CN104009997A - Road network environment position generalization method based on entropy - Google Patents

Road network environment position generalization method based on entropy Download PDF

Info

Publication number
CN104009997A
CN104009997A CN201410252465.6A CN201410252465A CN104009997A CN 104009997 A CN104009997 A CN 104009997A CN 201410252465 A CN201410252465 A CN 201410252465A CN 104009997 A CN104009997 A CN 104009997A
Authority
CN
China
Prior art keywords
extensive
subnet
highway
limit
entropy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410252465.6A
Other languages
Chinese (zh)
Other versions
CN104009997B (en
Inventor
倪巍伟
马中希
陆介平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201410252465.6A priority Critical patent/CN104009997B/en
Publication of CN104009997A publication Critical patent/CN104009997A/en
Application granted granted Critical
Publication of CN104009997B publication Critical patent/CN104009997B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a road network environment position generalization method based on the entropy. The road network environment position generalization method based on the entropy comprises the following steps that a credible third party server stores road network information, a mobile user submits the position of the mobile user and privacy protection restraining conditions based on the entropy to the credible third party server, and the credible third party server generalizes the position of the mobile user according to the privacy protection restraining conditions based on the entropy of the user and generates a generalized road sub-network containing the position of the mobile user to replace the specific position of the user, so that the possibility that an attacker can reversely deduce the position of the user is lowered, and the privacy protection restraining based on the entropy of the mobile user is achieved. The road network environment position generalization method based on the entropy describes the restraining of the user on a mobile object in the generalized road sub-network on the aspect of the road distribution structure through the information entropy, and prevents the attacker from launching an attach through the mastered part of mobile object distribution information.

Description

A kind of extensive method in road network environment position based on entropy
Technical field
What the present invention relates to is a kind of extensive method of position coordinates, and what be specifically related to is the extensive method of the position coordinates of a kind of road network environment based on entropy.
Background technology
In recent years, the service of position-based information is widely used at computer application field, such as GPS navigation, spatial information inquiry etc.This class application majority needs mobile subscriber to configure can obtain the equipment (for example GPS terminal) of user site positional information (2 tie up latitude and longitude coordinates), mobile subscriber is by sending current position coordinates to service provider, service provider returns to the related service about location of mobile users, for example, mobile subscriber submits to server by its position coordinates and obtains several gas stations nearest apart from its position etc.Along with the growing interest of user to individual private data, mobile subscriber does not wish self accurate location coordinate to offer service provider, often take extensive rear position coordinates to offer service provider an extensive focus that becomes database and information security research of location of mobile users coordinate.
In conjunction with true network of highways environment, position coordinates is submitted to trusted third party's server by most employing of the extensive method in existing position, by trusted third party's server by extensive position coordinates for comprise this coordinate and meet the requirement of mobile object location personal secrets highway subnet realize hide, to ensure location of mobile users personal secrets.(k, l)-location privacy model of commonly using, requires extensive location of mobile users coordinate as meeting the highway subnet of following condition: (1) highway subnet comprises this position; (2) in highway subnet, at least comprise k-1 other mobile subscribers; (3) in highway subnet, at least comprise the different highway of l bar.Although (k, l)-location privacy model is by requiring highway subnet to comprise at least k mobile subscriber, and meet section l diversity requirement, ensure that the probability that inquiry's standard is navigated to certain section by assailant is no more than 1/k and 1/l.But there is following problem in this model: model lacks the constraint about section distribution characteristics in subnet to mobile object in extensive subnet, and making assailant utilize the distributed intelligence of grasped part mobile object to launch a offensive becomes possibility.
In the extensive research field of road network environment customer location, location privacy intensity refers to that assailant infers and user exact position or latched position is positioned at the complexity on certain road by background knowledge.
Summary of the invention
Technical problem: the object of the invention is to provide a kind of extensive method in road network environment position based on entropy that in the extensive subnet of user profile, mobile object retrains about section distribution characteristics in subnet that facilitates.
Technical scheme: the extensive method in road network environment position based on entropy of the present invention, comprises the following steps:
(1) mobile subscriber is to the server input current location u of trusted third party, extensive subnet Distribution Entropy threshold value d, and subnet comprises number of users threshold value k, and highway that subnet comprises is counted threshold value l, and three threshold values are positive integer;
(2) trusted third party's server is inquired about current location u place highway limit e in network of highways G, the extensive subnet highway of initialization limit S set be e}, wherein e} be current location u place highway limit e form set;
(3) if current extensive subnet highway limit S set meets to be comprised number of users and be less than number of users threshold value k, or in S set, highway limit number is less than highway and counts threshold value l, or extensive subnet Distribution Entropy D (S) is less than , proceed to step (4); Otherwise, proceed to step (6), Distribution Entropy when wherein extensive subnet Distribution Entropy D (S) represents that the set of extensive subnet corresponding sides is S;
(4) trusted third party's server in network of highways G, search all highways limit in the S set of current extensive subnet highway limit in abutting connection with highway limit e ', these set in abutting connection with highway limit e ' that find are designated as to R;
(5) set of computations R Zhong Meitiao highway limit e ' is incorporated to personal secrets/search efficiency factor F (S ∪ e ') of extensive subnet highway limit S set, choose in R personal secrets/search efficiency factor maximum and exist the highway limit e ' that user is located thereon to be incorporated to extensive subnet highway limit S set, after the extensive subnet highway limit S set that obtains upgrading, returning to step (3);
(6) trusted third party's server is by not highway limit deletion in S set in network of highways G, and residue subnet feeds back to user as the extensive subnet of position u.
In the present invention, wherein network of highways G can adopt non-directed graph representation, and shape is as G (V g, E g), wherein V grepresent the intersection point set of highway in network of highways, E grepresent the set in all sections in network of highways.
In the step (3) of the inventive method preferred version, extensive subnet Distribution Entropy wherein p (e) is the user distribution probability of highway limit e, highway limit e ∈ S, N (e) is for being positioned at the number of users on the e of highway limit.
In another preferred version of the inventive method, the personal secrets/search efficiency factor in step (5) distribution Entropy when wherein D (S ∪ e ') represents that the set of extensive subnet corresponding sides is S ∪ e ', | S ∪ e ' | be highway limit number in the S set ∪ e ' of extensive subnet highway limit.
Beneficial effect: the present invention is directed to the extensive application of road network environment customer location, realize that trusted third party server participates in by extensive customer location be highway subnet.The present invention compared with prior art, has the following advantages:
The present invention supports user to add constraint to mobile object in extensive rear highway subnet about section distribution characteristics in subnet, prevents that assailant from utilizing the grasped part mobile object distributed intelligence situation of launching a offensive to occur, and improves customer location secret protection fail safe.
The common extensive method based on (k, l) privacy model, allows user to input minimal user that extensive subnet comprises and counts the minimum highway that k and extensive subnet comprise and count l, realizes user about self-position and privacy of identities protection requirement.Extensive subnet is disclosed to potential assailant, and assailant can obtain node, the highway side information of the extensive subnet of composition, and the number of users information existing on Mei Tiao highway limit.Even if comprised at least k different user in extensive subnet, and these user distributions are on l bar highway limit at least.If these users are evenly distributed on Mei Tiao highway limit, assailant obviously can draw the more highway limit of those distributions user in extensive subnet, may be more the highway limit that proposes extensive request user (being the user of current location at u) place, thereby cause the leakage that proposes extensive request customer location and privacy of identities information.For example, if propose extensive request user input parameter k=10, l=4, if the final extensive subnet generating comprises 6 highway limits, the total number of users being positioned on Ge Tiao highway limit is 15, obviously this extensive subnet meets the constraint of user about k and l, if 15 users skewness on highway limit (is supposed, 15 users concentrate and are positioned on a certain highway limit, on all the other 5 highway limits, Mei Tiao highway limit only has a user), the possibility that assailant is positioned at the user who infers the extensive request of proposition on the highway limit of having concentrated 15 users is 75%.
The present invention divides entropy threshold parameter by introducing highway; the constraint that allows user to comprise user distribution uniformity coefficient on Ge Tiao highway limit to extensive rear subnet; set Distribution Entropy threshold value is larger; distribution in final extensive subnet on user Ge highway limit is more even; utilize the mobile object distributed intelligence situation of launching a offensive in grasped extensive subnet to occur thereby reduce assailant, improve customer location secret protection fail safe.When specific implementation, the present invention is by arranging personal secrets/search efficiency factor, that chooses personal secrets/search efficiency factor maximum adds extensive subnet in abutting connection with highway limit at every turn, personal secrets/search efficiency factor maximum means that this adds this highway limit in extensive subnet, the Distribution Entropy that makes user that extensive subnet comprises is increased to maximum, thereby ensure that the final extensive subnet size (comprising highway limit number) generating is less.
Brief description of the drawings
Fig. 1 is system framework figure of the present invention;
Fig. 2 is trusted third party of the present invention server process flow chart;
Fig. 3 is the network of highways schematic diagram of the embodiment of the present invention;
Fig. 4 is the extensive subnet schematic diagram of the embodiment of the present invention.
Embodiment
For technological means, creation characteristic that the present invention is realized, reach object and effect is easy to understand, below in conjunction with specific embodiment and Figure of description, further set forth the present invention.
Network of highways G as shown in Figure 3, by 14 nodes (empty circles), 19Tiao highway limit composition, the black circle correspondence on every limit is positioned at the mobile subscriber on this highway, has 16 users.Three threshold parameters are arranged by the user who proposes extensive request, are positive integer, and numerical value is larger, retrain byer force, and fail safe is higher.Mention extensive request user according to self to extensive rear subnet security requirement, k=4 is set, l=3, d=2, think that trusted third party's server finally comprises more than 4 user (containing this user self) in the extensive subnet of generation, subnet is made up of more than 3 highway limit, and extensive subnet Distribution Entropy is minimum is , meet it to self-position personal secrets protection requirement.
The extensive process of the present embodiment is as follows:
The 1st step. execution step (1), the user that position is u sends self-position u, parameter k=4, l=3, d=2 to trusted third party's server;
The 2nd step. execution step (2), trusted third party's whois lookup is to user u place highway limit n 13n 14, and S is initialized as to { n 13n 14;
The 3rd step. execution step (3), due to | S|=1<3, the highway limit number that meets composition subnet is less than 3, goes to step (4);
The 4th step. execution step (4), search highway limit n in S 13n 14in abutting connection with highway limit, and generate S in abutting connection with highway limit set R={n 8n 14, n 9n 14, n 6n 13;
The 5th step. execution step (5), set of computations R Zhong Meitiao highway limit e ' is incorporated to personal secrets/search efficiency factor F (S ∪ e ') of extensive subnet highway limit S set:
F ( S &cup; n 8 n 14 ) = 0.5 , F ( S &cup; n 9 n 14 ) = - ( ( 1 3 log 2 1 / 3 + 2 3 log 2 2 / 3 ) / 2 ) = 0.46 ,
F ( S &cup; n 6 n 13 ) = - ( ( 1 3 log 2 1 / 3 + 2 3 log 2 2 / 3 ) / 2 ) = 0.46
Select the highway limit n of personal secrets/search efficiency factor maximum 8n 14be incorporated to S set, now, S={n 13n 14, n 8n 14; Return to step (3);
The 6th step. execution step (3), due to | S|=2<3, N (S)=4, D (S)=1<4, meet in S mobile subscriber's sum on highway limit and be less than k, or in S, highway limit number is less than l, or extensive subnet Distribution Entropy condition, goes to step (4);
The 7th step. execution step (4), search highway limit in S in abutting connection with highway limit, generate S in abutting connection with highway limit set R={n 9n 14, n 6n 13, n 5n 8, n 2n 8;
The 8th step. execution step (5), set of computations R Zhong Meitiao highway limit e ' is incorporated to personal secrets/search efficiency factor F (S ∪ e ') of extensive subnet highway limit S set:
F(S∪n 9n 14)=0.51,F(S∪n 6n 13)=0.51,F(S∪n 5n 8)=0.53,F(S∪n 2n 8)=0.51
Select the highway limit n of personal secrets/search efficiency factor maximum 5n 8be incorporated to S, now S={n 13n 14, n 8n 14, n 5n 8; Again return to step (3);
The 9th step. execution step (3), due to D (S)=1.585<4, meet in S mobile subscriber's sum on highway limit and be less than k, or in S, highway limit number is less than l, or extensive subnet Distribution Entropy condition, goes to step (4);
The 10th step. execution step (4), search highway limit in S in abutting connection with highway limit, generate S in abutting connection with highway limit set R={n 9n 14, n 6n 13, n 5n 8, n 2n 8, n 1n 5, n 5n 6;
The 11st step. execution step (5), calculating R Zhong Meitiao highway limit e ' is incorporated to personal secrets/search efficiency factor F (S ∪ e ') of extensive subnet highway limit S set: highway limit n 1n 5corresponding maximum is 0.52, selects highway limit n 1n 5be incorporated to S, S={n 13n 14, n 8n 14, n 5n 8, n 1n 5, return to step (3);
The 12nd step. execution step (3), due to D (S)=2.07>2, and | S|=4>3, N (S)=8>4, do not meet in S mobile subscriber's sum on highway limit and be less than k, or in S, highway limit number is less than l, or extensive subnet Distribution Entropy condition, goes to step (6);
The 13rd step. execution step (6), trusted third party's server generates by n 13n 14, n 8n 14, n 5n 8, n 1n 5the extensive subnet of four edges composition replaces the particular location of user u.Position be u user extensive subnet as shown in Figure 4, form on every limit of extensive subnet number of users even, thereby can avoid assailant by user distribution different information on composition extensive subnet Ge highway limit, initiate the attack to u.
More than show and described technical scheme of the present invention, general principle and advantage.Should understand above-described embodiment only for the embodiment of technical solution of the present invention is described, limit the scope of the invention and be not used in.After having read the present invention, amendment and the replacement of those skilled in the art to various equivalents of the present invention all falls within the protection range that the application's claim limits.

Claims (3)

1. the extensive method in road network environment position based on entropy, is characterized in that, the method comprises following step:
(1) mobile subscriber is to the server input current location u of trusted third party, extensive subnet Distribution Entropy threshold value d, and subnet comprises number of users threshold value k, and highway that subnet comprises is counted threshold value l, and three described threshold values are positive integer;
(2) trusted third party's server is inquired about current location u place highway limit e in network of highways G, the extensive subnet highway of initialization limit S set be e}, wherein e} be current location u place highway limit e form set;
(3) if current extensive subnet highway limit S set meets to be comprised number of users and be less than number of users threshold value k, or in S set, highway limit number is less than highway and counts threshold value l, or extensive subnet Distribution Entropy D (S) is less than , proceed to step (4); Otherwise, proceed to step (6), Distribution Entropy when wherein extensive subnet Distribution Entropy D (S) represents that the set of extensive subnet corresponding sides is S;
(4) trusted third party's server in network of highways G, search all highways limit in the S set of current extensive subnet highway limit in abutting connection with highway limit e ', these set in abutting connection with highway limit e ' that find are designated as to R;
(5) set of computations R Zhong Meitiao highway limit e ' is incorporated to personal secrets/search efficiency factor F (S ∪ e ') of extensive subnet highway limit S set, choose in R personal secrets/search efficiency factor maximum and exist the highway limit e ' that user is located thereon to be incorporated to extensive subnet highway limit S set, after the extensive subnet highway limit S set that obtains upgrading, returning to step (3);
(6) trusted third party's server will not deleted on S set Zhong highway limit in network of highways G, and the extensive subnet using the residue subnet obtaining as position u feeds back to user.
2. the extensive method in road network environment position based on entropy according to claim 1, is characterized in that: in described step (3), and extensive subnet Distribution Entropy wherein p (e) is the user distribution probability of highway limit e, highway limit e ∈ S, N (e) is for being positioned at the number of users on the e of highway limit.
3. according to the extensive method in road network environment position based on entropy described in claim 1 or 2, it is characterized in that: the personal secrets/search efficiency factor in described step (5) distribution Entropy when wherein D (S ∪ e ') represents that the set of extensive subnet corresponding sides is S ∪ e ', | S ∪ e ' | be highway limit number in the S set ∪ e ' of extensive subnet highway limit.
CN201410252465.6A 2014-06-09 2014-06-09 A kind of extensive method in the road network environment position based on entropy Active CN104009997B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410252465.6A CN104009997B (en) 2014-06-09 2014-06-09 A kind of extensive method in the road network environment position based on entropy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410252465.6A CN104009997B (en) 2014-06-09 2014-06-09 A kind of extensive method in the road network environment position based on entropy

Publications (2)

Publication Number Publication Date
CN104009997A true CN104009997A (en) 2014-08-27
CN104009997B CN104009997B (en) 2017-03-15

Family

ID=51370491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410252465.6A Active CN104009997B (en) 2014-06-09 2014-06-09 A kind of extensive method in the road network environment position based on entropy

Country Status (1)

Country Link
CN (1) CN104009997B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486726A (en) * 2014-12-18 2015-04-01 东南大学 Road network environment location generalization method for protecting prospective location privacy of user
CN107169372A (en) * 2017-05-10 2017-09-15 东南大学 Privacy protection enquiring method based on Voronoi polygons Yu Hilbert curve encodings
CN111556437A (en) * 2020-05-12 2020-08-18 重庆邮电大学 Personalized position privacy protection method based on differential privacy

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2017790A2 (en) * 2007-07-16 2009-01-21 Charles Graham Palmer Position-based charging
CN103281672A (en) * 2013-06-08 2013-09-04 南京大学 Method for protecting position privacy by mobile terminals
CN103596133A (en) * 2013-11-27 2014-02-19 哈尔滨工业大学深圳研究生院 Location anonymous method and device for continuous queries and privacy protection system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2017790A2 (en) * 2007-07-16 2009-01-21 Charles Graham Palmer Position-based charging
CN103281672A (en) * 2013-06-08 2013-09-04 南京大学 Method for protecting position privacy by mobile terminals
CN103596133A (en) * 2013-11-27 2014-02-19 哈尔滨工业大学深圳研究生院 Location anonymous method and device for continuous queries and privacy protection system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486726A (en) * 2014-12-18 2015-04-01 东南大学 Road network environment location generalization method for protecting prospective location privacy of user
CN104486726B (en) * 2014-12-18 2015-09-16 东南大学 A kind of user of protection looks forward to the prospect the extensive method in road network environment position of location privacy
CN107169372A (en) * 2017-05-10 2017-09-15 东南大学 Privacy protection enquiring method based on Voronoi polygons Yu Hilbert curve encodings
CN107169372B (en) * 2017-05-10 2020-04-14 东南大学 Privacy protection query method based on Voronoi polygon and Hilbert curve coding
CN111556437A (en) * 2020-05-12 2020-08-18 重庆邮电大学 Personalized position privacy protection method based on differential privacy

Also Published As

Publication number Publication date
CN104009997B (en) 2017-03-15

Similar Documents

Publication Publication Date Title
Wicker The loss of location privacy in the cellular age
CN110602145B (en) Track privacy protection method based on location-based service
CN104394509A (en) High-efficiency difference disturbance location privacy protection system and method
CN104080081B (en) A kind of space de-identification method suitable for mobile terminal location privacy protection
US20110119222A1 (en) Method of building a database of mobile device beacon locations
Lin et al. A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing
Long et al. Output-feedback stabilisation for a class of switched nonlinear systems with unknown control coefficients
CN104009997A (en) Road network environment position generalization method based on entropy
Li et al. DALP: A demand‐aware location privacy protection scheme in continuous location‐based services
CN104717292A (en) Position privacy protection method combining k-anonymity and cloud end
CN104486726B (en) A kind of user of protection looks forward to the prospect the extensive method in road network environment position of location privacy
Poolsappasit et al. Towards Achieving Personalized Privacy for Location-Based Services.
Lin et al. Protecting location privacy and query privacy: a combined clustering approach
CN113312635A (en) Multi-agent fault-tolerant consistency method and system based on state privacy protection
Liao et al. Towards location and trajectory privacy preservation in 5G vehicular social network
CN105095454A (en) Method and system for directional pushing of user-defined two-dimensional code
CN105657195A (en) Method and device for determining service area corresponding to communication account of salesman
CN105119977A (en) Method and system for information transmission based on geographic coordinates and time interval
Clemente A privacy-preserving recommender system for mobile commerce
Miura et al. Evaluation of a hybrid method of user location anonymization
Daras On the mathematical definition of cyberspace
Reynolds Getting tactical communications for land forces right
Liu et al. A real‐time privacy‐preserving scheme based on grouping queries for continuous location‐based services
Ye et al. Verifiable outsourcing of high-degree polynomials and its application in keyword search
Wang et al. An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant