CN104618896B - A kind of location-based service method for secret protection and system based on mesh-density - Google Patents

A kind of location-based service method for secret protection and system based on mesh-density Download PDF

Info

Publication number
CN104618896B
CN104618896B CN201510006262.3A CN201510006262A CN104618896B CN 104618896 B CN104618896 B CN 104618896B CN 201510006262 A CN201510006262 A CN 201510006262A CN 104618896 B CN104618896 B CN 104618896B
Authority
CN
China
Prior art keywords
user
location
anonymous
secret protection
assumed name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510006262.3A
Other languages
Chinese (zh)
Other versions
CN104618896A (en
Inventor
武发明
刘佩林
潘常春
郁文贤
邹耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MEDIASOC TECHNOLOGIES Co Ltd
Shanghai Jiaotong University
Original Assignee
MEDIASOC TECHNOLOGIES Co Ltd
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MEDIASOC TECHNOLOGIES Co Ltd, Shanghai Jiaotong University filed Critical MEDIASOC TECHNOLOGIES Co Ltd
Priority to CN201510006262.3A priority Critical patent/CN104618896B/en
Publication of CN104618896A publication Critical patent/CN104618896A/en
Application granted granted Critical
Publication of CN104618896B publication Critical patent/CN104618896B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of location-based service method for secret protection and system based on mesh-density, secret protection server receives the position enquiring request of user;Secret protection server is based on mesh-density model foundation and safeguards user status table and block information table;Section search algorithm, which is included, by the use of the minimum based on grid finds the k neighboring regions for covering the user as location fuzzy region;Then assumed name is assigned to the inquiry request of user, the assumed name closing on user to high risk according to measuring track privacy swaps;Inquiry request is finally transmitted to location based service provider server, and the query result of acquisition is returned to inquiry user after filtering.

Description

A kind of location-based service method for secret protection and system based on mesh-density
Technical field
The present invention relates to field of communication technology, more particularly to a kind of location-based service method for secret protection based on mesh-density And system.
Background technology
In recent years, as mobile communication terminates, the development of technology of Internet of things and GIS-Geographic Information System, location based service Application it is more and more.For popular, location based service(Location Based Service, LBS)It is exactly that user is led to Cross the location information that one group of location technology obtains mobile terminal(Such as latitude and longitude coordinates), position is carried out using mobile communications network Relevant service request obtains location-based service manufacturer and is supplied to mobile subscriber or the various and position of other people and communication system Put relevant service.Location-based service has a wide range of applications in position positioning, path navigation, inquiry, identification, detection etc., It is known as one of most dazzling service mode of mobile Internet.
However the commercialization of location-based service is popularized while bringing huge convenient to people's life, wherein hiding safety is hidden Private leakage problem also gradually reveals.In location-based service, location-based service side can obtain the location information of mobile subscriber, body Part indications and inquiry content etc..If it is " untrustworthy ", if any the custom for collecting user data or by user data Gray behavior etc. is sold to, the location information of user is i.e. it is possible that be leaked in " unique " attacker's hand.Pass through The means such as data mining, pattern-recognition, with reference to certain background knowledge, attacker can obtain simultaneously user location information and Identity, and then the individual privacy informations such as behavioural habits, hobby, physical condition and political religious belief for deducing user.
How privacy leakage in location-based service, i.e. protective position privacy are taken precautions against, and having become LBS development and applications, there is an urgent need for solutions One of key problem certainly.For this problem, begin one's study early in domestic and foreign scholars in 2002, propose in succession:Privacy The methods of agreement, space-time anonymity, identity anonymous, dummy location interference, specific road sign replacement, routing forwarding agreement.However, at present Most methods because computation complexity is high, communication overhead is big or the reasons such as special equipment is required to be difficult to live in actual production Middle use.
In addition, if mobile subscriber, continuously using location-based service, the location information continuously uploaded has the when Kongxiang of height Guan Xing, in this case, attacker obtain specific user more easily by multiple target tracking, the matched mode of critical path point Exclusive track, and then speculate user identity, invade privacy of user.Therefore, location privacy protection is taken into account there is an urgent need for a kind of system Effect and location-based service quality, while the method for secret protection of compatible continuous position service request.
Invention content
The present invention provides a kind of location-based service privacy based on mesh-density for deficiencies of the prior art Guard method, the invention is realized by the following technical scheme:
A kind of location-based service method for secret protection based on mesh-density, positional number is accessed by secret protection server According to library server, including step:
S1, by secret protection server the region division of responsible position enquiring request be net region, establish user's shape State table establishes block information table for safeguarding grid regions intra domain user, sensitivity for safeguarding privacy of user configuration and location status Target information;
S2, secret protection server receive position enquiring request, update user status table and block information table;
S3, section finding method is included as position enquiring using minimum in the location fuzzy module of secret protection server Anonymous section is found in request;
S4, assumed name is assigned for position enquiring request in the dynamic assumed name module of secret protection server, it is hidden carries out track Private measurement by high risk user assumed name and adjacent user's assumed name into row stochastic exchange, preserves the corresponding letter of assumed name-user identity Breath;
Position enquiring request after anonymity is sent to location database server, positional number by S5, secret protection server Progress service response asks assumed name according to fuzzy region according to library server, secret protection clothes will be soon back to after query result Business device;
S6, secret protection server filtering module find request user identity, carry out assumed name-user identity translation and look for To the corresponding location information of its position enquiring, corresponding user is returned to.
Preferably, dynamic anonymity information when the static privacy profile and system operation of user status table record user preset, Static privacy profile include Customs Assigned Number, success it is anonymous required by surrounding user number, minimum anonymous radius, it is maximum allowable partially Difference, assumed name access times reference value, maximum anonymous delay;Dynamic anonymity information includes anonymous zone domain centre coordinate, anonymous region Radius, anonymous delay, assumed name access times;User status table is indexed by Customs Assigned Number.
Preferably, block information table includes number of users, area in block number, block centre coordinate, patch radii, block Sensitive target number in block, any active ues number collection in block, are indexed by block number.
Preferably, the minimum of step S3 includes comprising section finding method:
It asks to find anonymous region for position enquiring, number of users in region is made to reach around the successful anonymity that user is configured Number of users K according to the size of K values, is divided into Mesh expansion method and grid contraction method;
Using Mesh expansion method, initial anonymity region grid where user, if anonymous region when K values are less than predetermined value Interior number of users is not up to K, calculates the number of user in overseas one grid distance of four direction up and down in anonymous zone, chooses and uses The most direction of amount is expanded, i.e., anonymous region increases a grid distance upwards in most user sides, repeats this process It is more than or equal to K to anonymous zone intra domain user number;
Using grid contraction method when K values are more than or equal to predetermined value, initial anonymity region is the maximum allowable deviation model of user Interior all grids are enclosed, if anonymous zone intra domain user number is more than K, calculate in anonymous region one grid of four direction up and down Number apart from interior user is chosen the minimum direction of number of users and is shunk, i.e., anonymous region reduces on minimal user direction One grid distance repeats this process and is less than or equal to K to anonymous zone intra domain user number.
Preferably, the measuring track privacy of step S4 includes:
Track privacy disclosure risk is quantified, is divided into historical factors, velocity factor, envirment factor and the number factor four Point:The attenuation that historical factors characterization track privacy flows at any time, the smaller disclosure risk in interval of adjacent Twice requests are higher;Speed Spend influence of the factor table sign user moving speed to track privacy, the evolution between neighbor request is bigger, and risk is higher;Ring The border factor characterizes the dense degree of surrounding user at this time;The number factor weighs the influence of current assumed name access times, same assumed name Access times more higher it is easier leakage user track privacy;Track privacy is the tired of the product of each factor and Factor Weight coefficient Add.
It is hidden separately to provide a kind of location-based service based on mesh-density for deficiencies of the prior art by the present invention Private protection system, the invention is realized by the following technical scheme:
A kind of location-based service intimacy protection system based on mesh-density, positional number is accessed by secret protection server According to library server, secret protection server includes:
Location fuzzy module, to find suitable anonymous region, accurate position coordinates in being asked instead of position enquiring;
Dynamic assumed name module, to ask to assign assumed name, and need to carry out assumed name according to secret protection for position enquiring Dynamic adjustment;
Filtering module, the query result to be returned to position database server are filtered;
Location database server is back to ask the position enquiring comprising anonymous region progress service response Secret protection server.
The present invention has as follows a little compared to the prior art:
1)The present invention by the control of location privacy disclosure risk due to concentrating on believable secret protection server, location-based service Quotient can not obtain the accurate location information of user and identity information, be effectively reduced leakage wind of the location privacy in position server-side Danger is in face of the increasing effective means of location-based service quotient being difficult to rely on.
2)The present invention is due to the use of the location fuzzy algorithm based on grid, and simple in structure, overhead is small.According to configuration Surrounding user number, sensitive queries number of targets, the maximum parameters such as blur radius and least confusion radius find fuzzy region, reach use The controllable effect of family secret protection.And the spatial character due to trellis algorithm in itself, it can readily be extended to distribution In system, you can large area is divided into several rectangular areas, every secret protection server is responsible in a rectangular area Secret protection service.
3)The present invention constantly converts identity due to the use of dynamic assumed name for high privacy leakage risk subscribers, realizes more effective Identity anonymous has cut off the message of subscriber identity information and space time information, solves in continuous position requests situation due to length Privacy of user leakage problem caused by time assumed name improves the degree of privacy of user.
Description of the drawings
Fig. 1 is the system module composition figure of the location privacy protection method the present invention is based on mesh-density;
Fig. 2 is the frame diagram of secret protection server in the location privacy protection method the present invention is based on mesh-density;
Fig. 3 is grid data model schematic in the location privacy protection method the present invention is based on mesh-density;
Fig. 4 is that block information represents to be intended in the location privacy protection method the present invention is based on mesh-density;
Shown in fig. 5 is user status table schematic diagram in the location privacy protection method the present invention is based on mesh-density;
Fig. 6 is minimum comprising the signal of section finding method in the location privacy protection method the present invention is based on mesh-density Figure;
Fig. 7 is dynamic assumed name method schematic diagram in the location privacy protection method the present invention is based on mesh-density.
Specific embodiment
Below with reference to the attached drawing of the present invention, clear, complete description is carried out to the technical solution in the embodiment of the present invention And discussion, it is clear that as described herein is only a part of example of the present invention, is not whole examples, based on the present invention In embodiment, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to protection scope of the present invention.
For the ease of the understanding to the embodiment of the present invention, make further by taking specific embodiment as an example below in conjunction with attached drawing It illustrates, and each embodiment does not form the restriction to the embodiment of the present invention.
The system of location privacy protection based on mesh-density(Abbreviation this system).
Such as Fig. 1, this system includes secret protection server and location database server, and front and rear unicom successively, wherein Secret protection server includes location fuzzy module, dynamic assumed name module and result filtering module;Whole system data flow:
Terminal user sends out position enquiring request, and request is sent to secret protection server;
Location fuzzy algorithm of the location fuzzy module operation based on grid of secret protection server, is each trusted users Inquiry request find a fuzzy region so that in the region any active ues number be more than user configuration surrounding user number, Surrounding's sensitive queries number that number of targets is more than configuration is inquired, request is then transferred to dynamic assumed name module;
The dynamic assumed name algorithm that the dynamic assumed name module operation of secret protection server is exchanged comprising assumed name is each credible User assigns dynamic assumed name, that is, is judging when privacy leakage risk improves caused by assumed name is used continuously, by closing on user The random mode for exchanging assumed name, decoupling user's space trace information are associated with identity information, and the continuous-query for reducing user is hidden Private disclosure risk, and the request after anonymity is sent to location database server;
Location database server carries out service response to anonymous request, by the result set of corresponding fuzzy region assumed name request It is back to secret protection server;
The result filtering module of secret protection server determines user corresponding to service response, according to user location to result Collection is filtered, and finds out user's information needed, and final result is back to terminal user;
Wherein location privacy protection server is the core of this system, and frame diagram is as shown in Fig. 2, in position obfuscation module On the basis of dynamic assumed name module, also comprising location database, identity assumed name relational database, privacy of user configuration data Library, block information table, user status table and waiting list, multidate information when being run for maintenance system.
Location privacy protection method based on mesh-density(Abbreviation this method).
In GIS-Geographic Information System, mesh-density model because data are simple in structure, access the advantages such as rapid, of low cost, Often it is used to storage analysis space data characteristics.In mesh-density model, space is divided into grid, each grid position by Place mesh row row number is indexed, and the value of grid represents the type or state of object on this position.This algorithm is then adopted based on this With following basic thought:
It is m*n grids by the space reflection that anonymous server is responsible for, establishes and safeguard net region state table, element in table Record any active ues quantity in each grid, the quantity that Adds User, Customs Assigned Number, sensitive identification number(Hospital, bank, police station, School etc.)Etc. information, by table position number be indexed;
When each inquiry request reaches or when rejecting the user location state more than effective time, net region is updated Corresponding information entry in state table;
Treating different location-based service applications in view of different users has different secret protection demands, simultaneously for Each user needs to record its assumed name use state, establishes user configuration state table, loads and obtained from user configuration database Privacy profile and current user state information.
Spatial user, the distribution relative density of sensitive identification and field are saved since mesh-density model is relatively accurate Other users state, running position fuzzy algorithmic approach can find fuzzy region with fast and low-cost on its basis, while be suitble to Opportunity conveniently finds adjacent user and carries out dynamic assumed name swap operation, simplified grid model, net region state table and use Family configuration status table is as shown in Figures 3 to 5.
Location fuzzy algorithm based on grid(Abbreviation fuzzy algorithmic approach).
Such as Fig. 6, the workflow of this algorithm is:
1)For newly-increased user's inquiry request, the surrounding user number k of its configuration and surrounding sensitive queries number l is read(Figure It is request a in example, for convenience of only this index of signal surrounding user number, reading numerical values 8);
2)Grid where fuzzy region is initialized as reads in fuzzy region comprising any active ues number m, compares constituency Active users m and configuration surrounding user number k in domain;
3)If m has been selected to be less than k, mesh expansion is carried out, considers four direction 1 sizing grid of each self expandable of favored area Increasable any active ues number is chosen the maximum as mesh expansion direction, is repeated 2. 3. until m is not less than k;
4)If m has been selected to be more than or equal to k, fuzzy region determines comprising any active ues used in network selection lattice, that is, to find Any active ues point in one all selection grid of circle covering;
5)Calculate the center of fuzzy region and radius r;
6)Check relationship between blur radius r and minimum anonymity the radius Rmin and Rmax of user configuration:If r < Rmin, Expand r to Rmin, the success of this fuzzy operation;If Rmin≤r≤Rmax is not required to adjust, obscure successfully;If r > Rmax, this Fuzzy operation fails, and into waiting list, algorithm next time is waited for run;
7)The fuzzy region centre coordinate of the anonymous inquiry request of success and zone radius output, algorithm are terminated.
The dynamic assumed name algorithm exchanged based on assumed name(Abbreviation assumed name algorithm).
Distribution assumed name is initialized for each user, safeguards Customs Assigned Number table corresponding with the matching of pseudonymity;If user connects Continuous position enquiring request, for each request, according to user's assumed name service life, user location inquiry request interval, How much grade factors quantizations privacy of user disclosure risks of user's physical location displacement;
If the privacy leakage risk of user is more than threshold value after certain position enquiring, distance is found out in peripheral region and approaches and lets out The higher user in danger that divulges a secret forms mixing collection, to the assumed name of user in mixing collection into row stochastic exchange, and re-quantization user Privacy leakage risk.
Track privacy disclosure risk is quantified, is divided into historical factors, velocity factor, envirment factor and the number factor four Point:The attenuation that historical factors characterization track privacy flows at any time, the smaller disclosure risk in interval of adjacent Twice requests are higher;Speed Spend influence of the factor table sign user moving speed to track privacy, the evolution between neighbor request is bigger, and risk is higher;Ring The border factor characterizes the dense degree of surrounding user at this time;The number factor weighs the influence of current assumed name access times, same assumed name Access times more higher it is easier leakage user track privacy;Track privacy is the tired of the product of each factor and Factor Weight coefficient Add.
Such as Fig. 7, a simplified assumed name interchange process is simulated, solid line represents the real trace of user, and dotted line represents tracking Assumed name track, it can be seen that for user 10, initial assumed name is A;Vacation random twice was carried out in continuous position enquiring Name exchanges, and is not exchanged in Mixed Zone 1, and it is E that assumed name is exchanged in Mixed Zone 2;At this point for location-based service quotient, if along same Assumed name(Dotted line represents)User 10 is tracked, the path of mistake will be obtained, therefore reach the trace information of user 10 With the purpose of identity information decoupling.
The location privacy protection method based on mesh-density of the present invention specifically includes step:
Position enquiring space handled by secret protection server is divided into the mesh space of m × n by S1, preparation, User status table is established for safeguarding privacy of user configuration and location status, establishes block information table for safeguarding in net region User, sensitive target information;
Dynamic anonymity information when user status table records the static privacy profile and system operation of user preset, static privacy Surrounding user number, minimum anonymous radius, maximum allowable deviation, the assumed name that configuration includes required by Customs Assigned Number, success anonymity make With number reference value, maximum anonymous delay;Dynamic anonymity information includes anonymous zone domain centre coordinate, anonymous zone radius, anonymity Delay, assumed name access times;User status table is indexed by Customs Assigned Number;Block information table includes block number, block Centre coordinate, patch radii, number of users in block, sensitive target number in block, any active ues number collection in block, pass through area Block number is indexed;
S2, the position enquiring of reception is asked, the privacy profile of user is loaded according to Customs Assigned Number, is sat according to its position Grid number where mark calculates updates in user status table the grid number entry in the User Status and block information table;
S3, running position fuzzy algorithmic approach find the fuzzy region of inquiry request by mesh expansion or grid contraction, make mould Any active ues number included in paste region is more than or equal to the surrounding user number K that user is configured, and inquiry number of targets is more than or equal to The sensitive queries Information Number L that user is configured;
It asks to find anonymous region for position enquiring, number of users in region is made to reach around the successful anonymity that user is configured Number of users K according to the size of K values, is divided into Mesh expansion method and grid contraction method;
Using Mesh expansion method, initial anonymity region grid where user, if anonymous region when K values are less than predetermined value Interior number of users is not up to K, calculates the number of user in overseas one grid distance of four direction up and down in anonymous zone, chooses and uses The most direction of amount is expanded, i.e., anonymous region increases a grid distance upwards in most user sides, repeats this process It is more than or equal to K to anonymous zone intra domain user number;
Using grid contraction method when K values are more than or equal to predetermined value, initial anonymity region is the maximum allowable deviation model of user Interior all grids are enclosed, if anonymous zone intra domain user number is more than K, calculate in anonymous region one grid of four direction up and down Number apart from interior user is chosen the minimum direction of number of users and is shunk, i.e., anonymous region reduces on minimal user direction One grid distance repeats this process and is less than or equal to K to anonymous zone intra domain user number;
S4, dynamic assumed name module are that the inquiry request after obscuring provides assumed name, and maintenance terminal number assumed name corresponds to table:For The inquiry request newly entered not in table assigns random assumed name, and correspondence is preserved to number assumed name and is corresponded in table;It is right In Customs Assigned Number, the inquiry request in table, i.e., continuous inquiry request calculate track privacy according to quantization risk model and let out Divulge a secret dangerous X;
Track privacy disclosure risk is quantified, is divided into historical factors, velocity factor, envirment factor and the number factor four Point:The attenuation that historical factors characterization track privacy flows at any time, the smaller disclosure risk in interval of adjacent Twice requests are higher;Speed Spend influence of the factor table sign user moving speed to track privacy, the evolution between neighbor request is bigger, and risk is higher;Ring The border factor characterizes the dense degree of surrounding user at this time;The number factor weighs the influence of current assumed name access times, same assumed name Access times more higher it is easier leakage user track privacy;Track privacy is the tired of the product of each factor and Factor Weight coefficient Add;
S5, for the obtained track privacy disclosure risk X of quantum chemical method in S4, by itself and preset disclosure risk threshold value Y compares, if X < Y, it is believed that track disclosure risk is still in controllable;If X > Y, track privacy disclosure risk is excessively high, Dynamic assumed name exchange algorithm need to be used to reduce privacy leakage risk;
S6, for referring to that dynamic assumed name exchanges in S5, specially residing for the inquiry request in grid or adjacent mesh is sought The other users for looking for track privacy disclosure risk higher, and the exchange of random progress user's assumed name, and assumed name is exchanged and is recorded Into assumed name translation table;
S7, by by location fuzzy and dynamic assumed name processing enhancing after inquiry request be sent to location server, position Server responds position inquiry request, and service is back to location privacy protection server;
According to the assumed name translation table described in S6, the assumed name in being returned to service is translated for S8, secret protection server, Obtain asking it is subscriber-coded, and will service echo-plex to the mobile terminal of the user in.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, the change or replacement that can be readily occurred in, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with scope of the claims Subject to.

Claims (4)

1. a kind of location-based service method for secret protection based on mesh-density, which is characterized in that by secret protection server come Location database server is accessed, including step:
S1, by secret protection server the region division of responsible position enquiring request be net region, establish user status table For safeguarding privacy of user configuration and location status, block information table is established for safeguarding grid regions intra domain user, sensitive target Information;
S2, secret protection server receive position enquiring request, the privacy profile of user are loaded according to Customs Assigned Number, according to its position Grid number where coordinate calculates is put, updates in user status table the grid coding strip in the User Status and block information table Mesh;
S3, it is asked in the location fuzzy module of secret protection server using minimum comprising section finding method for position enquiring Find anonymous section;
S4, assumed name is assigned for position enquiring request in the dynamic assumed name module of secret protection server, carries out track privacy degree Amount by high risk user assumed name and adjacent user's assumed name into row stochastic exchange, preserves the corresponding informance of assumed name-user identity;
Position enquiring request after anonymity is sent to location database server, location database by S5, secret protection server Server asks assumed name according to fuzzy region to carry out service response, secret protection service will be soon back to after query result Device;
S6, secret protection server filtering module find request user identity, carry out assumed name-user identity translation and find it The corresponding location information of position enquiring, returns to corresponding user;Wherein:
Measuring track privacy described in step S4 includes:Track privacy disclosure risk is quantified, be divided into historical factors, speed because Son, four part of envirment factor and the number factor:The attenuation that historical factors characterization track privacy flows at any time, adjacent Twice requests The smaller disclosure risk in interval it is higher;Velocity factor characterizes influence of the user moving speed to track privacy, between neighbor request Evolution it is bigger, risk is higher;Envirment factor characterizes the dense degree of surrounding user at this time;The number factor is weighed current false Name access times influence, same assumed name access times more higher it is easier leakage user track privacy;Track privacy for it is each because Son is cumulative with the product of Factor Weight coefficient.
2. the location-based service method for secret protection according to claim 1 based on mesh-density, which is characterized in that the use Dynamic anonymity information when the static privacy profile and system operation of family state table record user preset, static privacy profile include using Surrounding user number, minimum anonymous radius required by family number, success are anonymous, maximum allowable deviation, the reference of assumed name access times Value, maximum anonymous delay;The dynamic anonymity information includes anonymous zone domain centre coordinate, anonymous zone radius, anonymous delay, vacation Name access times;The user status table is indexed by Customs Assigned Number.
3. the location-based service method for secret protection according to claim 1 based on mesh-density, which is characterized in that the area Block information table includes block number, block centre coordinate, patch radii, number of users in block, sensitive target number, area in block Any active ues number collection, is indexed by block number in block.
4. the location-based service method for secret protection according to claim 1 based on mesh-density, which is characterized in that step S3 The minimum includes comprising section finding method:
It asks to find anonymous region for position enquiring, number of users in region is made to reach the successful anonymity surrounding user that user is configured Number K, according to the size of K values, is divided into Mesh expansion method and grid contraction method;
Using Mesh expansion method, initial anonymity region grid where user, if being used in anonymous region when K values are less than predetermined value Amount is not up to K, calculates the number of user in overseas one grid distance of four direction up and down in anonymous zone, chooses number of users Most directions are expanded, i.e., anonymous region increases a grid distance upwards in most user sides, repeat this process to arriving Anonymous zone intra domain user number is more than or equal to K;
Using grid contraction method when K values are more than or equal to predetermined value, initial anonymity region is in the maximum allowable deviation range of user All grids, if anonymous zone intra domain user number is more than K, calculate in anonymous region one grid distance of four direction up and down The number of interior user is chosen the minimum direction of number of users and is shunk, i.e., anonymous region reduces one on minimal user direction Grid distance repeats this process and is less than or equal to K to anonymous zone intra domain user number.
CN201510006262.3A 2015-01-07 2015-01-07 A kind of location-based service method for secret protection and system based on mesh-density Active CN104618896B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510006262.3A CN104618896B (en) 2015-01-07 2015-01-07 A kind of location-based service method for secret protection and system based on mesh-density

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510006262.3A CN104618896B (en) 2015-01-07 2015-01-07 A kind of location-based service method for secret protection and system based on mesh-density

Publications (2)

Publication Number Publication Date
CN104618896A CN104618896A (en) 2015-05-13
CN104618896B true CN104618896B (en) 2018-07-03

Family

ID=53153130

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510006262.3A Active CN104618896B (en) 2015-01-07 2015-01-07 A kind of location-based service method for secret protection and system based on mesh-density

Country Status (1)

Country Link
CN (1) CN104618896B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106649359B (en) * 2015-10-30 2021-05-18 方正国际软件(北京)有限公司 Method and device for processing spatial point data
CN105610898B (en) * 2015-11-30 2018-11-13 苏州大学 A kind of location privacy protection method based on lattice
CN106059988B (en) * 2015-12-16 2019-03-12 湖南科技大学 Method for protecting track privacy based on location-based service
CN105578412B (en) * 2015-12-21 2018-11-27 东北大学 A kind of position anonymous methods and system based on location-based service
CN105701418B (en) * 2016-01-15 2018-08-14 西安交通大学 A kind of user trajectory method for secret protection based on spatial sequence data analysis
CN105681320B (en) * 2016-02-24 2018-12-28 重庆邮电大学 A kind of assumed name dynamic creation method based on location fuzzy
CN107360121B (en) * 2016-05-10 2019-06-04 北京京东尚科信息技术有限公司 Customer position information guard method and device
CN105847227A (en) * 2016-06-23 2016-08-10 国家电网公司 Privacy protection method for mobile electric power inspection system
CN108632237A (en) * 2017-09-15 2018-10-09 湖南科技大学 A kind of position service method based on the anonymity of more Anonymizers
CN107995205B (en) * 2017-12-12 2020-03-17 西安交通大学 Self-adaptive k-anonymization rasterization method for personnel density guidance
CN108734022B (en) * 2018-04-03 2021-07-02 安徽师范大学 Privacy protection track data publishing method based on three-dimensional grid division
CN109413067B (en) * 2018-10-29 2021-06-15 福建师范大学 Query track privacy protection method
CN109525933B (en) * 2018-11-16 2020-02-04 中国科学院信息工程研究所 Location privacy protection method and device
CN111221924B (en) * 2018-11-23 2023-04-11 腾讯科技(深圳)有限公司 Data processing method, device, storage medium and network equipment
CN109729077B (en) * 2018-12-20 2021-03-23 西安电子科技大学 Privacy protection method based on dynamic position association
CN111447546A (en) * 2019-03-01 2020-07-24 维沃移动通信有限公司 Control method and communication unit for location service
CN111083631B (en) * 2019-12-02 2020-11-03 兰州交通大学 Efficient query processing method for protecting location privacy and query privacy
JPWO2021131999A1 (en) * 2019-12-24 2021-07-01
CN112241552B (en) * 2020-10-15 2021-09-24 海南大学 Essential computing and reasoning-oriented DIKW-crossing modal privacy resource protection method
CN114021034A (en) * 2021-10-22 2022-02-08 广东电网有限责任公司广州供电局 Location service request method, location service request device, location service server and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834861A (en) * 2010-04-16 2010-09-15 华中师范大学 Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
CN101866353A (en) * 2010-06-09 2010-10-20 孟小峰 Privacy continuous-query protection method based on location-based service
CN101895866A (en) * 2010-04-16 2010-11-24 华中师范大学 Method for measuring track privacy in location-based service
CN102892073A (en) * 2012-09-11 2013-01-23 北京航空航天大学 Continuous query oriented location anonymizing method applicable to location service system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834861A (en) * 2010-04-16 2010-09-15 华中师范大学 Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
CN101895866A (en) * 2010-04-16 2010-11-24 华中师范大学 Method for measuring track privacy in location-based service
CN101866353A (en) * 2010-06-09 2010-10-20 孟小峰 Privacy continuous-query protection method based on location-based service
CN102892073A (en) * 2012-09-11 2013-01-23 北京航空航天大学 Continuous query oriented location anonymizing method applicable to location service system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Pseudonym exchange for privacy-preserving publishing of trajectory data set;Ken Mano;《2014 IEEE 3rd Global conference consumer electronics》;20141010;正文1-5节 *
基于两种网格划分空间隐私保护选择机制研究;孙传林;《第八届中国可信计算与信息安全学术会议论文集》;20140913;摘要与正文1-4节以及图1-2 *
普适计算环境下基于位置服务的隐私保护若干技术研究;刘恒;《知网》;20110803;摘要及正文1-6章 *

Also Published As

Publication number Publication date
CN104618896A (en) 2015-05-13

Similar Documents

Publication Publication Date Title
CN104618896B (en) A kind of location-based service method for secret protection and system based on mesh-density
Albouq et al. A double obfuscation approach for protecting the privacy of IoT location based applications
CN105246072B (en) User location method for secret protection and system under a kind of road network environment
Huang et al. Incentivizing crowdsensing-based noise monitoring with differentially-private locations
CN107360551B (en) Location privacy protection method based on differential privacy in vehicle-mounted self-organizing network
CN105307111A (en) Position privacy protection method based on incremental neighbour inquiry
US8421615B2 (en) Method and system for locating sensor node in sensor network using transmit power control
CN104092692A (en) Location privacy protection method based on combination of k-anonymity and service similarity
CN108370501A (en) Method and apparatus for searching RFID tag
CN112804240B (en) Function control method, device, server, storage medium and product
CN104205794B (en) The system and method effectively operated for cellular communications networks
CN107624249A (en) Method and system for the number in the aggregated data real-time counting crowd by communication network
CN111786970B (en) Cache-based cooperative location obfuscation anonymous privacy protection method and system
CN106851651A (en) Pseudo-base station identifying system and data analysis system
CN109977324A (en) A kind of point of interest method for digging and system
Deng et al. Energy balanced dispatch of mobile edge nodes for confident information coverage hole repairing in IoT
CN109413067A (en) A kind of inquiry method for protecting track privacy
CN107659892A (en) A kind of indoor orientation method based on customer location secret protection
CN105578412B (en) A kind of position anonymous methods and system based on location-based service
WO2020198958A1 (en) Techniques involving a security heat map
Jadallah et al. Spatial cloaking for location-based queries in the cloud
Stenneth et al. Mobile systems location privacy:“MobiPriv” a robust k anonymous system
CN110248315A (en) A kind of location privacy protection method based on double anchor points
CN110972133A (en) Semantic position privacy protection method based on space-time confusion in road network environment
CN105682018A (en) Positioning processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant