CN103596133A - Location anonymous method and device for continuous queries and privacy protection system - Google Patents

Location anonymous method and device for continuous queries and privacy protection system Download PDF

Info

Publication number
CN103596133A
CN103596133A CN201310616970.XA CN201310616970A CN103596133A CN 103596133 A CN103596133 A CN 103596133A CN 201310616970 A CN201310616970 A CN 201310616970A CN 103596133 A CN103596133 A CN 103596133A
Authority
CN
China
Prior art keywords
anonymous
inquiry
circle
anonymity
query
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310616970.XA
Other languages
Chinese (zh)
Other versions
CN103596133B (en
Inventor
王岢
叶允明
徐晓飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Graduate School Harbin Institute of Technology
Original Assignee
Shenzhen Graduate School Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Graduate School Harbin Institute of Technology filed Critical Shenzhen Graduate School Harbin Institute of Technology
Priority to CN201310616970.XA priority Critical patent/CN103596133B/en
Publication of CN103596133A publication Critical patent/CN103596133A/en
Application granted granted Critical
Publication of CN103596133B publication Critical patent/CN103596133B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a location anonymous method for continuous queries. The method comprises the steps that when an anonymous query is received, each unexpired query to be anonymous in a query set to be anonymous is detected; when the unexpired queries to be anonymous meet a quality model, the queries to be anonymous are inserted into a candidate anonymous set; when the detection of the queries to be anonymous in the query set to be anonymous is finished, and the number of queries in the candidate anonymous set is larger than or equal to that of a preset anonymity degree, the candidate anonymous set forms an anonymity circle, and whether the anonymity circle meets a privacy model or not is judged; when the anonymity circle meets the privacy model, the center of the anonymity circle is adjusted, and the anonymity circle is returned. The invention further discloses a location anonymous device for the continuous queries and a privacy protection system. The privacy protection on the continuous queries is improved, and location service quality and anonymity efficiency are improved.

Description

The position anonymous methods of continuous-query and device, intimacy protection system
Technical field
The present invention relates to location-based service field, relate in particular to a kind of position anonymous methods of continuous-query and device, intimacy protection system.
Background technology
At mobile communication, GIS-Geographic Information System (Geographic Information System, GIS) with mobile positioning technique (Global Position System, GPS) highly developed today, mobile position information service (Location-Based Services, LBS) as the important ring in Mobile Value-Added Service, become gradually an indispensable part in people's life, user can pass through portable mobile device whenever and wherever possible, as mobile phone, PDA, Palm etc., inquire various required information.
Although shift position service makes our daily life more convenient, but positional information is revealed the privacy leakage bringing and is threatened also increasing, suppose that user is to location database provider server (Location-Based Services Provider, while LBSP) sending an inquiry request, assailant is by attacking location database server, can obtain user's particular location and query contents, the user's that constitutes a serious infringement privacy and safety.
Therefore, in prior art, there are following several method for secret protection, so that the privacy of user that uses shift position to serve is protected.
The first method for secret protection is assumed name and anonymity.Mobile subscriber can not utilize false identity or first the identify label of oneself be carried out to anonymity by the true identity of oneself and replace true identity when sending service request to server, thereby has cut off mobile subscriber's positional information and the corresponding relation of User Identity.For example assumed name uses a Virtual User identify label VID, replaces user real identification sign ID.At this moment mobile subscriber's location privacy protection information four-tuple has become P (VID; L; Q; Tq); this location privacy protection information tuple is sent to location database server; because user provides the actual position of oneself, the result that location database server returns is also the most satisfactory, thereby the location-based service quality that mobile subscriber obtains is also higher.Even if malicious person has been known mobile subscriber's actual position L, and identify label in location privacy protection information four-tuple corresponding to L is mobile subscriber's virtual identity sign VID, therefore also cannot know that requesting query sends user's real user identity.
The second method for secret protection is fuzzy technology.This fuzzy technology is that the dip quality of service exchanges a kind of anonymous technology of location privacy safety for; permission mobile subscriber provides the identify label of oneself to location database server, reduces the object that positional information of mobile subscriber accuracy reaches customer location secret protection simultaneously.
The third method for secret protection is encryption technology.By some cryptographic algorithm, mobile subscriber's positional information is encrypted, the collected result data of location database server end is also done to corresponding processing simultaneously.Because the data that position data server receives were processed through encryption technology, if despiteful, steal after these positional informations and also cannot know that deciphering obtains mobile subscriber's actual position.
Above-mentioned three kinds of method for secret protection can be realized secret protection to a certain degree, although easy realization and the operation very of assumed name and anonymous technology, anonymous weak effect, often can be cracked by Data Mining Tools; After fuzzy technology is extensive to location of mobile users, there is good anonymous effect, but sacrificed the location-based service quality that user enjoys; Encryption technology effect on to the protection of location privacy is best, but it is lower to realize comparatively complicated its efficiency.Therefore need badly and a kind ofly can reach better location privacy protection effect, can reach again the method for secret protection of high-quality location-based service.
Summary of the invention
The main purpose of the embodiment of the present invention is to provide a kind of position anonymous methods of continuous-query and device, intimacy protection system, is intended to reach better location privacy protection effect, can reach high-quality location-based service again.
For reaching above object, the embodiment of the present invention provides a kind of position anonymous methods of continuous-query, comprises the following steps:
S1, while receiving anonymous inquiry, detect and treat in anonymous query set that each not out of date treats anonymous inquiry;
S2, when described not out of date when anonymous inquiry meets quality model, will described in treat that anonymous inquiry inserts the anonymous set of candidate;
S3, repeated execution of steps S1 and step S2, until described in treat that the anonymous inquiry for the treatment of in anonymous query set has all detected;
S4, judge whether the quantity of inquiry in the anonymous set of candidate is more than or equal to default anonymous degree; Be to proceed to step S5, otherwise proceed to step S7;
S5, the anonymous set formation of described candidate is anonymous round, and judge whether this anonymity circle meets privacy model; Be to proceed to step S6, otherwise proceed to step S7;
S6, the center of circle that anonymity is justified are adjusted, and return to anonymous circle;
S7, described anonymous inquiry request is inserted and treated in anonymous query set, and return to step S1.
Preferably, in described step S2, the not out of date determination methods that anonymous inquiry meets quality model for the treatment of is:
Calculate the area of a circle of described anonymity inquiry and the described not out of date distance for the treatment of anonymous inquiry and the angle that radius forms triangle hypotenuse and X-axis formation;
When described angle is less than or equal to predetermined threshold value, judge that this not out of date anonymous inquiry for the treatment of meets quality model.
Preferably, in described step S5, judge whether anonymous circle meets privacy model and comprise:
Calculate the possible position scope of each inquiry in life cycle in anonymous circle;
When the possible position scope of all inquiries is not occured simultaneously, judge the satisfactory sufficient privacy model of this anonymity;
When the possible position scope of all inquiries has common factor, judge that this anonymity circle does not meet privacy model.
Preferably, in described step S6, the center of circle adjustment of anonymity circle is comprised:
Find out the inquiry of minimum abscissa and maximum abscissa in anonymous circle, and the inquiry of minimum ordinate and maximum ordinate;
Calculate the anonymous round heart to the poor x between the distance of the inquiry of minimum abscissa and the inquiry of maximum abscissa, and the anonymous round heart is to the poor y between the distance of the inquiry of minimum ordinate and the inquiry of maximum ordinate;
At [0, x], [0, y] produces random number respectively, and abscissa and the ordinate correspondence in the center of circle of described anonymous circle are adjusted to two produced random numbers.
Preferably, in described step S5, the anonymous set of described candidate being formed to anonymous circle comprises:
The described anonymous inquiry of take is the center of circle, and anonymity inquires the maximum of the distance between the anonymous inquiry integrating of candidate as radius, generates anonymous circle.
The anonymous device in position that the invention provides a kind of continuous-query, comprising:
Quality model detection module, when receiving anonymous inquiry, detects and treats in anonymous query set that each not out of date treats anonymous inquiry, judges whether the described not out of date anonymous inquiry for the treatment of meets quality model;
The anonymous set of candidate acquisition module, for when described not out of date when anonymous inquiry meets quality model, will described in treat that anonymous inquiry inserts the anonymous set of candidate, until described in treat that anonymous inquiry for the treatment of in anonymous query set all detected;
Anonymous circle generation module, while spending for being more than or equal to default anonymity when the anonymous quantity of gathering inquiry of described candidate, forms anonymity circle by the anonymous set of described candidate;
Whether privacy model detection module, meet privacy model for detection of anonymity circle;
Center adjusting module, for when anonymous satisfactory sufficient privacy model being detected, adjusts the center of circle of anonymity circle, returns to anonymous circle.
Preferably, described quality model detection module is used for:
Calculate the area of a circle of described anonymity inquiry and the described not out of date distance for the treatment of anonymous inquiry and the angle that radius forms triangle hypotenuse and X-axis formation; When described angle is less than or equal to predetermined threshold value, judge that this not out of date anonymous inquiry for the treatment of meets quality model.
Preferably, described privacy model detection module comprises:
Calculate the possible position scope of each inquiry in life cycle in anonymous circle; When the possible position scope of all inquiries is not occured simultaneously, judge the satisfactory sufficient privacy model of this anonymity; When the possible position scope of all inquiries has common factor, judge that this anonymity circle does not meet privacy model.
Preferably, described center adjusting module is used for:
Find out the inquiry of minimum abscissa and maximum abscissa in anonymous circle, and the inquiry of minimum ordinate and maximum ordinate; Calculate the anonymous round heart to the poor x between the distance of the inquiry of minimum abscissa and the inquiry of maximum abscissa, and the anonymous round heart is to the poor y between the distance of the inquiry of minimum ordinate and the inquiry of maximum ordinate; At [0, x], [0, y] produces random number respectively, and abscissa and the ordinate correspondence in the center of circle of described anonymous circle are adjusted to two produced random numbers.
The present invention also provides a kind of intimacy protection system of continuous-query, comprises anonymous server and location database server, and described anonymous server comprises storehouse, anonymous region, anonymous device and filter, wherein:
Storehouse, described anonymous region is for depositing the anonymous region generating in the continuous-query lifetime;
The anonymous device in position that described anonymous device is said structure, generates anonymous region for the position enquiring sending according to user, and the anonymous region generating is sent to location database server;
Described filter filters for anonymous region Query Result corresponding to all inquiries that location database server is returned, and finds the positional information that described position enquiring is corresponding, and returns to user;
Described location database server is used for according to the positional information of all inquiry correspondences in anonymous region, and is back to anonymous server.
The embodiment of the present invention is by when generating anonymous region at first; according to new quality model and the privacy model set up; select both to have met quality model; meet again the anonymous region of privacy model; therefore make this anonymity region can reach better location privacy protection effect, can reach high-quality location-based service again.Simultaneously; when generating anonymous region, also the center in this anonymity region is adjusted, to avoid malicious person to infer user's accurate location by calculating the center of circle of anonymous circle; improve the secret protection of continuous-query, improved location-based service quality and anonymous efficiency.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the position anonymous methods of continuous-query of the present invention;
Fig. 2 generates the schematic diagram of anonymous circle in the position anonymous methods of continuous-query of the present invention;
Fig. 3 is that in the position anonymous methods of continuous-query of the present invention, judgement treats whether anonymous inquiry meets the schematic flow sheet of quality model;
Fig. 4 calculates the schematic diagram for the treatment of distance between anonymous inquiry in the position anonymous methods of continuous-query of the present invention;
Fig. 5 calculates the schematic diagram at anonymous inclination angle in the position anonymous methods of continuous-query of the present invention;
Fig. 6 is the schematic flow sheet that in the position anonymous methods of continuous-query of the present invention, whether the anonymous circle of judgement meets privacy model;
Fig. 7 is the schematic diagram whether two inquiries of the anonymous circle of judgement in the position anonymous methods of continuous-query of the present invention have common factor;
Fig. 8 is the schematic flow sheet of in the position anonymous methods of continuous-query of the present invention, anonymous Yuan center being adjusted;
Fig. 9 calculates the schematic diagram of the round heart of anonymity after adjusting in the position anonymous methods of continuous-query of the present invention;
Figure 10 is the high-level schematic functional block diagram of the anonymous device in position of continuous-query of the present invention;
Figure 11 is the configuration diagram of the intimacy protection system of continuous-query of the present invention;
Figure 12 is the high-level schematic functional block diagram of anonymous server in the intimacy protection system of continuous-query of the present invention.
The realization of the object of the invention, functional characteristics and advantage, in connection with embodiment, are described further with reference to accompanying drawing.
Embodiment
Below in conjunction with Figure of description and specific embodiment, further illustrate technical scheme of the present invention.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
Main thought of the present invention is position-based K-anonymity model and central server structure; a kind of enhancement mode greed anonymity algorithm has been proposed; increased the judgement of quality model and privacy model; thereby make the anonymity circle obtaining can reach better location privacy protection effect, can reach high-quality location-based service again.
With reference to Fig. 1, the position anonymous methods preferred embodiment of a kind of continuous-query of the present invention is proposed.The position anonymous methods of this continuous-query comprises the following steps:
Step S110, while receiving anonymous inquiry, detect and treat in anonymous query set that each not out of date treats anonymous inquiry;
Treat that the inquiry in anonymous query set refers to other Client-initiated inquiries, and these other users are at the periphery of initiating the user of anonymous inquiry.Not out of date treat anonymous inquiry refer to initiation inquiry time still before the deadline, for example the term of validity is 30 minutes, send inquiry time more than 30 minutes inquiry not before the deadline.
Step S120, when described not out of date when anonymous inquiry meets quality model, will described in treat that anonymous inquiry inserts the anonymous set of candidate;
Judge whether the described not out of date anonymous inquiry for the treatment of meets quality model, and the anonymous inquiry for the treatment of that meets quality model is inserted to the anonymous set of candidate.This quality model is mainly that the inquiry in anonymous region too disperses for moving-limiting user is at continuous-query in the lifetime.
Described in step S130, judgement, treat whether the anonymous inquiry for the treatment of in anonymous query set has all detected; Be to proceed to step S110, otherwise proceed to step S140;
Step S140, judge whether the quantity of inquiry in the anonymous set of candidate is more than or equal to default anonymous degree; Be to proceed to step S150, otherwise proceed to step S170;
When all when anonymous inquiry has all detected in anonymous query set, judge whether the quantity of inquiring about in the anonymous set of candidate is more than or equal to default anonymous degree K.K is larger for this anonymity degree, and anonymous effect is better, and the burden that simultaneously brings anonymous server is also heavier, so the value of this anonymity degree K will arrange as the case may be.
Step S150, the anonymous set formation of described candidate is anonymous round;
If figure is after selecting the anonymous set of candidate, using described anonymous inquiry as the center of circle, anonymity inquires the maximum of the distance between the anonymous inquiry integrating of candidate as radius, generates anonymous circle.As shown in Figure 2, in figure, rectangle represents whole system region, and broken circle represents anonymous region, also anonymous round, the inner solid black circle of anonymous circle represents that k in anonymous region is treated anonymous inquiry, and the outside grey filled circles of anonymous circle represents the anonymous inquiry for the treatment of around.Forming centered by anonymity inquiry S of this anonymity circle, anonymous inquiry S is radius to the maximum of the distance between the inquiry of the anonymous set of candidate, for example, inquire about Q1.
Step S160, judge whether this anonymity circle meets privacy model; Be to proceed to step S170, otherwise proceed to step S180;
When the quantity of inquiry is more than or equal to default anonymous degree K in the anonymous set of this candidate, the anonymous set of described candidate is formed to anonymous circle, and this anonymity Yuan center is for initiating the user of inquiry.Whether the anonymity circle that simultaneously judges this formation meets privacy model.This privacy model is in order to ensure in the whole continuous lifetime, and any two inquiries in anonymous region can not converge at a bit.
Step S170, the center of circle that anonymity is justified are adjusted, and return to anonymous circle;
For fear of generating after anonymous circle, malicious person infers user's accurate location by calculating the center of circle of anonymous circle, thus will the center of circle of anonymity circle be adjusted, and the area of anonymous circle is constant, and also the inquiry comprising in anonymous circle is constant.
Step S180, described anonymous inquiry request is inserted and treated in anonymous query set, and return to step S110.
When in the anonymous set of candidate, the quantity of inquiry does not reach default anonymous degree K, or when the anonymity forming circle does not meet privacy model, all anonymous inquiry request to be inserted and treated in anonymous query set, and return to step S110, to obtain, both meet quality model, met again the anonymity circle of privacy model.
The embodiment of the present invention is by when generating anonymous region at first; according to new quality model and the privacy model set up; select both to have met quality model; meet again the anonymous region of privacy model; therefore make this anonymity region can reach better location privacy protection effect, can reach high-quality location-based service again.Simultaneously; when generating anonymous region, also the center in this anonymity region is adjusted, to avoid malicious person to infer user's accurate location by calculating the center of circle of anonymous circle; improve the secret protection of continuous-query, improved location-based service quality and anonymous efficiency.
Further, with reference to Fig. 3, above-mentioned steps S120 comprises:
Step S121, the area of a circle that calculates described anonymity inquiry and the described not out of date distance for the treatment of anonymous inquiry and radius form the angle of triangle hypotenuse and X-axis formation;
As shown in Figure 4, S is anonymous inquiry, and Q is the not out of date anonymous inquiry for the treatment of.Broken circle is for take S as the center of circle, the circle that the distance between S and Q is radius.First calculate described anonymous inquiry S and the described not out of date distance R a between anonymous inquiry Q that treats, and then the area of a circle п * (Ra) that this distance R a is radius is take in calculating 2, then calculate this area of a circle п * (Ra) 2with the triangle hypotenuse of distance R a formation and the angle of x axle, be anonymous inclination angle CA (SQ), as shown in Figure 5.This anonymity inclination angle can obtain by following formula,
CA ( S , Q ) = arctan π ( Ra ) 2 Ra Formula (one)
Step S122, when described angle is less than or equal to a predetermined threshold value, judge that this not out of date treats that anonymous inquiry meets quality model, will described in treat that anonymous inquiry inserts the anonymous set of candidate;
From above-mentioned formula (one), anonymous inclination angle changes in [0 °, 90 °], and far away with the distance for the treatment of anonymous inquiry Q as inquiry request S, and the value at this anonymity inclination angle is larger.Therefore, will preset a threshold value.When anonymous inclination angle is less than or equal to this threshold value, represents that this treats that anonymous inquiry meets quality model, and this is treated to anonymous inquiry inserts the anonymous set of candidate.
Step S123, when described angle is greater than a predetermined threshold value, judge that this not out of date treats that anonymous inquiry does not meet quality model, and return to step S110.
When anonymous inclination angle is greater than this threshold value, represent to treat that anonymous inquiry does not meet quality model.Therefore return to step S110, continue the next detection for the treatment of anonymous inquiry.
Further, with reference to Fig. 6, above-mentioned steps 160 comprises:
The possible position scope of each inquiry in life cycle in step S161, the anonymous circle of calculating;
Step S162, judge whether the possible position scope of any two inquiries has common factor; Be to proceed to step S164, otherwise proceed to step S163;
Step S163, judge the satisfactory sufficient privacy model of this anonymity;
Step S164, judge that this anonymity circle does not meet privacy model.
First, calculate each the inquiry band of position that may move within the scope of continuous-query in anonymous circle, and set up each inquiry can mobile band of position equation group EQ; Then by judging whether equation group has solution to come surveyed area whether overlapping, if there are overlapping explanation two inquiries to converge, otherwise explanation inquiry can not converge.As shown in Figure 7, in figure, filled circles is mobile enquiry, the solid line circle anonymity circle for generating, and broken circle be that in anonymous circle, each is inquired about in continuous-query possible position scope in the lifetime.This shows, the position range of each inquiry is a border circular areas, this circle take inquiry send position as the center of circle, most probable velocity and the anonymous round-formed moment to the anonymous round product of time period constantly that lost efficacy of take is radius, whether the possible position scope that judges these inquiries has common factor, as non-intersect anonymous satisfactory sufficient privacy model, otherwise do not meet privacy model.
Further, with reference to Fig. 8, above-mentioned steps S170 comprises:
Step S171, find out the inquiry of minimum abscissa and maximum abscissa in anonymous circle and the inquiry of minimum ordinate and maximum ordinate;
Step S172, calculate the anonymous round heart to the poor x between the distance of the inquiry of minimum abscissa and the inquiry of maximum abscissa, and the anonymous round heart arrives the poor y between the distance of the inquiry of minimum ordinate and the inquiry of maximum ordinate;
Step S173, respectively at [0, x], [0, y] produces random number, and abscissa and the ordinate correspondence in the center of circle of described anonymous circle are adjusted to two produced random numbers.
Because we adopt circularly as anonymous region, the anonymous region generating is to using anonymity inquiry S as the border circular areas in the center of circle, so the center of circle of anonymous circle is the anonymity inquiry of the request of sending.Therefore,, for avoiding malicious person by calculating the position of anonymous round heart speculative request inquiry, we need to do home position adjustment to the anonymity circle generating.As shown in Figure 9, first, find minimum abscissa, minimum ordinate, maximum abscissa, maximum ordinate, for example Q1-Q4 of inquiry in anonymous circle.And then calculate respectively the range difference Δ x between the abscissa of Q1 and the abscissa of Q2, calculate the range difference Δ y between the abscissa of Q3 and the ordinate of Q4.Then produce random number in [0, Δ x], and in [0, Δ y], produce random number, and using the random number of this generation as abscissa and ordinate, adjust the center of circle of anonymous circle.
With reference to Figure 10, the anonymous device preferred embodiment in position of continuous-query of the present invention is proposed.The anonymous device in position of this embodiment comprises:
Quality model detection module 110, when receiving anonymous inquiry, detects and treats in anonymous query set that each not out of date treats anonymous inquiry, judges whether the described not out of date anonymous inquiry for the treatment of meets quality model;
The anonymous set of candidate acquisition module 120, for when described not out of date when anonymous inquiry meets quality model, will described in treat that anonymous inquiry inserts the anonymous set of candidate, until described in treat that anonymous inquiry for the treatment of in anonymous query set all detected;
Anonymous circle generation module 130, while spending for being more than or equal to default anonymity when the anonymous quantity of gathering inquiry of described candidate, forms anonymity circle by the anonymous set of described candidate;
Whether privacy model detection module 140, meet privacy model for detection of anonymity circle;
Center adjusting module 150, for when anonymous satisfactory sufficient privacy model being detected, adjusts the center of circle of anonymity circle, returns to anonymous circle.
Above-mentioned quality model detection module 110 treats that by detection in anonymous query set, each not out of date anonymity for the treatment of is inquired about, to judge whether it meets quality model.When judging that this is when anonymous inquiry meets quality model, the anonymous set of candidate acquisition module 120 is added candidate's anonymity set.This quality model is mainly that the inquiry in anonymous region too disperses for moving-limiting user is at continuous-query in the lifetime.Treat that the inquiry in anonymous query set refers to other Client-initiated inquiries, and these other users are at the periphery of initiating the user of anonymous inquiry.Not out of date treat anonymous inquiry refer to initiation inquiry time still before the deadline, for example the term of validity is 30 minutes, send inquiry time more than 30 minutes inquiry not before the deadline.
When the quantity of 130 inquiries in the anonymous set of this candidate of above-mentioned anonymous circle generation module is more than or equal to default anonymous degree K, the inquiry according in the anonymous set of described candidate, generates anonymous circle.Be specially: using described anonymous inquiry as the center of circle, anonymity inquires the maximum of the distance between the anonymous inquiry integrating of candidate as radius, generates anonymous circle.Then privacy model detection module 140 judges whether the anonymity circle of this formation meets privacy model.This privacy model is in order to ensure in the whole continuous lifetime, and any two inquiries in anonymous region can not converge at a bit.
For fear of generating after anonymous circle, malicious person infers user's accurate location by calculating the center of circle of anonymous circle, so center adjusting module 150 will be adjusted the center of circle of anonymity circle, and the area of anonymous circle is constant, and the inquiry comprising in anonymous circle is constant.
The embodiment of the present invention is by when generating anonymous region at first; according to new quality model and the privacy model set up; select both to have met quality model; meet again the anonymous region of privacy model; therefore make this anonymity region can reach better location privacy protection effect, can reach high-quality location-based service again.Simultaneously; when generating anonymous region, also the center in this anonymity region is adjusted, to avoid malicious person to infer user's accurate location by calculating the center of circle of anonymous circle; improve the secret protection of continuous-query, improved location-based service quality and anonymous efficiency.
Further, above-mentioned quality model detection module 110 for:
Calculate the area of a circle of described anonymity inquiry and the described not out of date distance for the treatment of anonymous inquiry and the angle that radius forms triangle hypotenuse and X-axis formation; When described angle is in [0 °, 90 °], judge that this not out of date anonymous inquiry for the treatment of meets quality model.
Further, above-mentioned privacy model detection module 140 comprises:
Calculate the possible position scope of each inquiry in life cycle in anonymous circle; When the possible position scope of all inquiries is not occured simultaneously, judge the satisfactory sufficient privacy model of this anonymity; When the possible position scope of all inquiries has common factor, judge that this anonymity circle does not meet privacy model.
Further, above-mentioned center adjusting module 150 for:
Find out the inquiry of minimum abscissa and maximum abscissa in anonymous circle, and the inquiry of minimum ordinate and maximum ordinate; Calculate the anonymous round heart to the poor x between the distance of the inquiry of minimum abscissa and the inquiry of maximum abscissa, and the anonymous round heart is to the poor y between the distance of the inquiry of minimum ordinate and the inquiry of maximum ordinate; At [0, x], [0, y] produces random number respectively, and abscissa and the ordinate correspondence in the center of circle of described anonymous circle are adjusted to two produced random numbers.
With reference to Figure 11, the intimacy protection system preferred embodiment of a kind of continuous-query of the present invention is proposed.This intimacy protection system comprises anonymous server 100 and location database server 200.When user serves in needs use location, will send inquiry request.This inquiry request is divided into two classes, and a class is new inquiry, is the inquiry that user proposes for the first time; Another kind of is activity query, be user and previously proposed, and still effectively inquiry.In activity query, anonymous server only need to be carried out the position in anonymous region and be upgraded.
Wherein, with reference to Figure 12, described anonymous server 100 comprises storehouse, anonymous region 101, anonymous device 102 and filter 103.The anonymous region that storehouse, described anonymous region 101 generates in the lifetime for depositing a continuous-query; The anonymous device in position that described anonymous device 102 is said structure, generates anonymous region for the position enquiring sending according to user, and the anonymous region generating is sent to location database server 200; Described filter 103 filters for anonymous region Query Result corresponding to all inquiries that location database server 200 is returned, and finds positional information corresponding to described position enquiring request, and returns to user.Described location database server 200 is for according to the positional information of all inquiry correspondences in anonymous region, and is back to anonymous server 100.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby the process, method, article or the device that make to comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or be also included as the intrinsic key element of this process, method, article or device.The in the situation that of more restrictions not, the key element being limited by statement " comprising ... ", and be not precluded within process, method, article or the device that comprises this key element and also have other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.Through the above description of the embodiments, those skilled in the art can be well understood to the mode that above-described embodiment method can add essential general hardware platform by software and realize, can certainly pass through hardware, but in a lot of situation, the former is better execution mode.Understanding based on such, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, said apparatus will be realized by some instructions, these some instructions are stored in a storage medium (as ROM/RAM, magnetic disc, CD), for terminal equipment, (can be mobile phone, computer, server, or the network equipment etc.) carry out the method described in each embodiment of the present invention.
The foregoing is only the preferred embodiments of the present invention; not thereby limit its scope of the claims; every equivalent structure or conversion of equivalent flow process that utilizes specification of the present invention and accompanying drawing content to do; directly or indirectly be used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a position anonymous methods for continuous-query, is characterized in that, comprises the following steps:
S1, while receiving anonymous inquiry, detect and treat in anonymous query set that each not out of date treats anonymous inquiry;
S2, when described not out of date when anonymous inquiry meets quality model, will described in treat that anonymous inquiry inserts the anonymous set of candidate;
S3, repeated execution of steps S1 and step S2, until described in treat that the anonymous inquiry for the treatment of in anonymous query set has all detected;
S4, judge whether the quantity of inquiry in the anonymous set of candidate is more than or equal to default anonymous degree; Be to proceed to step S5, otherwise proceed to step S7;
S5, the anonymous set formation of described candidate is anonymous round, and judge whether this anonymity circle meets privacy model; Be to proceed to step S6, otherwise proceed to step S7;
S6, the center of circle that anonymity is justified are adjusted, and return to anonymous circle;
S7, described anonymous inquiry request is inserted and treated in anonymous query set, and return to step S1.
2. the position anonymous methods of continuous-query according to claim 1, is characterized in that, the determination methods that anonymous inquiry meets quality model for the treatment of not out of date in described step S2 is:
Calculate the area of a circle of described anonymity inquiry and the described not out of date distance for the treatment of anonymous inquiry and the angle that radius forms triangle hypotenuse and X-axis formation;
When described angle is less than or equal to predetermined threshold value, judge that this not out of date anonymous inquiry for the treatment of meets quality model.
3. the position anonymous methods of continuous-query according to claim 2, is characterized in that, judges whether anonymous circle meets privacy model and comprise in described step S5:
Calculate the possible position scope of each inquiry in life cycle in anonymous circle;
When the possible position scope of all inquiries is not occured simultaneously, judge the satisfactory sufficient privacy model of this anonymity;
When the possible position scope of all inquiries has common factor, judge that this anonymity circle does not meet privacy model.
4. the position anonymous methods of continuous-query according to claim 2, is characterized in that, in described step S6, the center of circle adjustment of anonymity circle is comprised:
Find out the inquiry of minimum abscissa and maximum abscissa in anonymous circle, and the inquiry of minimum ordinate and maximum ordinate;
Calculate the anonymous round heart to the poor x between the distance of the inquiry of minimum abscissa and the inquiry of maximum abscissa, and the anonymous round heart is to the poor y between the distance of the inquiry of minimum ordinate and the inquiry of maximum ordinate;
At [0, x], [0, y] produces random number respectively, and abscissa and the ordinate correspondence in the center of circle of described anonymous circle are adjusted to two produced random numbers.
5. the position anonymous methods of continuous-query according to claim 1, is characterized in that, in described step S5, the anonymous set of described candidate is formed to anonymous circle and comprises:
The described anonymous inquiry of take is the center of circle, and anonymity inquires the maximum of the distance between the anonymous inquiry integrating of candidate as radius, generates anonymous circle.
6. the anonymous device in the position of continuous-query, is characterized in that, comprising:
Quality model detection module, when receiving anonymous inquiry, detects and treats in anonymous query set that each not out of date treats anonymous inquiry, judges whether the described not out of date anonymous inquiry for the treatment of meets quality model;
The anonymous set of candidate acquisition module, for when described not out of date when anonymous inquiry meets quality model, will described in treat that anonymous inquiry inserts the anonymous set of candidate, until described in treat that anonymous inquiry for the treatment of in anonymous query set all detected;
Anonymous circle generation module, while spending for being more than or equal to default anonymity when the anonymous quantity of gathering inquiry of described candidate, forms anonymity circle by the anonymous set of described candidate;
Whether privacy model detection module, meet privacy model for detection of anonymity circle;
Center adjusting module, for when anonymous satisfactory sufficient privacy model being detected, adjusts the center of circle of anonymity circle, returns to anonymous circle.
7. the anonymous device in the position of continuous-query according to claim 1, is characterized in that, described quality model detection module is used for:
Calculate the area of a circle of described anonymity inquiry and the described not out of date distance for the treatment of anonymous inquiry and the angle that radius forms triangle hypotenuse and X-axis formation; When described angle is less than or equal to predetermined threshold value, judge that this not out of date anonymous inquiry for the treatment of meets quality model.
8. the anonymous device in the position of continuous-query according to claim 7, is characterized in that, described privacy model detection module comprises:
Calculate the possible position scope of each inquiry in life cycle in anonymous circle; When the possible position scope of all inquiries is not occured simultaneously, judge the satisfactory sufficient privacy model of this anonymity; When the possible position scope of all inquiries has common factor, judge that this anonymity circle does not meet privacy model.
9. the anonymous device in the position of continuous-query according to claim 7, is characterized in that, described center adjusting module is used for:
Find out the inquiry of minimum abscissa and maximum abscissa in anonymous circle, and the inquiry of minimum ordinate and maximum ordinate; Calculate the anonymous round heart to the poor x between the distance of the inquiry of minimum abscissa and the inquiry of maximum abscissa, and the anonymous round heart is to the poor y between the distance of the inquiry of minimum ordinate and the inquiry of maximum ordinate; At [0, x], [0, y] produces random number respectively, and abscissa and the ordinate correspondence in the center of circle of described anonymous circle are adjusted to two produced random numbers.
10. an intimacy protection system for continuous-query, comprises anonymous server and location database server, it is characterized in that, described anonymous server comprises storehouse, anonymous region, anonymous device and filter, wherein:
Storehouse, described anonymous region is for depositing the anonymous region generating in the continuous-query lifetime;
Described anonymous device is the anonymous device in the position described in claim 6-9 any one, generates anonymous region, and the anonymous region generating is sent to location database server for the position enquiring sending according to user;
Described filter filters for anonymous region Query Result corresponding to all inquiries that location database server is returned, and finds the positional information that described position enquiring is corresponding, and returns to user;
Described location database server is used for according to the positional information of all inquiry correspondences in anonymous region, and is back to anonymous server.
CN201310616970.XA 2013-11-27 2013-11-27 Position anonymous methods and device, the intimacy protection system of continuous-query Expired - Fee Related CN103596133B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310616970.XA CN103596133B (en) 2013-11-27 2013-11-27 Position anonymous methods and device, the intimacy protection system of continuous-query

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310616970.XA CN103596133B (en) 2013-11-27 2013-11-27 Position anonymous methods and device, the intimacy protection system of continuous-query

Publications (2)

Publication Number Publication Date
CN103596133A true CN103596133A (en) 2014-02-19
CN103596133B CN103596133B (en) 2017-10-31

Family

ID=50086081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310616970.XA Expired - Fee Related CN103596133B (en) 2013-11-27 2013-11-27 Position anonymous methods and device, the intimacy protection system of continuous-query

Country Status (1)

Country Link
CN (1) CN103596133B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009997A (en) * 2014-06-09 2014-08-27 东南大学 Road network environment position generalization method based on entropy
CN104486726A (en) * 2014-12-18 2015-04-01 东南大学 Road network environment location generalization method for protecting prospective location privacy of user
CN105512566A (en) * 2015-11-27 2016-04-20 电子科技大学 Health data privacy protection method based on K-anonymity
CN109446844A (en) * 2018-11-15 2019-03-08 北京信息科技大学 A kind of method for secret protection and system towards big data publication
CN110889049A (en) * 2019-12-09 2020-03-17 腾讯科技(深圳)有限公司 Position coordinate retrieval method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101866353A (en) * 2010-06-09 2010-10-20 孟小峰 Privacy continuous-query protection method based on location-based service
CN101873317A (en) * 2010-06-07 2010-10-27 孟小峰 Position privacy protection method for perceiving service quality
CN101909050A (en) * 2010-06-07 2010-12-08 孟小峰 Location privacy protection method for preventing location-dependent attack
CN102665207A (en) * 2012-05-08 2012-09-12 杭州电子科技大学 Method used for continuously inquiring hiding user position based on mobile terminal in LBS (location based service)

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873317A (en) * 2010-06-07 2010-10-27 孟小峰 Position privacy protection method for perceiving service quality
CN101909050A (en) * 2010-06-07 2010-12-08 孟小峰 Location privacy protection method for preventing location-dependent attack
CN101866353A (en) * 2010-06-09 2010-10-20 孟小峰 Privacy continuous-query protection method based on location-based service
CN102665207A (en) * 2012-05-08 2012-09-12 杭州电子科技大学 Method used for continuously inquiring hiding user position based on mobile terminal in LBS (location based service)

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
潘晓等: "基于位置服务中的连续查询隐私保护研究", 《计算机研究与发展》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104009997A (en) * 2014-06-09 2014-08-27 东南大学 Road network environment position generalization method based on entropy
CN104009997B (en) * 2014-06-09 2017-03-15 东南大学 A kind of extensive method in the road network environment position based on entropy
CN104486726A (en) * 2014-12-18 2015-04-01 东南大学 Road network environment location generalization method for protecting prospective location privacy of user
CN104486726B (en) * 2014-12-18 2015-09-16 东南大学 A kind of user of protection looks forward to the prospect the extensive method in road network environment position of location privacy
CN105512566A (en) * 2015-11-27 2016-04-20 电子科技大学 Health data privacy protection method based on K-anonymity
CN105512566B (en) * 2015-11-27 2018-07-31 电子科技大学 A kind of health data method for secret protection based on K- anonymities
CN109446844A (en) * 2018-11-15 2019-03-08 北京信息科技大学 A kind of method for secret protection and system towards big data publication
CN109446844B (en) * 2018-11-15 2020-06-05 北京信息科技大学 Privacy protection method and system for big data release
CN110889049A (en) * 2019-12-09 2020-03-17 腾讯科技(深圳)有限公司 Position coordinate retrieval method, device, equipment and medium
CN110889049B (en) * 2019-12-09 2023-03-24 腾讯科技(深圳)有限公司 Position coordinate retrieval method, device, equipment and medium

Also Published As

Publication number Publication date
CN103596133B (en) 2017-10-31

Similar Documents

Publication Publication Date Title
EP2130357B1 (en) Method for tracking credit card fraud
CN103596133A (en) Location anonymous method and device for continuous queries and privacy protection system
CN103874021B (en) Safety zone recognition methods, identification equipment and user terminal
Eun et al. Conditional privacy preserving security protocol for NFC applications
CN107251624B (en) Location determination of mobile devices
US20120196568A1 (en) System and Method for Locating a Mobile Subscriber Terminal When Roaming
US10885573B2 (en) Device association-based locating system and method
CN110765472B (en) Location privacy protection method based on block chain and distributed storage
CN108600304A (en) A kind of personalized location method for secret protection based on position k- anonymities
CN103037306A (en) Privacy protection method based on location service in scene of Internet of Things (IOT)
Peddinti et al. Cover locations: availing location-based services without revealing the location
JP6425076B2 (en) Personal identification information processing system and method based on position information
Tang et al. Long-term location privacy protection for location-based services in mobile cloud computing
CN109639419A (en) Cryptographic key protection method, cipher key storage device and terminal device
Elkhodr et al. A semantic obfuscation technique for the Internet of Things
Lohan et al. 5G positioning: Security and privacy aspects
Kuseler et al. Using geographical location as an authentication factor to enhance mCommerce applications on smartphones
CN110049432A (en) Electric car accesses position data acquisition method when power grid by charging station
EP1971177A1 (en) Method for implementing home zone application in mobile communication networks
Wazirali A Review on Privacy Preservation of Location-Based Services in Internet of Things.
CN105592109B (en) A kind of register method, equipment and system
Zurbarán et al. A survey on privacy in location-based services
Miura et al. A hybrid method of user privacy protection for location based services
Camenisch et al. Strengthening authentication with privacy-preserving location verification of mobile phones
Cheng et al. A user sensitive privacy-preserving location sharing system in mobile social networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171031

Termination date: 20201127