communication group establishing method based on location privacy protection.
Background
With the continuous development of information, people tend to be more intelligent in life, and therefore intelligent automobiles are produced. The user can give up the social function of the mobile phone in the driving process and use the intelligent automobile to perform social contact with other surrounding users. The functions of inquiring about the interest points, asking about people around, making calls, sharing information and the like are all carried out through the intelligent vehicle. When the user needs to communicate with other users, the communication equipment in the vehicle can be directly used for communication, the inconvenience of using a mobile phone is eliminated, and the probability of safety accidents caused by using the mobile phone can be reduced. But the user may communicate with any user in the social process, and the social friends may directly or indirectly reveal the privacy information of the user. Because the user can not directly distinguish the credibility of other users, the user can not directly select reliable users to perform social contact, and the privacy of the user is revealed in the social contact process. In order to ensure the security of the location privacy information of the user, the social network of the user needs to be protected to help the user to find a reliable user for social contact.
In the social process, a user needs to send and receive information, and the information may include data such as own ID, location, interests and the like. The users can directly socialize with friends of the users through vehicles, and can socialize with other strange users driving on the road, but all social users cannot be guaranteed to be credible, or other social users of the social users cannot be guaranteed to be credible, when the users are possibly malicious attackers, or the information of the users is sold for the benefit. When enough information of the user is crawled, the information can be screened, classified and sorted, and then other personal information of the user is analyzed, so that the privacy information of the user is leaked, and great inconvenience or danger is brought to the user. Therefore, in order to reduce the probability of privacy disclosure of the user location, the user needs to select a trusted user for social contact.
The location privacy protection based on the user relationship network is used for protecting the location privacy of the social relationship of the user, and the location information of the user is protected while the social quality of the user is not influenced. The intelligent networked automobile has high-speed mobility, connection and disconnection between users are very rapid, the users need to continuously perform information interaction with other nodes in the driving process, each node on the road cannot be guaranteed to be reliable, and even if the nodes are credible, an attacker can possibly conjecture the privacy of the users through a real-time interaction relation and node behaviors. The user relationship network structure in the social networking services comprises direct or indirect connection relationships between users. The evolution law of the relationship strength of the users is researched, the potential relationship existing among the multi-hop users is discussed by analyzing the behavior pattern and the content association degree of the users, and the guess of the position privacy of the users by an attacker can be indirectly avoided. The user's social network may reveal the user's location privacy information, but may also prevent an attacker from guessing the user's true social processes by protecting the user's social objects and social processes.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a social networking communication group establishing method based on position privacy protection, and a position privacy protection strategy is set according to the relevant condition established by the social networking communication group, so that a user is helped to find other credible users for social contact, and the risk of position privacy information leakage of the vehicle user during social contact of the communication group is effectively reduced.
In order to achieve the purpose, the social networking service communication group establishing method based on location privacy protection comprises the following steps:
s1: arranging a plurality of management centers in the social car networking system, wherein the administration range of each management center is a circular area taking the position coordinate of the management center as the circle center and the preset communication distance R as the radius;
s2: when a vehicle user enters the administration range of the management center, a registration request is sent to the management center, the management center carries out identity verification on the vehicle user after receiving the registration request of the vehicle user, and a pseudonym is generated for the vehicle user after the identity verification is passed and is sent to the vehicle user;
s3: after the vehicle user finishes the registration, sending user information to a management center for registration, wherein the user information comprises user attribute information and user behavior information, and the management center stores the received user information into a user information database;
s4: when a vehicle user needs to socialize, a request for establishing a communication group is sent to a management center, and the management center puts the vehicle user into a vehicle user set phi after passing the request;
s5: the management center inquires user attribute information of each vehicle user in the vehicle user set phi from the user information database, and calculates the user attribute similarity between the vehicle users pairwise, wherein the specific calculation method comprises the following steps:
recording any two users in a vehicle user set phi as u i 、u j Remember user u i The user attribute information of (1) contains M user attribute characteristics, and records user u i Is A im M1, 2, …, M, user u i Is denoted as Att i ={A i1 ,A i2 ,…,A iM }; remember user u j The user attribute information of (1) contains N user attribute characteristics, and records user u j Is A jn N is 1,2, …, N, then user u j Attribute information set denoted Att j ={A j1 ,A j2 ,…,A jN }; obtaining user u i And user u j The number of user attribute features with the same value, denoted as Q, is used to calculate user u using the following formula i And user u j User attribute information similarity D ij :
Wherein, | | represents the number of user attribute features in the set;
s6: the management center inquires the user behavior information of each vehicle user in the vehicle user set phi from the user information database, and calculates the preset time period t by adopting the following formula 1 ,t 2 ]User u in inner vehicle user set phi i And user u j Strength of communication between St ij :
Wherein N is i 、N j Respectively indicated at time periods t 1 ,t 2 ]Inner user u i And u j Respective number of data transmissions, beta ij The calculation formula of the data transmission time parameter is as follows:
wherein, T ij Is shown during a time period t 1 ,t 2 ]Inner user u i And user u j Duration of data transmission between, T i 、T j Respectively expressed in the time period t 1 ,t 2 ]Inner user u i And user u j Respective data transmission durations;
Sp ij is shown over a time period t 1 ,t 2 ]Inner user u i And user u j The calculation formula of the parameter of the data transmission times is as follows:
wherein e represents a natural constant, N ij Is indicated over a time period t 1 ,t 2 ]Inner user u i And user u j The number of data transmissions therebetween;
s7: recording the number of types of data transmitted among users in the social networking service as K, and inquiring the user u from the user information database by the management center i In a predetermined time period t 1 ,t 2 ]Within each type of data transmission duration T i k K is 1,2, …, K, and a data transmission duration vector L is constructed i =(T i 1 ,T i 2 ,…,T i K ) While querying to obtain user u j At a preset time period [ t ] 1 ,t 2 ]Duration of each type of data transmissionConstructing and obtaining a data transmission duration vectorThen calculating a data transmission time length vector L i =(T i 1 ,T i 2 ,…,T i K ) And data transmission time long vectorCosine similarity of as user u i And user u j Data type similarity Ld between them ij ;
S8: the user u is calculated by the following formula i And user u j User similarity S between ij :
S9: the management center clusters the vehicle users in the vehicle user set phi according to the user similarity, and each category is used as a communication group;
s10: the management center respectively generates a secret key for each communication group and distributes the secret key to all vehicle users in the corresponding communication group; when each vehicle user in the communication group performs intra-group social communication, the pseudonym assigned by the management center in step S2 is used as the social account name, and the received secret key is used to encrypt and decrypt the communication data;
s11: when a certain vehicle user in the communication group quits, the management center generates a secret key for the communication group again; when a new vehicle user sends a request for establishing a communication group to the management center, the management center puts the vehicle user into the vehicle user set phi after passing the request, the step S5 is returned to recalculate the user similarity, and the communication group division is performed again.
The invention relates to a social networking service communication group establishing method based on position privacy protection, wherein a plurality of management centers are arranged in a social networking service, when vehicle users enter the jurisdiction range of the management centers, user information is registered and sent to the management centers, the management centers collect the users sending requests for establishing communication groups to obtain a vehicle user set, the management centers inquire user attribute information of all the vehicle users in the vehicle user set from a user information database, the user attribute similarity between every two vehicle users is calculated, the communication strength and the data type similarity between the users are calculated by inquiring the user behavior information, the user similarity is further calculated, the management centers cluster the vehicle users according to the user similarity to obtain communication group division, and a secret key is arranged for each communication group for social communication in the group.
The invention has the following beneficial effects:
1) according to the method, the similarity between the vehicle users is determined from two dimensions of the user attribute information and the user behavior information, and the vehicle users with high similarity are similar in attribute and behavior habit, so that the vehicle users can be regarded as the same credibility as the target users, the probability of leaking the information of the target users is low, and the risk of leaking the privacy of the user positions is reduced;
2) when the vehicle user performs the group communication, the pseudonym and the group key are used for performing encryption communication, so that the safety can be further improved.
Drawings
FIG. 1 is a flow diagram of an embodiment of a social networking communication group establishment method based on location privacy protection;
FIG. 2 is a schematic diagram of a social networking service in accordance with the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided in order to better understand the present invention for those skilled in the art with reference to the accompanying drawings. It is to be expressly noted that in the following description, a detailed description of known functions and designs will be omitted when it may obscure the subject matter of the present invention.
Examples
FIG. 1 is a flow chart of an embodiment of the social networking communication group establishment method based on location privacy protection. As shown in FIG. 1, the social networking service communication group establishing method based on location privacy protection of the present invention specifically comprises the following steps:
s101: setting a management center:
FIG. 2 is a schematic diagram of a social networking service in accordance with the present invention. As shown in FIG. 2, a plurality of management centers are arranged in the social networking services, and the jurisdiction range of each management center is a circular area with the position coordinate of the management center as the center of a circle and the preset communication distance R as the radius. Typically, the management center is a micro-cellular network device, such as a base station.
S102: vehicle user registration to the management center:
when a vehicle user enters the administration range of the management center, a registration request is sent to the management center, the management center carries out identity authentication on the vehicle user after receiving the registration request of the vehicle user, and a pseudonym is generated for the vehicle user and sent to the vehicle user after the identity authentication is passed. The pseudonym is a false identity of the vehicle user in the communication group, the vehicle user can use the false identity to perform social contact, the same effect as the real identity of the user is achieved, and the identity privacy of the user can be protected.
S103: and (3) registering user information:
in order to establish a communication group, a vehicle user needs to be managed by a management center and upload related information. After the vehicle user finishes registration, sending user information to a management center for registration, wherein the user information comprises user attribute information and user behavior information, the user attribute information refers to static information of the user and comprises values of preset user attribute features, generally speaking, the user attribute features can comprise inherent attributes of vehicles such as registration addresses and vehicle models, and the user behavior information reflects communication activities of the user and comprises communication time length, communication times and communication data types between the user and other users. The management center stores the received user information into a user information database.
S104: sending a request for establishing a communication group:
when the vehicle user needs to socialize, a request for establishing a communication group is sent to the management center, and the management center puts the vehicle user into the vehicle user set phi after passing the request.
S105: calculating the similarity of the user attributes:
the management center inquires user attribute information of each vehicle user in the vehicle user set phi from the user information database, and calculates the user attribute similarity between the vehicle users pairwise, wherein the specific calculation method comprises the following steps:
recording any two users in a vehicle user set phi as u respectively i 、u j Remember user u i The user attribute information of (1) contains M user attribute characteristics, and records user u i Is A im M1, 2, …, M, user u i Is denoted as Att i ={A i1 ,A i2 ,…,A iM }. Remember user u j The user attribute information of (1) contains N user attribute characteristics, and records user u j Is A jn N is 1,2, …, N, then user u j Attribute information set denoted Att j ={A j1 ,A j2 ,…,A jN }. Obtaining user u i And user u j The number of user attribute features with the same value, denoted as Q, is used to calculate user u using the following formula i And user u j User attribute information similarity D ij :
Wherein, | | represents the number of user attribute features in the set.
S106: calculating the communication intensity:
the management center inquires the user behavior information of each vehicle user in the vehicle user set phi from the user information database, and the communication strength between the vehicle users is calculated pairwise. The value of the intensity of the communication is related to the frequency of the communication between the users and also to each communicationThe duration is related to the social willingness among the users. The preset time period [ t ] is calculated by the following formula 1 ,t 2 ]User u in inner vehicle user set phi i And user u j Strength of communication between St ij :
Wherein N is i 、N j Respectively indicated at time periods t 1 ,t 2 ]Inner user u i And u j Respective number of data transmissions, t 1 、t 2 Respectively representing the start and stop times, beta, of a predetermined time period ij The calculation formula of the data transmission time parameter is as follows:
wherein, T ij Is shown during a time period t 1 ,t 2 ]Inner user u i And user u j Duration of data transmission between, T i 、T j Respectively expressed in the time period t 1 ,t 2 ]Inner user u i And user u j The respective data transmission duration.
Sp ij Is shown over a time period t 1 ,t 2 ]Inner user u i And user u j The calculation formula of the parameter of the data transmission times is as follows:
wherein e represents a natural constant, N ij Is indicated over a time period t 1 ,t 2 ]Inner user u i And user u j The number of data transmissions therebetween.
Sp ij For reflecting whether data is continuously transmitted between users. If data is frequently transmitted between two users, two users are indicatedHave a stable relationship between them, and have a value ofIf there is no stable interaction relationship between the two, the value is 1. It is clear that longer transmission durations and shorter transmission time intervals can more efficiently support high burst, large volumes of data.
S107: calculating the similarity of the data types:
note that the number of data types transmitted between users in the social car networking is K, for example, in this embodiment, there are 3 data types, which are Text (Text), Audio (Audio), and Video (Video), respectively. The management center obtains the user u by inquiring from the user information database i At a preset time period [ t ] 1 ,t 2 ]Within each type of data transmission duration T i k K is 1,2, …, K, and a data transmission duration vector L is constructed i =(T i 1 ,T i 2 ,…,T i K ) While querying to obtain user u j In a predetermined time period t 1 ,t 2 ]Within each type of data transmission durationConstructing and obtaining a data transmission time length vectorThen calculating a data transmission time length vector L i =(T i 1 ,T i 2 ,…,T i K ) And data transmission time long vectorCosine similarity of as user u i And user u j Data type similarity Ld between ij 。
S108: calculating the similarity of the users:
according to the similarity of the user attributes, the communication intensity and the data type similarity, the following formula is adopted to calculate the user u i And user u j User similarity betweenDegree S ij :
Therefore, the similarity of the two dimensions of the user attribute information and the user behavior information is comprehensively considered when the user similarity is calculated, vehicle users with high similarity are similar in attribute and behavior habits, the vehicle users with high similarity are more likely to be reliable users for a certain vehicle user, and the possibility of data leakage in the information interaction process is lower.
S109: communication group division:
and the management center clusters the vehicle users in the vehicle user set phi according to the user similarity, and each category is used as a communication group. The specific parameters of the clustering can be set according to actual needs.
S110: encryption communication:
the management center generates a secret key for each communication group respectively and distributes the secret key to all vehicle users in the corresponding communication group. When each vehicle user in the communication group performs intra-group social communication, the pseudonym assigned by the management center in step S102 is used as the social account name, and the received secret key is used to encrypt and decrypt communication data.
In order to further improve the safety of communication data, all data in the social communication process of all vehicle users in the communication group are stored in the block chain, so that the transparency and traceability of the social process are ensured.
S111: communication group member changes:
when a certain vehicle user in the communication group quits, the management center generates the key for the communication group again. When a new vehicle user sends a request for establishing a communication group to the management center, the management center puts the vehicle user into the vehicle user set phi after passing the request, returns to the step S105 to recalculate the user similarity, and performs communication group division again.
Although the illustrative embodiments of the present invention have been described in order to facilitate those skilled in the art to understand the present invention, it is to be understood that the present invention is not limited to the scope of the embodiments, and that various changes may be made apparent to those skilled in the art as long as they are within the spirit and scope of the present invention as defined and defined in the appended claims, and all matters of the invention using the inventive concepts are protected.
Claims (1)
1. A social networking communication group establishment method based on location privacy protection is characterized by comprising the following steps:
s1: arranging a plurality of management centers in the social car networking system, wherein the administration range of each management center is a circular area taking the position coordinate of the management center as the circle center and the preset communication distance R as the radius;
s2: when a vehicle user enters the administration range of the management center, a registration request is sent to the management center, the management center carries out identity verification on the vehicle user after receiving the registration request of the vehicle user, and a pseudonym is generated for the vehicle user after the identity verification is passed and is sent to the vehicle user;
s3: after the vehicle user finishes registering, sending user information to a management center for registering, wherein the user information comprises user attribute information and user behavior information, and the management center stores the received user information into a user information database;
s4: when a vehicle user needs to socialize, a request for establishing a communication group is sent to a management center, and the management center puts the vehicle user into a vehicle user set phi after passing the request;
s5: the management center inquires user attribute information of each vehicle user in the vehicle user set phi from the user information database, and calculates the user attribute similarity between the vehicle users pairwise, wherein the specific calculation method comprises the following steps:
recording any two users in a vehicle user set phi as u respectively i 、u j Remember user u i The user attribute information of (1) contains M user attribute characteristics, and records user u i Is A im ,m=1,2…, M, user u i Is denoted as Att i ={A i1 ,A i2 ,…,A iM }; remember user u j The user attribute information of (1) contains N user attribute characteristics, and records user u j Is A jn N is 1,2, …, N, then user u j Attribute information set denoted Att j ={A j1 ,A j2 ,…,A jN }; obtaining user u i And user u j The number of user attribute features with the same value, denoted as Q, is used to calculate user u using the following formula i And user u j User attribute information similarity D ij :
Wherein, | | represents the number of user attribute features in the set;
s6: the management center inquires the user behavior information of each vehicle user in the vehicle user set phi from the user information database, and calculates the preset time period t by adopting the following formula 1 ,t 2 ]User u in inner vehicle user set phi i And user u j Strength of communication between St ij :
Wherein N is i 、N j Respectively expressed in the time period t 1 ,t 2 ]Inner user u i And u j Respective number of data transmissions, beta ij The calculation formula of the data transmission time parameter is as follows:
wherein, T ij Is shown over a time period t 1 ,t 2 ]Internal useHuu (household) i And user u j Duration of data transmission between, T i 、T j Respectively expressed in the time period t 1 ,t 2 ]Inner user u i And user u j Respective data transmission durations;
Sp ij is shown over a time period t 1 ,t 2 ]Inner user u i And user u j The calculation formula of the parameter of the data transmission times is as follows:
wherein e represents a natural constant, N ij Is shown over a time period t 1 ,t 2 ]Inner user u i And user u j The number of data transmissions therebetween;
s7: recording the number of types of data transmitted among users in the social networking service as K, and inquiring the user u from the user information database by the management center i At a preset time period [ t ] 1 ,t 2 ]Within each type of data transmission duration T i k K is 1,2, …, K, and constructing to obtain a data transmission duration vector L i =(T i 1 ,T i 2 ,…,T i K ) While querying to obtain user u j In a predetermined time period t 1 ,t 2 ]Duration of each type of data transmissionConstructing and obtaining a data transmission duration vectorThen calculating a data transmission time length vector L i =(T i 1 ,T i 2 ,…,T i K ) And data transmission time-long vectorCosine similarity ofFor user u i And user u j Data type similarity Ld between them ij ;
S8: the user u is calculated by the following formula i And user u j User similarity S between ij :
S9: the management center clusters the vehicle users in the vehicle user set phi according to the user similarity, and each category is used as a communication group;
s10: the management center respectively generates a secret key for each communication group and distributes the secret key to all vehicle users in the corresponding communication group; when each vehicle user in the communication group performs intra-group social communication, the pseudonym assigned by the management center in step S2 is used as the social account name, and the received secret key is used to encrypt and decrypt the communication data;
s11: when a certain vehicle user in the communication group quits, the management center generates a secret key for the communication group again; when a new vehicle user sends a request for establishing a communication group to the management center, the management center puts the vehicle user into the vehicle user set phi after passing the request, returns to the step S5 to recalculate the user similarity, and performs communication group division again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110643057.3A CN113297597B (en) | 2021-06-09 | 2021-06-09 | Social networking communication group establishing method based on position privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110643057.3A CN113297597B (en) | 2021-06-09 | 2021-06-09 | Social networking communication group establishing method based on position privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113297597A CN113297597A (en) | 2021-08-24 |
CN113297597B true CN113297597B (en) | 2022-09-06 |
Family
ID=77327813
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110643057.3A Active CN113297597B (en) | 2021-06-09 | 2021-06-09 | Social networking communication group establishing method based on position privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113297597B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112804646A (en) * | 2021-01-04 | 2021-05-14 | 湖州师范学院 | Location service algorithm based on re-encryption and pseudonym exchange |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100185861A1 (en) * | 2009-01-19 | 2010-07-22 | Microsoft Corporation | Anonymous key issuing for attribute-based encryption |
EP2909964B1 (en) * | 2012-10-17 | 2019-04-24 | Nokia Technologies Oy | Method and apparatus for providing secure communications based on trust evaluations in a distributed manner |
US20150106957A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Methods, systems, and devices for facilitating viable distribution of data collected by wearable computation |
CN110300107B (en) * | 2019-06-25 | 2021-10-01 | 南京邮电大学 | Vehicle networking privacy protection trust model based on block chain |
CN111065089B (en) * | 2019-11-05 | 2020-11-27 | 东华大学 | Internet of vehicles bidirectional authentication method and device based on crowd sensing |
CN112367662B (en) * | 2020-12-07 | 2022-12-27 | 河南科技大学 | Location offset-based all-fake k anonymous location privacy protection method in Internet of vehicles |
CN112861173A (en) * | 2021-01-26 | 2021-05-28 | 兰州理工大学 | Internet of vehicles location privacy protection method and system |
-
2021
- 2021-06-09 CN CN202110643057.3A patent/CN113297597B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112804646A (en) * | 2021-01-04 | 2021-05-14 | 湖州师范学院 | Location service algorithm based on re-encryption and pseudonym exchange |
Non-Patent Citations (2)
Title |
---|
A Survey of Location Privacy Preservation in Social Internet of Vehicles;Xiaofan Jia等;《IEEE Access》;20201105;第8卷;全文 * |
车辆自组网的位置隐私保护技术研究;张建明等;《通信学报》;20120825;第33卷(第08期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113297597A (en) | 2021-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105162768B (en) | The method and device of detection fishing Wi-Fi Hotspot | |
KR102663781B1 (en) | Techniques for enabling computing devices to identify when they are in proximity to one another | |
US10084766B2 (en) | Methods and apparatus for providing access to a service | |
US8402134B1 (en) | System and method for locating lost electronic devices | |
US20020080968A1 (en) | Secure location-based services system and method | |
He et al. | Leveraging spatial diversity for privacy-aware location-based services in mobile networks | |
Gupta et al. | Achieving location privacy through CAST in location based services | |
CN106899700A (en) | A kind of method for secret protection of the position shared system in mobile social networking | |
WO2019128930A1 (en) | Operation processing method, account information processing method, device, and storage medium | |
CN106954182A (en) | A kind of anonymous region generation method and location privacy protection method | |
CN105792130A (en) | Mass equal request-oriented k-anonymous location privacy protection method | |
US20150382137A1 (en) | Subscriber location database | |
Vergara-Laurens et al. | Preserving privacy while reducing power consumption and information loss in lbs and participatory sensing applications | |
Wu et al. | Privacy-preserving location-based traffic density monitoring | |
CN113297597B (en) | Social networking communication group establishing method based on position privacy protection | |
Lai et al. | Privacy-aware query processing in vehicular ad-hoc networks | |
Shao et al. | From centralized protection to distributed edge collaboration: a location difference-based privacy-preserving framework for mobile crowdsensing | |
Shen et al. | B-mobishare: Privacy-preserving location sharing mechanism in mobile online social networks | |
US20170366512A1 (en) | System and Method for Machine-to-Machine Privacy and Security Brokered Transactions | |
Werner | Privacy‐protected communication for location‐based services | |
Yang et al. | RuleCache: A mobility pattern based multi-level cache approach for location privacy protection | |
Mocktoolah et al. | Privacy challenges in proximity based social networking: Techniques & solutions | |
CN111224918A (en) | Real-time networking security control platform and access authentication method | |
CN112887973B (en) | Social networking location privacy protection method based on double k-anonymity | |
Bukhari et al. | Privacy provision for tip attributes in NTTP based LBS systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |