CN113297597B - Social networking communication group establishing method based on position privacy protection - Google Patents

Social networking communication group establishing method based on position privacy protection Download PDF

Info

Publication number
CN113297597B
CN113297597B CN202110643057.3A CN202110643057A CN113297597B CN 113297597 B CN113297597 B CN 113297597B CN 202110643057 A CN202110643057 A CN 202110643057A CN 113297597 B CN113297597 B CN 113297597B
Authority
CN
China
Prior art keywords
user
vehicle
management center
communication group
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110643057.3A
Other languages
Chinese (zh)
Other versions
CN113297597A (en
Inventor
邢玲
高建平
吴红海
贾晓凡
姚景龙
赵康
黄元浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Science and Technology
Original Assignee
Henan University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Science and Technology filed Critical Henan University of Science and Technology
Priority to CN202110643057.3A priority Critical patent/CN113297597B/en
Publication of CN113297597A publication Critical patent/CN113297597A/en
Application granted granted Critical
Publication of CN113297597B publication Critical patent/CN113297597B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Evolutionary Computation (AREA)
  • Business, Economics & Management (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a social networking service communication group establishment method based on position privacy protection, which is characterized in that a plurality of management centers are arranged in a social networking service, when a vehicle user enters the administration range of the management center, registering and sending user information to the management center, summarizing the users sending the request for establishing the communication group by the management center to obtain a vehicle user set, inquiring by the management center from a user information database to obtain user attribute information of each vehicle user in the vehicle user set, calculating the user attribute similarity between every two vehicle users, inquiring to obtain user behavior information to calculate the communication intensity and the data type similarity between the users, and then calculating to obtain user similarity, clustering the vehicle users by the management center according to the user similarity to obtain communication group division, and setting a key for social communication in each communication group. The method and the system can effectively reduce the risk of the position privacy information leakage of the vehicle user when the communication group socializes.

Description

Social networking communication group establishing method based on position privacy protection
Technical Field
The invention belongs to the technical field of social car networking, and particularly relates to a social car networking communication group establishing method based on location privacy protection.
Background
With the continuous development of information, people tend to be more intelligent in life, and therefore intelligent automobiles are produced. The user can give up the social function of the mobile phone in the driving process and use the intelligent automobile to perform social contact with other surrounding users. The functions of inquiring about the interest points, asking about people around, making calls, sharing information and the like are all carried out through the intelligent vehicle. When the user needs to communicate with other users, the communication equipment in the vehicle can be directly used for communication, the inconvenience of using a mobile phone is eliminated, and the probability of safety accidents caused by using the mobile phone can be reduced. But the user may communicate with any user in the social process, and the social friends may directly or indirectly reveal the privacy information of the user. Because the user can not directly distinguish the credibility of other users, the user can not directly select reliable users to perform social contact, and the privacy of the user is revealed in the social contact process. In order to ensure the security of the location privacy information of the user, the social network of the user needs to be protected to help the user to find a reliable user for social contact.
In the social process, a user needs to send and receive information, and the information may include data such as own ID, location, interests and the like. The users can directly socialize with friends of the users through vehicles, and can socialize with other strange users driving on the road, but all social users cannot be guaranteed to be credible, or other social users of the social users cannot be guaranteed to be credible, when the users are possibly malicious attackers, or the information of the users is sold for the benefit. When enough information of the user is crawled, the information can be screened, classified and sorted, and then other personal information of the user is analyzed, so that the privacy information of the user is leaked, and great inconvenience or danger is brought to the user. Therefore, in order to reduce the probability of privacy disclosure of the user location, the user needs to select a trusted user for social contact.
The location privacy protection based on the user relationship network is used for protecting the location privacy of the social relationship of the user, and the location information of the user is protected while the social quality of the user is not influenced. The intelligent networked automobile has high-speed mobility, connection and disconnection between users are very rapid, the users need to continuously perform information interaction with other nodes in the driving process, each node on the road cannot be guaranteed to be reliable, and even if the nodes are credible, an attacker can possibly conjecture the privacy of the users through a real-time interaction relation and node behaviors. The user relationship network structure in the social networking services comprises direct or indirect connection relationships between users. The evolution law of the relationship strength of the users is researched, the potential relationship existing among the multi-hop users is discussed by analyzing the behavior pattern and the content association degree of the users, and the guess of the position privacy of the users by an attacker can be indirectly avoided. The user's social network may reveal the user's location privacy information, but may also prevent an attacker from guessing the user's true social processes by protecting the user's social objects and social processes.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a social networking communication group establishing method based on position privacy protection, and a position privacy protection strategy is set according to the relevant condition established by the social networking communication group, so that a user is helped to find other credible users for social contact, and the risk of position privacy information leakage of the vehicle user during social contact of the communication group is effectively reduced.
In order to achieve the purpose, the social networking service communication group establishing method based on location privacy protection comprises the following steps:
s1: arranging a plurality of management centers in the social car networking system, wherein the administration range of each management center is a circular area taking the position coordinate of the management center as the circle center and the preset communication distance R as the radius;
s2: when a vehicle user enters the administration range of the management center, a registration request is sent to the management center, the management center carries out identity verification on the vehicle user after receiving the registration request of the vehicle user, and a pseudonym is generated for the vehicle user after the identity verification is passed and is sent to the vehicle user;
s3: after the vehicle user finishes the registration, sending user information to a management center for registration, wherein the user information comprises user attribute information and user behavior information, and the management center stores the received user information into a user information database;
s4: when a vehicle user needs to socialize, a request for establishing a communication group is sent to a management center, and the management center puts the vehicle user into a vehicle user set phi after passing the request;
s5: the management center inquires user attribute information of each vehicle user in the vehicle user set phi from the user information database, and calculates the user attribute similarity between the vehicle users pairwise, wherein the specific calculation method comprises the following steps:
recording any two users in a vehicle user set phi as u i 、u j Remember user u i The user attribute information of (1) contains M user attribute characteristics, and records user u i Is A im M1, 2, …, M, user u i Is denoted as Att i ={A i1 ,A i2 ,…,A iM }; remember user u j The user attribute information of (1) contains N user attribute characteristics, and records user u j Is A jn N is 1,2, …, N, then user u j Attribute information set denoted Att j ={A j1 ,A j2 ,…,A jN }; obtaining user u i And user u j The number of user attribute features with the same value, denoted as Q, is used to calculate user u using the following formula i And user u j User attribute information similarity D ij
Figure BDA0003107845190000031
Wherein, | | represents the number of user attribute features in the set;
s6: the management center inquires the user behavior information of each vehicle user in the vehicle user set phi from the user information database, and calculates the preset time period t by adopting the following formula 1 ,t 2 ]User u in inner vehicle user set phi i And user u j Strength of communication between St ij
Figure BDA0003107845190000032
Wherein N is i 、N j Respectively indicated at time periods t 1 ,t 2 ]Inner user u i And u j Respective number of data transmissions, beta ij The calculation formula of the data transmission time parameter is as follows:
Figure BDA0003107845190000033
wherein, T ij Is shown during a time period t 1 ,t 2 ]Inner user u i And user u j Duration of data transmission between, T i 、T j Respectively expressed in the time period t 1 ,t 2 ]Inner user u i And user u j Respective data transmission durations;
Sp ij is shown over a time period t 1 ,t 2 ]Inner user u i And user u j The calculation formula of the parameter of the data transmission times is as follows:
Figure BDA0003107845190000034
wherein e represents a natural constant, N ij Is indicated over a time period t 1 ,t 2 ]Inner user u i And user u j The number of data transmissions therebetween;
s7: recording the number of types of data transmitted among users in the social networking service as K, and inquiring the user u from the user information database by the management center i In a predetermined time period t 1 ,t 2 ]Within each type of data transmission duration T i k K is 1,2, …, K, and a data transmission duration vector L is constructed i =(T i 1 ,T i 2 ,…,T i K ) While querying to obtain user u j At a preset time period [ t ] 1 ,t 2 ]Duration of each type of data transmission
Figure BDA0003107845190000035
Constructing and obtaining a data transmission duration vector
Figure BDA0003107845190000036
Then calculating a data transmission time length vector L i =(T i 1 ,T i 2 ,…,T i K ) And data transmission time long vector
Figure BDA0003107845190000037
Cosine similarity of as user u i And user u j Data type similarity Ld between them ij
S8: the user u is calculated by the following formula i And user u j User similarity S between ij
Figure BDA0003107845190000041
S9: the management center clusters the vehicle users in the vehicle user set phi according to the user similarity, and each category is used as a communication group;
s10: the management center respectively generates a secret key for each communication group and distributes the secret key to all vehicle users in the corresponding communication group; when each vehicle user in the communication group performs intra-group social communication, the pseudonym assigned by the management center in step S2 is used as the social account name, and the received secret key is used to encrypt and decrypt the communication data;
s11: when a certain vehicle user in the communication group quits, the management center generates a secret key for the communication group again; when a new vehicle user sends a request for establishing a communication group to the management center, the management center puts the vehicle user into the vehicle user set phi after passing the request, the step S5 is returned to recalculate the user similarity, and the communication group division is performed again.
The invention relates to a social networking service communication group establishing method based on position privacy protection, wherein a plurality of management centers are arranged in a social networking service, when vehicle users enter the jurisdiction range of the management centers, user information is registered and sent to the management centers, the management centers collect the users sending requests for establishing communication groups to obtain a vehicle user set, the management centers inquire user attribute information of all the vehicle users in the vehicle user set from a user information database, the user attribute similarity between every two vehicle users is calculated, the communication strength and the data type similarity between the users are calculated by inquiring the user behavior information, the user similarity is further calculated, the management centers cluster the vehicle users according to the user similarity to obtain communication group division, and a secret key is arranged for each communication group for social communication in the group.
The invention has the following beneficial effects:
1) according to the method, the similarity between the vehicle users is determined from two dimensions of the user attribute information and the user behavior information, and the vehicle users with high similarity are similar in attribute and behavior habit, so that the vehicle users can be regarded as the same credibility as the target users, the probability of leaking the information of the target users is low, and the risk of leaking the privacy of the user positions is reduced;
2) when the vehicle user performs the group communication, the pseudonym and the group key are used for performing encryption communication, so that the safety can be further improved.
Drawings
FIG. 1 is a flow diagram of an embodiment of a social networking communication group establishment method based on location privacy protection;
FIG. 2 is a schematic diagram of a social networking service in accordance with the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided in order to better understand the present invention for those skilled in the art with reference to the accompanying drawings. It is to be expressly noted that in the following description, a detailed description of known functions and designs will be omitted when it may obscure the subject matter of the present invention.
Examples
FIG. 1 is a flow chart of an embodiment of the social networking communication group establishment method based on location privacy protection. As shown in FIG. 1, the social networking service communication group establishing method based on location privacy protection of the present invention specifically comprises the following steps:
s101: setting a management center:
FIG. 2 is a schematic diagram of a social networking service in accordance with the present invention. As shown in FIG. 2, a plurality of management centers are arranged in the social networking services, and the jurisdiction range of each management center is a circular area with the position coordinate of the management center as the center of a circle and the preset communication distance R as the radius. Typically, the management center is a micro-cellular network device, such as a base station.
S102: vehicle user registration to the management center:
when a vehicle user enters the administration range of the management center, a registration request is sent to the management center, the management center carries out identity authentication on the vehicle user after receiving the registration request of the vehicle user, and a pseudonym is generated for the vehicle user and sent to the vehicle user after the identity authentication is passed. The pseudonym is a false identity of the vehicle user in the communication group, the vehicle user can use the false identity to perform social contact, the same effect as the real identity of the user is achieved, and the identity privacy of the user can be protected.
S103: and (3) registering user information:
in order to establish a communication group, a vehicle user needs to be managed by a management center and upload related information. After the vehicle user finishes registration, sending user information to a management center for registration, wherein the user information comprises user attribute information and user behavior information, the user attribute information refers to static information of the user and comprises values of preset user attribute features, generally speaking, the user attribute features can comprise inherent attributes of vehicles such as registration addresses and vehicle models, and the user behavior information reflects communication activities of the user and comprises communication time length, communication times and communication data types between the user and other users. The management center stores the received user information into a user information database.
S104: sending a request for establishing a communication group:
when the vehicle user needs to socialize, a request for establishing a communication group is sent to the management center, and the management center puts the vehicle user into the vehicle user set phi after passing the request.
S105: calculating the similarity of the user attributes:
the management center inquires user attribute information of each vehicle user in the vehicle user set phi from the user information database, and calculates the user attribute similarity between the vehicle users pairwise, wherein the specific calculation method comprises the following steps:
recording any two users in a vehicle user set phi as u respectively i 、u j Remember user u i The user attribute information of (1) contains M user attribute characteristics, and records user u i Is A im M1, 2, …, M, user u i Is denoted as Att i ={A i1 ,A i2 ,…,A iM }. Remember user u j The user attribute information of (1) contains N user attribute characteristics, and records user u j Is A jn N is 1,2, …, N, then user u j Attribute information set denoted Att j ={A j1 ,A j2 ,…,A jN }. Obtaining user u i And user u j The number of user attribute features with the same value, denoted as Q, is used to calculate user u using the following formula i And user u j User attribute information similarity D ij
Figure BDA0003107845190000061
Wherein, | | represents the number of user attribute features in the set.
S106: calculating the communication intensity:
the management center inquires the user behavior information of each vehicle user in the vehicle user set phi from the user information database, and the communication strength between the vehicle users is calculated pairwise. The value of the intensity of the communication is related to the frequency of the communication between the users and also to each communicationThe duration is related to the social willingness among the users. The preset time period [ t ] is calculated by the following formula 1 ,t 2 ]User u in inner vehicle user set phi i And user u j Strength of communication between St ij
Figure BDA0003107845190000062
Wherein N is i 、N j Respectively indicated at time periods t 1 ,t 2 ]Inner user u i And u j Respective number of data transmissions, t 1 、t 2 Respectively representing the start and stop times, beta, of a predetermined time period ij The calculation formula of the data transmission time parameter is as follows:
Figure BDA0003107845190000071
wherein, T ij Is shown during a time period t 1 ,t 2 ]Inner user u i And user u j Duration of data transmission between, T i 、T j Respectively expressed in the time period t 1 ,t 2 ]Inner user u i And user u j The respective data transmission duration.
Sp ij Is shown over a time period t 1 ,t 2 ]Inner user u i And user u j The calculation formula of the parameter of the data transmission times is as follows:
Figure BDA0003107845190000072
wherein e represents a natural constant, N ij Is indicated over a time period t 1 ,t 2 ]Inner user u i And user u j The number of data transmissions therebetween.
Sp ij For reflecting whether data is continuously transmitted between users. If data is frequently transmitted between two users, two users are indicatedHave a stable relationship between them, and have a value of
Figure BDA0003107845190000073
If there is no stable interaction relationship between the two, the value is 1. It is clear that longer transmission durations and shorter transmission time intervals can more efficiently support high burst, large volumes of data.
S107: calculating the similarity of the data types:
note that the number of data types transmitted between users in the social car networking is K, for example, in this embodiment, there are 3 data types, which are Text (Text), Audio (Audio), and Video (Video), respectively. The management center obtains the user u by inquiring from the user information database i At a preset time period [ t ] 1 ,t 2 ]Within each type of data transmission duration T i k K is 1,2, …, K, and a data transmission duration vector L is constructed i =(T i 1 ,T i 2 ,…,T i K ) While querying to obtain user u j In a predetermined time period t 1 ,t 2 ]Within each type of data transmission duration
Figure BDA0003107845190000074
Constructing and obtaining a data transmission time length vector
Figure BDA0003107845190000075
Then calculating a data transmission time length vector L i =(T i 1 ,T i 2 ,…,T i K ) And data transmission time long vector
Figure BDA0003107845190000076
Cosine similarity of as user u i And user u j Data type similarity Ld between ij
S108: calculating the similarity of the users:
according to the similarity of the user attributes, the communication intensity and the data type similarity, the following formula is adopted to calculate the user u i And user u j User similarity betweenDegree S ij
Figure BDA0003107845190000077
Therefore, the similarity of the two dimensions of the user attribute information and the user behavior information is comprehensively considered when the user similarity is calculated, vehicle users with high similarity are similar in attribute and behavior habits, the vehicle users with high similarity are more likely to be reliable users for a certain vehicle user, and the possibility of data leakage in the information interaction process is lower.
S109: communication group division:
and the management center clusters the vehicle users in the vehicle user set phi according to the user similarity, and each category is used as a communication group. The specific parameters of the clustering can be set according to actual needs.
S110: encryption communication:
the management center generates a secret key for each communication group respectively and distributes the secret key to all vehicle users in the corresponding communication group. When each vehicle user in the communication group performs intra-group social communication, the pseudonym assigned by the management center in step S102 is used as the social account name, and the received secret key is used to encrypt and decrypt communication data.
In order to further improve the safety of communication data, all data in the social communication process of all vehicle users in the communication group are stored in the block chain, so that the transparency and traceability of the social process are ensured.
S111: communication group member changes:
when a certain vehicle user in the communication group quits, the management center generates the key for the communication group again. When a new vehicle user sends a request for establishing a communication group to the management center, the management center puts the vehicle user into the vehicle user set phi after passing the request, returns to the step S105 to recalculate the user similarity, and performs communication group division again.
Although the illustrative embodiments of the present invention have been described in order to facilitate those skilled in the art to understand the present invention, it is to be understood that the present invention is not limited to the scope of the embodiments, and that various changes may be made apparent to those skilled in the art as long as they are within the spirit and scope of the present invention as defined and defined in the appended claims, and all matters of the invention using the inventive concepts are protected.

Claims (1)

1. A social networking communication group establishment method based on location privacy protection is characterized by comprising the following steps:
s1: arranging a plurality of management centers in the social car networking system, wherein the administration range of each management center is a circular area taking the position coordinate of the management center as the circle center and the preset communication distance R as the radius;
s2: when a vehicle user enters the administration range of the management center, a registration request is sent to the management center, the management center carries out identity verification on the vehicle user after receiving the registration request of the vehicle user, and a pseudonym is generated for the vehicle user after the identity verification is passed and is sent to the vehicle user;
s3: after the vehicle user finishes registering, sending user information to a management center for registering, wherein the user information comprises user attribute information and user behavior information, and the management center stores the received user information into a user information database;
s4: when a vehicle user needs to socialize, a request for establishing a communication group is sent to a management center, and the management center puts the vehicle user into a vehicle user set phi after passing the request;
s5: the management center inquires user attribute information of each vehicle user in the vehicle user set phi from the user information database, and calculates the user attribute similarity between the vehicle users pairwise, wherein the specific calculation method comprises the following steps:
recording any two users in a vehicle user set phi as u respectively i 、u j Remember user u i The user attribute information of (1) contains M user attribute characteristics, and records user u i Is A im ,m=1,2…, M, user u i Is denoted as Att i ={A i1 ,A i2 ,…,A iM }; remember user u j The user attribute information of (1) contains N user attribute characteristics, and records user u j Is A jn N is 1,2, …, N, then user u j Attribute information set denoted Att j ={A j1 ,A j2 ,…,A jN }; obtaining user u i And user u j The number of user attribute features with the same value, denoted as Q, is used to calculate user u using the following formula i And user u j User attribute information similarity D ij
Figure FDA0003739721720000011
Wherein, | | represents the number of user attribute features in the set;
s6: the management center inquires the user behavior information of each vehicle user in the vehicle user set phi from the user information database, and calculates the preset time period t by adopting the following formula 1 ,t 2 ]User u in inner vehicle user set phi i And user u j Strength of communication between St ij
Figure FDA0003739721720000021
Wherein N is i 、N j Respectively expressed in the time period t 1 ,t 2 ]Inner user u i And u j Respective number of data transmissions, beta ij The calculation formula of the data transmission time parameter is as follows:
Figure FDA0003739721720000022
wherein, T ij Is shown over a time period t 1 ,t 2 ]Internal useHuu (household) i And user u j Duration of data transmission between, T i 、T j Respectively expressed in the time period t 1 ,t 2 ]Inner user u i And user u j Respective data transmission durations;
Sp ij is shown over a time period t 1 ,t 2 ]Inner user u i And user u j The calculation formula of the parameter of the data transmission times is as follows:
Figure FDA0003739721720000023
wherein e represents a natural constant, N ij Is shown over a time period t 1 ,t 2 ]Inner user u i And user u j The number of data transmissions therebetween;
s7: recording the number of types of data transmitted among users in the social networking service as K, and inquiring the user u from the user information database by the management center i At a preset time period [ t ] 1 ,t 2 ]Within each type of data transmission duration T i k K is 1,2, …, K, and constructing to obtain a data transmission duration vector L i =(T i 1 ,T i 2 ,…,T i K ) While querying to obtain user u j In a predetermined time period t 1 ,t 2 ]Duration of each type of data transmission
Figure FDA0003739721720000024
Constructing and obtaining a data transmission duration vector
Figure FDA0003739721720000025
Then calculating a data transmission time length vector L i =(T i 1 ,T i 2 ,…,T i K ) And data transmission time-long vector
Figure FDA0003739721720000026
Cosine similarity ofFor user u i And user u j Data type similarity Ld between them ij
S8: the user u is calculated by the following formula i And user u j User similarity S between ij
Figure FDA0003739721720000027
S9: the management center clusters the vehicle users in the vehicle user set phi according to the user similarity, and each category is used as a communication group;
s10: the management center respectively generates a secret key for each communication group and distributes the secret key to all vehicle users in the corresponding communication group; when each vehicle user in the communication group performs intra-group social communication, the pseudonym assigned by the management center in step S2 is used as the social account name, and the received secret key is used to encrypt and decrypt the communication data;
s11: when a certain vehicle user in the communication group quits, the management center generates a secret key for the communication group again; when a new vehicle user sends a request for establishing a communication group to the management center, the management center puts the vehicle user into the vehicle user set phi after passing the request, returns to the step S5 to recalculate the user similarity, and performs communication group division again.
CN202110643057.3A 2021-06-09 2021-06-09 Social networking communication group establishing method based on position privacy protection Active CN113297597B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110643057.3A CN113297597B (en) 2021-06-09 2021-06-09 Social networking communication group establishing method based on position privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110643057.3A CN113297597B (en) 2021-06-09 2021-06-09 Social networking communication group establishing method based on position privacy protection

Publications (2)

Publication Number Publication Date
CN113297597A CN113297597A (en) 2021-08-24
CN113297597B true CN113297597B (en) 2022-09-06

Family

ID=77327813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110643057.3A Active CN113297597B (en) 2021-06-09 2021-06-09 Social networking communication group establishing method based on position privacy protection

Country Status (1)

Country Link
CN (1) CN113297597B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804646A (en) * 2021-01-04 2021-05-14 湖州师范学院 Location service algorithm based on re-encryption and pseudonym exchange

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185861A1 (en) * 2009-01-19 2010-07-22 Microsoft Corporation Anonymous key issuing for attribute-based encryption
EP2909964B1 (en) * 2012-10-17 2019-04-24 Nokia Technologies Oy Method and apparatus for providing secure communications based on trust evaluations in a distributed manner
US20150106957A1 (en) * 2013-10-10 2015-04-16 Elwha Llc Methods, systems, and devices for facilitating viable distribution of data collected by wearable computation
CN110300107B (en) * 2019-06-25 2021-10-01 南京邮电大学 Vehicle networking privacy protection trust model based on block chain
CN111065089B (en) * 2019-11-05 2020-11-27 东华大学 Internet of vehicles bidirectional authentication method and device based on crowd sensing
CN112367662B (en) * 2020-12-07 2022-12-27 河南科技大学 Location offset-based all-fake k anonymous location privacy protection method in Internet of vehicles
CN112861173A (en) * 2021-01-26 2021-05-28 兰州理工大学 Internet of vehicles location privacy protection method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804646A (en) * 2021-01-04 2021-05-14 湖州师范学院 Location service algorithm based on re-encryption and pseudonym exchange

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Survey of Location Privacy Preservation in Social Internet of Vehicles;Xiaofan Jia等;《IEEE Access》;20201105;第8卷;全文 *
车辆自组网的位置隐私保护技术研究;张建明等;《通信学报》;20120825;第33卷(第08期);全文 *

Also Published As

Publication number Publication date
CN113297597A (en) 2021-08-24

Similar Documents

Publication Publication Date Title
CN105162768B (en) The method and device of detection fishing Wi-Fi Hotspot
KR102663781B1 (en) Techniques for enabling computing devices to identify when they are in proximity to one another
US10084766B2 (en) Methods and apparatus for providing access to a service
US8402134B1 (en) System and method for locating lost electronic devices
US20020080968A1 (en) Secure location-based services system and method
He et al. Leveraging spatial diversity for privacy-aware location-based services in mobile networks
Gupta et al. Achieving location privacy through CAST in location based services
CN106899700A (en) A kind of method for secret protection of the position shared system in mobile social networking
WO2019128930A1 (en) Operation processing method, account information processing method, device, and storage medium
CN106954182A (en) A kind of anonymous region generation method and location privacy protection method
CN105792130A (en) Mass equal request-oriented k-anonymous location privacy protection method
US20150382137A1 (en) Subscriber location database
Vergara-Laurens et al. Preserving privacy while reducing power consumption and information loss in lbs and participatory sensing applications
Wu et al. Privacy-preserving location-based traffic density monitoring
CN113297597B (en) Social networking communication group establishing method based on position privacy protection
Lai et al. Privacy-aware query processing in vehicular ad-hoc networks
Shao et al. From centralized protection to distributed edge collaboration: a location difference-based privacy-preserving framework for mobile crowdsensing
Shen et al. B-mobishare: Privacy-preserving location sharing mechanism in mobile online social networks
US20170366512A1 (en) System and Method for Machine-to-Machine Privacy and Security Brokered Transactions
Werner Privacy‐protected communication for location‐based services
Yang et al. RuleCache: A mobility pattern based multi-level cache approach for location privacy protection
Mocktoolah et al. Privacy challenges in proximity based social networking: Techniques & solutions
CN111224918A (en) Real-time networking security control platform and access authentication method
CN112887973B (en) Social networking location privacy protection method based on double k-anonymity
Bukhari et al. Privacy provision for tip attributes in NTTP based LBS systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant