CN104717292B - A kind of anonymous location privacy protection methods being combined with high in the clouds of k - Google Patents
A kind of anonymous location privacy protection methods being combined with high in the clouds of k Download PDFInfo
- Publication number
- CN104717292B CN104717292B CN201510124339.7A CN201510124339A CN104717292B CN 104717292 B CN104717292 B CN 104717292B CN 201510124339 A CN201510124339 A CN 201510124339A CN 104717292 B CN104717292 B CN 104717292B
- Authority
- CN
- China
- Prior art keywords
- message
- loc
- user
- array
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 230000001174 ascending effect Effects 0.000 claims description 8
- 230000008569 process Effects 0.000 claims description 5
- 230000001932 seasonal effect Effects 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 4
- 230000008859 change Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
Abstract
Description
Claims (1)
- A kind of 1. anonymous location privacy protection methods being combined with high in the clouds of k-, it is characterised in that comprise the following steps,Step 1, the user positioned at a certain position represent user's using hexa-atomic group of form q=(id, loc, time, qry, k, s) Request message, wherein id are the id for sending request user, and loc is the position for sending request, and time is the time for sending request, Qry is the inquiry content of request, and k is the anonymity parameter that user specifies, k be positive integer andAlso it is positive integer, s is that user refers to Fixed anonymous region;Step 2, anonymous server are interacted after receiving subscription request message with high in the clouds, and k are selected from high in the clouds according to anonymous region s Suitable message, anonymous server carry out anonymous processing to this k message and subscription request message;Anonymity processing process be:The time of subscription request message is assigned to variable date by S21, anonymous server, the k message then selected from high in the clouds In select time values and existIn the range of message, it is assumed that the number of these message is j, first by this j message Id, k and s in corresponding hexa-atomic group be changed to it is consistent with id, k and s of subscription request message and by time value sort ascendings, then by it Corresponding to hexa-atomic group be put into array Q, then hexa-atomic group corresponding to subscription request message is also put into array Q;Will be remaining Hexa-atomic group of middle id, k and s value is changed to consistent with subscription request message corresponding to k-j message, and time values are changed to date+ successively Random (k-j), after time value sort ascendings, hexa-atomic group corresponding to them is put into array Q, wherein, random (k- J) beIn the range of caused random number, be accurate to one decimal place, k-j corresponds to the subscript time of this k-j message Sequence;I-th of element position is defined as loc in S22, array Qi, its time value is defined as ti, each position in array is regarded as User is from loc0Order goes to lock, then need to meet condition P { X (ti+1)=loci+1|X(ti)=loci} ≠ 0, initial assignment Make i=0, Δ=0;First determine whether Δ t=Si,i+1/vi,i+1<ti+1-tiWhether set up, wherein Si,i+1For lociTo loci+1Away from From vi,i+1It is user from lociTo loci+1Maximal rate, if set up if illustrate P { X (ti+1)=loci+1|X(ti)=loci} ≠ 0, S24 is now performed, it is invalid, repeat S23;S23, judge ti+1Whether-Δ=date sets up, and establishment then illustrates that i+1 element is user element, this seasonal Δ=ti+ Δ t-date, invalid then Δ are constant;No matter ti+1Whether-Δ=date sets up, and all makes ti+1=ti+ Δ t is simultaneously reinserted into Sort ascending is carried out in array Q;Then proceed to judge Δ t=Si,i+1/vi,i+1<ti+1-tiWhether set up, performed if setting up S24, perform S23 repeatedly if invalid;S24, by i values plus 1, work as i<S22 is repeated during k, until i=k;Array Q containing k+1 message is sent to LBS service device by step 3, anonymous server, and LBS service device is successively from array Middle taking-up message is inquired about, and returns to anonymous server after Query Result is put into array Q;Step 4, anonymous server filter out legitimate reading and return to user, are specially:Anonymous server receives LBS service device After the array Q comprising Query Result returned, each message in the array is corresponded into the time values in hexa-atomic group and subtracts Δ value, so It is result that user really needs that time values are found out in Query Result array afterwards equal to the message of date values.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510124339.7A CN104717292B (en) | 2015-03-20 | 2015-03-20 | A kind of anonymous location privacy protection methods being combined with high in the clouds of k |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510124339.7A CN104717292B (en) | 2015-03-20 | 2015-03-20 | A kind of anonymous location privacy protection methods being combined with high in the clouds of k |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104717292A CN104717292A (en) | 2015-06-17 |
CN104717292B true CN104717292B (en) | 2018-03-06 |
Family
ID=53416240
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510124339.7A Active CN104717292B (en) | 2015-03-20 | 2015-03-20 | A kind of anonymous location privacy protection methods being combined with high in the clouds of k |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104717292B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105792130B (en) * | 2016-03-03 | 2019-05-03 | 南京邮电大学 | A kind of k- anonymous location method for secret protection requested on an equal basis towards magnanimity |
CN107135197B (en) * | 2017-03-21 | 2020-05-26 | 南京邮电大学 | Chain k-anonymous location privacy protection method based on grey prediction |
CN107292189B (en) * | 2017-05-15 | 2018-12-25 | 温州大学瓯江学院 | The privacy of user guard method of text-oriented retrieval service |
CN107483211B (en) * | 2017-08-10 | 2020-05-05 | 北方工业大学 | Individualized k-anonymous privacy protection and excitation method based on block chain |
CN109617870B (en) * | 2018-12-06 | 2021-05-18 | 西安电子科技大学 | Privacy protection method based on dynamic motion mode |
CN112019502B (en) * | 2020-07-20 | 2021-06-29 | 北京邮电大学 | Anonymous protection method for user nodes of ring guard network and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009083719A1 (en) * | 2007-12-27 | 2009-07-09 | William Browne-Swinburne | Points of interest adjacent to the location of a mobile device |
CN101866353A (en) * | 2010-06-09 | 2010-10-20 | 孟小峰 | Privacy continuous-query protection method based on location-based service |
CN101909050A (en) * | 2010-06-07 | 2010-12-08 | 孟小峰 | Location privacy protection method for preventing location-dependent attack |
CN102892073A (en) * | 2012-09-11 | 2013-01-23 | 北京航空航天大学 | Continuous query oriented location anonymizing method applicable to location service system |
-
2015
- 2015-03-20 CN CN201510124339.7A patent/CN104717292B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009083719A1 (en) * | 2007-12-27 | 2009-07-09 | William Browne-Swinburne | Points of interest adjacent to the location of a mobile device |
CN101909050A (en) * | 2010-06-07 | 2010-12-08 | 孟小峰 | Location privacy protection method for preventing location-dependent attack |
CN101866353A (en) * | 2010-06-09 | 2010-10-20 | 孟小峰 | Privacy continuous-query protection method based on location-based service |
CN102892073A (en) * | 2012-09-11 | 2013-01-23 | 北京航空航天大学 | Continuous query oriented location anonymizing method applicable to location service system |
Also Published As
Publication number | Publication date |
---|---|
CN104717292A (en) | 2015-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104717292B (en) | A kind of anonymous location privacy protection methods being combined with high in the clouds of k | |
CN104092692B (en) | It is a kind of anonymous with servicing the location privacy protection method that similitude is combined based on k | |
US9876766B2 (en) | Method for anonymisation by transmitting data set between different entities | |
CN109478221B (en) | Secure transmission of sensitive data | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
US9372987B1 (en) | Apparatus and method for masking a real user controlling synthetic identities | |
CN113347156B (en) | Intelligent flow confusion method and system for website fingerprint defense and computer storage medium | |
CN104079659B (en) | A kind of location-based service anonymity inquiry system and its application method based on random agency | |
EP2805298B1 (en) | Methods and apparatus for reliable and privacy protecting identification of parties' mutual friends and common interests | |
CN108810868A (en) | The operating method and shared set meal system of shared set meal | |
EP3724804B1 (en) | Privacy-preserving data verification | |
EP4198783A1 (en) | Federated model training method and apparatus, electronic device, computer program product, and computer-readable storage medium | |
CN107196919A (en) | A kind of method and apparatus of matched data | |
CN115242371A (en) | Method, device and system for calculating set intersection and cardinality of differential privacy protection | |
CN116882524A (en) | Federal learning method and system for meeting personalized privacy protection requirements of participants | |
CN107302521A (en) | The sending method and method of reseptance of a kind of privacy of user data | |
CN107196918A (en) | A kind of method and apparatus of matched data | |
CN110490002A (en) | A kind of multidimensional crowdsourcing data true value discovery method based on localization difference privacy | |
CN107135197A (en) | A kind of chain type k anonymous location method for secret protection based on gray prediction | |
US20130152179A1 (en) | System and method for user authentication using one-time identification | |
Wanpeng et al. | Adaptive and dynamic mobile phone data encryption method | |
Zhang et al. | Privacyasst: Safeguarding user privacy in tool-using large language model agents | |
Mathews et al. | Image encryption based on explosive inter-pixel displacement of the RGB attributes of a pixel | |
CN117395077A (en) | Encryption processing method and device for access request, computer equipment and storage medium | |
CN101984629B (en) | Cooperative identification method of Web service based site revealing user privacy information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20150617 Assignee: NANJING NANYOU INSTITUTE OF INFORMATION TECHNOVATION Co.,Ltd. Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS Contract record no.: X2021980014141 Denomination of invention: A location privacy protection method combining k-anonymity and cloud Granted publication date: 20180306 License type: Common License Record date: 20211206 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
EC01 | Cancellation of recordation of patent licensing contract |
Assignee: NANJING NANYOU INSTITUTE OF INFORMATION TECHNOVATION Co.,Ltd. Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS Contract record no.: X2021980014141 Date of cancellation: 20231107 |
|
EC01 | Cancellation of recordation of patent licensing contract |