CN105930738B - A kind of location-based personalized internet of things service system privacy of user guard method - Google Patents

A kind of location-based personalized internet of things service system privacy of user guard method Download PDF

Info

Publication number
CN105930738B
CN105930738B CN201610227570.3A CN201610227570A CN105930738B CN 105930738 B CN105930738 B CN 105930738B CN 201610227570 A CN201610227570 A CN 201610227570A CN 105930738 B CN105930738 B CN 105930738B
Authority
CN
China
Prior art keywords
user
location
application program
application
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610227570.3A
Other languages
Chinese (zh)
Other versions
CN105930738A (en
Inventor
冯云霞
李旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao University of Science and Technology
Original Assignee
Qingdao University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao University of Science and Technology filed Critical Qingdao University of Science and Technology
Priority to CN201610227570.3A priority Critical patent/CN105930738B/en
Publication of CN105930738A publication Critical patent/CN105930738A/en
Application granted granted Critical
Publication of CN105930738B publication Critical patent/CN105930738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9537Spatial or temporal dependent retrieval, e.g. spatiotemporal queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Traffic Control Systems (AREA)

Abstract

The invention belongs to Internet of Things applied technical fields, it is related to a kind of location-based personalized internet of things service system privacy of user guard method, the user location and motion track hiding method that k anonymities and information based on regression analysis prefetch realize anonymous to the k of the current location of user and motion track hide, mobile subscriber takes protection in real time according to the location privacy protection demand of oneself, and determine the degree protected to the position of oneself, system starts corresponding privacy protection mode according to attendant application type used by a user, enable mobile subscriber's degree that autonomous control hides its position when using location-based service and time, while enjoying the facility that location-based Internet of Things service band comes, the privacy information of oneself is protected to the greatest extent.

Description

A kind of location-based personalized internet of things service system privacy of user guard method
Technical field:
The invention belongs to Internet of Things applied technical fields, are related to a kind of location-based personalized internet of things service system use Family method for secret protection, especially a kind of user in the personalized Internet of Things service customization system positioned based on mobile subscriber In secret protection, the method that user location, historical movement path and anticipated movement route are protected is realized.
Background technology:
It is to realize the basis of Internet of Things personalized service that prediction, which actively provides service, according to the demand of user, nothing in Internet of Things Place not sensory perceptual system sustainably monitor and acquire target information;The powerful communication network of combining wireless and cable technology, Any desired place can be transmitted data in real time and carries out intelligent processing;And the platform service pattern based on cloud computing Make it possible it is remote, it is real-time obtain target current and historical information.Environment of internet of things provides much for mobile subscriber Value-added service, location-based personalization internet of things service system start high speed development.Location-based personalization Internet of Things clothes The current location that business system can be based on user and the corresponding information on services of pre- direction finding user recommendation to its motion track, and according to The personalized Internet of Things of the case where user customization/offer service is served by system.Location-based internet of things service system Large-scale application needs mobile positioning technique, mobile subscriber track modeling and optimization, the correlations such as signature analysis and secret protection The support of technology.
In location-based internet of things service system, it is necessary first to obtain the position of user by certain location technology user Confidence ceases, and is excavated and is handled to location information, establishes the motion track model of user, then, could be current according to user Position and corresponding information on services is recommended to the pre- direction finding user of its motion track, and provide the Internet of Things system of related service System.For example, location-based internet of things service system user can with the nearest hospital of interrogating range oneself, restaurant, gas station etc., Menu, dish valence or the oil price etc. of gas station in certain restaurant can even be inquired.Existing location based service system is big A variety of location technologies such as GPS, wifi, base station are all taken based in the synthesis location technology of one, when user installation positioning terminal And, it can be achieved that real-time tracking to people, vehicle and cargo etc. after corresponding application program.
But the location technology to reach its maturity to user be accurately positioned, location-based individual character Compound the Internet services have gradually developed as a kind of novel spatial Information Service pattern, and before showing good market Scape and growth momentum, in hardware aspect, it is possible to provide the technology and Intelligent mobile equipment of function and service based on location-based service It is more and more;In software aspects, the companies such as Google, Baidu provide the application program using location dependent information, Microsoft Windows7 provides the built-in application programming interfaces based on location-based service.Based on the current location information of mobile subscriber, and Historical track predicts that its behavior can provide the Internet of Things service of high quality for it.But the user under environment of internet of things faces ratio The more serious privacy information security threat of Internet service system, is mainly due to:On the one hand, with the privacy of Internet Problem is only related to Internet user different, even if Internet of Things network users are not serviced using Internet of Things, similarly there is privacy Problem [1].This is because the perception terminal type of Internet of Things is more and substantial amounts, it is useful to institute not directed to specific user The information at family carries out the operations such as automatically acquiring, store, forward and handle.Also, these operations are likely to not know in user It is carried out in the case of feelings;On the other hand, under cloud computing environment, the sensitive information pattern obtained using data mining technology will more It is abundant and accurate.By the not only possible identity comprising specific user of the context aware data of sensitive information schema creation, position, wealth The individual privacy informations such as business, movement locus, behavior, living habit, it is also possible to social relationships, social role including user (such as work unit, responsibility) confidential information.If these include the context aware data of user privacy information by malicious third parties It obtains, it would be possible to user privacy information be caused to be revealed.Since Internet of Things has the characteristics that isomerism and complexity, the privacy letter of user Breath is once reveal, and not only its propagation path and range are uncontrollable, and the injury and loss thereby resulted in is also unable to control and estimates.
With the development of mobile positioning technique, mobile Internet, geographic position information system, previous location privacy protection Technology is all significantly improved from accuracy, popularity and real-time.According to whether guarded by location is provided in positioning, Existing mobile positioning technique can be divided into the location technology of basic fixed position technology and position safety, and basic fixed position technology is in realization pair Its guarded by location problem is not accounted for when the positioning of target, the correlative study of such technology is carried out more early, also relatively ripe; Research about position secure localization technology is concentrated mainly on wireless sensor network, the positioning of existing most of position safety Algorithm is too simple for certain hypothesis of network, is not suitable with that Internet of Things is various and complex environment;It is protected based on anonymous privacy The advantages of maintaining method is to calculate simply, and delay is few, and resource consumption is relatively low, such method can be not only used for data-privacy protection, also may be used It is protected for sensitive sequence pattern, there is preferable application prospect in Internet of Things secret protection, still, such method can be one The loss for determining to cause initial data in degree, reduces the accuracy of data, meanwhile, it is anonymous after data and the direct phase of initial data It closes, secret protection degree is lower than encryption technology.One has been achieved in terms of traditional data mining field, sensitive mode protection Fixed research, but there is no the opening, the complex environments that consider Internet of Things cloud computing for most of researchs, to distributed, Parallel Sequence mould The research that formula is excavated is less;Meanwhile encryption technology and multiparty collaboration etc. generally require terminal device with stronger information processing Ability and certain memory space, and encryption and decryption processes need the longer calculating time, and mobile terminal device is not suitable for Using the secret protection agreement based on complicated data encryption algorithm.
Due to still immature currently based on the secret protection technology of position, this greatly hinders location-based personalization The promotion and application of internet of things service system, shortcoming and defect existing for existing user location privacy concealment scheme are mainly wrapped It includes:When ID of traditional location privacy protection Mechanism Model overwhelming majority both for user, by increasing at random and changing The ID of user hides the current location information of user, and the scale-model investigation for the query messages protection of user is few;Second is that passing The method for secret protection based on inquiry of system mostly only considers the case where single inquiry of user, is transported for the user of continuous-query The research of dynamic rail mark protection is not very much, therefore secret protection is ineffective;Third, existing LBS location privacy protection methods exist When realization, the system architecture completed by independent third party's anonymous server is largely taken.What is taken is the sight of centralization Mode.Processing bottleneck can be caused when needing the data volume hidden very big, influences communication efficiency, and real-time is not high, and anonymous The confidence level of server itself is also to be worthy of consideration.
Invention content:
It is hidden for the new environment of Internet of Things and existing user it is an object of the invention to overcome disadvantage of the existing technology The deficiency of private protection technique, design, which provides, to be proposed and realizes a kind of personalized Internet of Things service based on mobile subscriber's intelligent terminal System user method for secret protection realizes having for the positions associated privacy such as the position to user, motion track, and trip custom Effect protection.
To achieve the goals above, the present invention is to the individual character compound based on mobile subscriber current location and movement pattern The Internet services system carry out privacy of user protection detailed process be:
(1), one secret protection client application, the privacy are installed firstly the need of the intelligent mobile terminal in user After protecting application client to open, will reside in memory, if it is starting for the first time, user firstly the need of configuring, To select and add the application program for needing to carry out guarded by location, if not adding or carrying out position guarantor currently without any need The application of shield, then the secret protection end application automatically exit from;When next time start when, require again user selection need into The application program of row guarded by location;If not starting for the first time, it is laggard that user starts the application program for needing to carry out guarded by location Enter step (2), user can reselect and add the application program for needing to carry out guarded by location at any time;
(2), after mobile subscriber will need the application program for carrying out guarded by location to be added to ecret protection application program, also It needs according to the location privacy protection demand of oneself to be one k (k of the program setting>=2) value, ecret protection application program according to The k values that user provides are that the application program for carrying out guarded by location is needed to establish corresponding regression analysis model (as shown in Figure 1), are used Modeled with the motion track to user, and realize user location k- anonymities and may the information of point of interest the behaviour such as prefetch Make;When detecting that user's message to be sent includes self-position, secret protection client-side program first blocks the message It cuts, the destination sent further according to current time, the current location of user, message and message content etc. determine what user used Then location-based service type searches for local location conten caching record, judges whether corresponding record, corresponded to if existing Caching record, then local buffered results are directly issued into application program and return to user, and the message of interception is deleted;If The record is not present in local caching record, then combines the content of the motion track historical record and inquiry of user, using building The mode of vertical regression analysis generates (k-1) a user interest point analysis predicted position different from the inquiring position of user, so The current location information of this position (k-1) and user is mixed to the new information for generating and including k position data afterwards, and is sent It is fed the server of the corresponding Internet of Things of application program (IOT) service provider of row guarded by location, waits for and replying;When receiving When being returned the result from IOT service provider, if should the result is that user expect as a result, if provide it to it is corresponding apply journey Sequence, and in local preservation;If not user require as a result, this result is then saved in local;
(3), the caching record of each application program was all provided with there are one the cache invalidation time, was believed when being stored in local position Breath record deletes the record more than after the out-of-service time automatically, convenient for continuing data cached and carrying out Directory Enquiries to data Reason.
Secret protection client application of the present invention includes application management module to be protected, user's movement Three function modules of track modeling module and customer position information protection module;Application management module packet wherein to be protected It includes application program to be protected and adds two sub-function modules of module and application management module to be protected, application program to be protected adds Add module input executable application programs name and k values, exports shielded the application list, application program management mould to be protected Block inputs executable application programs name and k values, exports the k- anonymous location Protection parameters models of shielded application program;User Motion track modeling module inputs historical position, the time series (p, t) of user, exports the regression analysis mould of user's motion track Type;Customer position information protection module inputs the regression analysis model and k values of user's motion track, exports m location point and right The location service information answered.
The specific work process of application program add module to be protected of the present invention is:It first searches and selects intelligent mobile All mounted application programs in terminal;It searches again and confirms whether the application program of selection is present in shielded application In program listing, if having existed in shielded the application list, prompt " program has been under secret protection, Please select new program to be protected ", and return to waiting for user and re-start selection;If the program of selection is answered there is no shielded K values (k is inputted with user in program listing, is then prompted>=2), to determine the concealment journey to the location information for including in the program Degree, and shielded the application list is added in the program.
The specific work process of application management module to be protected of the present invention is:First from application program to be protected The executable application programs name of user's selection is searched in list, and if it exists, then provide current k values, and user is prompted to input new k Value, then judge whether the k values that user newly inputs meet the requirements, that is, judge whether k is more than or equal to 2, if meeting the requirements, with new k Value replaces old value, then, customer position information is called to hide module, generates the customer position information based on new k values and hides mould Type;If the new value of k of input is unsatisfactory for requiring, prompt the k values newly inputted undesirable, and require user re-enter or It abandons changing.
The specific work process of user's motion track modeling module of the present invention is:First by the historical position of user, when Between sequence (p, t) be converted into array, and judge whether correlation matrix reversible, recycle local regression parser to generate user and move The regression analysis model of dynamic rail mark, and according to the required precision of track to be modeled, select local regression attenuation coefficient.
Customer position information protection module of the present invention is realized true to user by way of based on prefetching and taking more The concealment of location information, specific implementation process are:
(1) according to the current actual position information of user, the recurrence established in user's motion track modeling module point is utilized The point of destination for analysing model estimation user's next step chooses possibility point of destination of the m location point as the lower moved further of user, selected The number m of location point is not less than k values.
(2) to each possible point of destination, centered on the point, k neighbouring location points of reselection, then, to object The Internet services system sends the service request information of (k+1) a location point including the point and its k close position, and will The information on services received carries out local cache, and mechanism is prefetched by information, by the actual position of user and its inquiring position point It opens, to avoid user's location privacy caused by inquiry from revealing;
(3) when secret protection client application monitors that the service that user sends to some internet of things service system is asked When asking in message comprising specific location information, the message is intercepted first, while searched whether in the buffer comprising the position Service log, if having in caching, directly extracted from local cache record as a result, and be supplied to user, by local slow Depositing, which reduces user, sends the number of query messages, and further inquires the position of user with it and separate, to further carry The high location privacy protection degree of user;
(4) to having the characteristics that the internet of things service system of timeliness is handled:One is all set for each application program The cache invalidation time deletes the record after being stored in local location information record more than the out-of-service time automatically.
The user location and motion track hiding method that k- anonymities and information the present invention is based on regression analysis prefetch are realized Anonymous to the k- of the current location of user and motion track to hide, mobile subscriber is real according to the location privacy protection demand of oneself When take protection, and determine the degree protected to the position of oneself, system is served by journey according to used by a user Sequence type starts corresponding privacy protection mode, and mobile subscriber's autonomous control when using location-based service is enable to hide its position Degree and the time protect oneself to the greatest extent while enjoying the facility that location-based Internet of Things service band comes Privacy information.
Compared with prior art, the present invention haing the following advantages:First, being taken based on the mode of subscription client, locally chase after Track user provides the concealment of location information, existing LBS location privacy protection methods in real time in the operation of mobile intelligent terminal When realizing, the system architecture completed by independent third party's anonymous server is taken mostly, or based on client-server end Framework.What both frameworks were taken is all the realization method of centralization, when system user is very big, data volume to be treated Processing bottleneck can be caused, influences communication efficiency, and the confidence level of anonymous server itself is also to be worthy of consideration;Second is that the present invention Secret protection program operates in client, and the degree for carrying out secret protection and protection is actively chosen whether by user;Third, using Method based on regression analysis establishes the motion track model of mobile subscriber, for specific location-based service application, passes through analysis The historical record of user mixes the position of user with these possible points of interest to generate multiple possible points of interest, from And realize and the K- grades of user current location hidden, this mode and traditional location privacy protection Mechanism Model mostly use greatly with It is different come the current location information for hiding user with the ID for changing user that machine increases dummy location;Fourth, the use based on regression analysis Family interest point prediction obtains the relevant information of multiple positions, and carries out local cache every time.When user is in query messages below In position be buffered in local, then be not required to really send the message, can directly from local cache record in extraction as a result, simultaneously It is supplied to user, the number that user sends query messages is reduced by local cache, to further improve the position of user Secret protection degree;Fifth, distributed realization method, the intelligent mobile client based on user is realized to self-position Concealment operations have complete independence and controllability since user can independently select degree and the time of position concealment.
Description of the drawings:
Fig. 1 is regression analysis model modeling process schematic block diagram of the present invention.
Fig. 2 is that the privacy of user of the present invention protects workflow schematic block diagram.
Specific implementation mode:
The present invention will be further described by way of example and in conjunction with the accompanying drawings.
Embodiment:
The present embodiment to the personalized internet of things service system based on mobile subscriber current location and movement pattern into Row privacy of user protection detailed process be:
(1), one secret protection client application, the privacy are installed firstly the need of the intelligent mobile terminal in user After protecting application client to open, will reside in memory, if it is starting for the first time, user firstly the need of configuring, To select and add the application program for needing to carry out guarded by location, if not adding or carrying out position guarantor currently without any need The application of shield, then the secret protection end application automatically exit from;When next time start when, require again user selection need into The application program of row guarded by location;If not starting for the first time, it is laggard that user starts the application program for needing to carry out guarded by location Enter step (2), user can reselect and add the application program for needing to carry out guarded by location at any time;
(2), after mobile subscriber will need the application program for carrying out guarded by location to be added to ecret protection application program, also It needs according to the location privacy protection demand of oneself to be one k (k of the program setting>=2) value, ecret protection application program according to The k values that user provides are that the application program for carrying out guarded by location is needed to establish corresponding regression analysis model (as shown in Figure 1), are used Modeled with the motion track to user, and realize user location k- anonymities and may the information of point of interest the behaviour such as prefetch Make;When detecting that user's message to be sent includes self-position, secret protection client-side program first blocks the message It cuts, the destination sent further according to current time, the current location of user, message and message content etc. determine what user used Then location-based service type searches for local location conten caching record, judges whether corresponding record, corresponded to if existing Caching record, then local buffered results are directly issued into application program and return to user, and the message of interception is deleted;If The record is not present in local caching record, then combines the content of the motion track historical record and inquiry of user, using building The mode of vertical regression analysis generates (k-1) a user interest point analysis predicted position different from the inquiring position of user, so The current location information of this position (k-1) and user is mixed to the new information for generating and including k position data afterwards, and is sent It is fed the server of the corresponding Internet of Things of application program (IOT) service provider of row guarded by location, waits for and replying;When receiving When being returned the result from IOT service provider, if should the result is that user expect as a result, if provide it to it is corresponding apply journey Sequence, and in local preservation;If not user require as a result, this result is then saved in local;
(3), the caching record of each application program was all provided with there are one the cache invalidation time, was believed when being stored in local position Breath record deletes the record more than after the out-of-service time automatically, convenient for continuing data cached and carrying out Directory Enquiries to data Reason.
The process that the present embodiment establishes regression analysis model is:Different types of positioning in personalized internet of things service system Equipment cooperates, and the real time position that user is obtained using customer position information correcting algorithm (using existing correcting algorithm) is believed Breath, the real-time position information of user include the information such as the ID of the user, position (can be longitude and latitude or significant place) and time, Personalized internet of things service system persistently records the historical position record set of the producible user of location information of user, and to user Current location record with historical position record set carry out space-time analysis, obtain user's movement pattern model, and pre- with this Mobile route and the time for estimating user's next step, the IOT service provider on the route are ready in advance, thereby using Family obtains the service of personalized high quality.
Secret protection client application described in the present embodiment includes application management module to be protected, Yong Huyi Three function modules of dynamic rail mark modeling module and customer position information protection module;Application management module wherein to be protected Add two sub-function modules of module and application management module to be protected, application program to be protected including application program to be protected Add module inputs executable application programs name and k values, exports shielded the application list, application program management to be protected Module inputs executable application programs name and k values, exports the k- anonymous location Protection parameters models of shielded application program;With Historical position, the time series (p, t) of family motion track modeling module input user, exports the regression analysis of user's motion track Model;Customer position information protection module input user's motion track regression analysis model and k values, export m location point and Corresponding location service information.
The specific work process of application program add module to be protected described in the present embodiment is:It first searches and selects intelligent sliding All mounted application programs in dynamic terminal;It searches again and confirms whether the application program of selection is present in shielded answer With in program listing, if having existed in shielded the application list, prompt that " program has been in secret protection Under, new program to be protected please be select ", and return to waiting for user and re-start selection;If there is no protected for the program of selection The application list in, then prompt user to input k values (k>=2), to determine to the hidden of the location information that includes in the program It hides degree, and shielded the application list is added in the program.
The specific work process of application management module to be protected described in the present embodiment is:First from application journey to be protected The executable application programs name of user's selection is searched in sequence table, and if it exists, then provide current k values, and prompt user's input new K values, then judge whether the k values that user newly inputs meet the requirements, that is, judge whether k is more than or equal to 2, if meeting the requirements, use New k values replace old value, then, customer position information are called to hide module, generate the customer position information concealment based on new k values Model;If the new value of the k of input is unsatisfactory for requiring, prompt the k values newly inputted undesirable, and user is required to re-enter Or it abandons changing.
The specific work process of user's motion track modeling module described in the present embodiment is:First by the historical position of user, Time series (p, t) is converted into array, and judges whether correlation matrix is reversible, and local regression parser is recycled to generate user The regression analysis model of motion track, and according to the required precision of track to be modeled, select local regression attenuation coefficient.
Customer position information protection module described in the present embodiment is realized true to user by way of based on prefetching and taking more The concealment of real location information, specific implementation process are:
(1) according to the current actual position information of user, the recurrence established in user's motion track modeling module point is utilized The point of destination for analysing model estimation user's next step chooses possibility point of destination of the m location point as the lower moved further of user, selected The number m of location point is not less than k values.
(2) to each possible point of destination, centered on the point, k neighbouring location points of reselection, then, to object The Internet services system sends the service request information of (k+1) a location point including the point and its k close position, and will The information on services received carries out local cache, and mechanism is prefetched by information, by the actual position of user and its inquiring position point It opens, to avoid user's location privacy caused by inquiry from revealing;
(3) when secret protection client application monitors that the service that user sends to some internet of things service system is asked When asking in message comprising specific location information, the message is intercepted first, while searched whether in the buffer comprising the position Service log, if having in caching, directly extracted from local cache record as a result, and be supplied to user, by local slow Depositing, which reduces user, sends the number of query messages, and further inquires the position of user with it and separate, to further carry The high location privacy protection degree of user.
(4) for having the characteristics that the processing of the internet of things service system of timeliness:The application proposes gentle based on prefetching Whether the Privacy Preservation Mechanism deposited when such as inquiring restaurant or parking lot, as a result prefetches the little application of timeliness, Non-service affecting quality, but if the application that user uses requirement of real-time high, such as inquiry is real-time traffic When the advertising campaign of information or some sales field, the result prefetched and user really inquire between result when occurring in the presence of certain Difference, also, over time, difference between the two may be increasing, on the other hand, in order to ensure position The effect of information hiding, the value of k is often much larger than 1, in this way, the most of location information prefetched is to take less than, when user continues When using the secret protection program, the location information prefetched will be more and more, since the memory capacity of mobile terminal is limited, because This can seriously affect the property of customer mobile terminal when the data prefetched are more than a certain amount of, in this regard, the present embodiment is for every Kind application program all sets a cache invalidation time, after being stored in local location information record more than the out-of-service time, by this Record is deleted automatically, and lower program is required to timeliness for those, and the cache invalidation time is also longer, and to timeliness It is required that high application, selects a smaller cache invalidation time value.

Claims (6)

1. a kind of location-based personalized internet of things service system privacy of user guard method, it is characterised in that specific steps For:
(1), secret protection client application, secret protection client are installed firstly the need of the intelligent mobile terminal in user It after holding application program to open, will reside in memory, if it is starting for the first time, user is firstly the need of configuring, to select simultaneously Addition needs to carry out the application program of guarded by location, if not adding or carrying out answering for guarded by location currently without any required With then the secret protection client application automatically exits from;When starting next time, user's selection is required to need into line position again Set the application program of protection;If not starting for the first time, user enters step after starting the application program for needing to carry out guarded by location Suddenly (2), user can reselect and add the application program for needing to carry out guarded by location at any time;
(2), after mobile subscriber will need the application program for carrying out guarded by location to be added to secret protection client application, It also needs to according to the location privacy protection demand of oneself be one k value of the program setting, k>=2, secret protection client application The k values that program is provided according to user are that the application program for carrying out guarded by location is needed to establish corresponding regression analysis model, to The motion track of user is modeled, and realizes the pre- extract operation of information of the k- anonymities and possible point of interest of user location;When When detecting that user's message to be sent includes self-position, secret protection client application first blocks the message It cuts, the destination and message content sent further according to current time, the current location of user, message determines the position that user uses Service type is set, local location conten caching record is then searched for, judges whether corresponding record, if there are corresponding Local buffered results are then directly issued application program and return to user, and the message of interception is deleted by caching record;If this The record is not present in the caching record on ground, then combines the content of the motion track historical record and inquiry of user, utilizes foundation The mode of regression analysis generate the k user interest point analysis predicted positions different from the inquiring position of user that subtract 1, then will The current location information of this k subtracts 1 position and user mix the new information for generating and including k position data, and be sent into The server of the corresponding Internet of Things service provider of application program of row guarded by location is waited for and being replied;Internet of Things are come from when receiving Net service provider is when returning the result, if should the result is that it is that user expects as a result, if provide it to corresponding application program, and In local preservation;If not user require as a result, this result is then saved in local;
(3), the caching record of each application program was all provided with there are one the cache invalidation time, was remembered when being stored in local location information Record deletes the record more than after the out-of-service time automatically, convenient for continuing data cached and carrying out query processing to data.
2. location-based personalized internet of things service system privacy of user guard method according to claim 1, feature It is the application management module that the secret protection client application includes to be protected, user's motion track modeling mould Three function modules of block and customer position information protection module;Application management module wherein to be protected includes to be protected answers Submodule and application program management submodule to be protected are added with program, application program addition submodule input to be protected is executable Application name and k values export shielded the application list, and application program management submodule input to be protected is executable to answer With program name and k values, the k- anonymous location Protection parameters models of shielded application program are exported;User's motion track models mould Block inputs historical position, the time series of user, exports the regression analysis model of user's motion track;Customer position information is protected Module inputs the regression analysis model and k values of user's motion track, exports m location point and corresponding location service information.
3. location-based personalized internet of things service system privacy of user guard method according to claim 2, feature It is that the specific work process of the application program addition submodule to be protected is:It first searches and selects institute on intelligent mobile terminal There is mounted application program;It searches again and confirms whether the application program of selection is present in shielded the application list In, if having existed in shielded the application list, prompt that " program has been under secret protection, please be selected new Program to be protected ", and return to waiting for user and re-start selection;If shielded Application Column is not present in the program of selection In table, then user is prompted to input k values, k>=2, to determine the concealment degree to the location information for including in the program, and should Shielded the application list is added in program.
4. location-based personalized internet of things service system privacy of user guard method according to claim 2, feature It is that the specific work process of the application program management submodule to be protected is:First looked into from the application list to be protected The executable application programs name for looking for user to select, and if it exists, then provide current k values, and user is prompted to input new k values, then sentence Whether the k values that disconnected user newly inputs meet the requirements, that is, judge whether k is more than or equal to 2, if meeting the requirements, are replaced with new k values Then old value calls customer position information protection module, generate the customer position information based on new k values and hide model;If input The new value of k be unsatisfactory for requiring, then prompt the k values newly inputted undesirable, and user is required to re-enter or abandon to change.
5. location-based personalized internet of things service system privacy of user guard method according to claim 2, feature It is that the specific work process of user's motion track modeling module is:First the historical position of user, time series are converted At array, and judge whether correlation matrix is reversible, local regression parser is recycled to generate the recurrence point of user's motion track Model is analysed, and according to the required precision of track to be modeled, selects local regression attenuation coefficient.
6. location-based personalized internet of things service system privacy of user guard method according to claim 2, feature It is that the customer position information protection module by way of based on prefetching and taking more, is realized to user's actual position information Concealment, specific implementation process are:
(1) according to the current actual position information of user, the regression analysis mould established in user's motion track modeling module is utilized Type estimates the point of destination of user's next step, chooses possibility point of destination of the m location point as the lower moved further of user, selected location The number m of point is not less than k values;
(2) to each possible point of destination, centered on the point of destination, k neighbouring location points of reselection, then, to object The Internet services system sends the service request information that the k including the point of destination and its k close position adds 1 location point, And the information on services received is subjected to local cache, mechanism is prefetched by information, by the actual position of user and its poll bit It sets and separates, to avoid user's location privacy caused by inquiry from revealing;
(3) when secret protection client application monitors that the service request that user sends to some internet of things service system disappears When in breath including specific location information, the message is intercepted first, while searching whether the clothes comprising the position in the buffer Business record, if caching in have, directly from local cache record in extract as a result, and be supplied to user, dropped by local cache Low user sends the number of query messages, and further inquires the position of user with it and separate, to further improve The location privacy protection degree of user;
(4) to having the characteristics that the internet of things service system of timeliness is handled:A caching is all set for each application program Out-of-service time deletes the record after being stored in local location information record more than the out-of-service time automatically.
CN201610227570.3A 2016-04-13 2016-04-13 A kind of location-based personalized internet of things service system privacy of user guard method Active CN105930738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610227570.3A CN105930738B (en) 2016-04-13 2016-04-13 A kind of location-based personalized internet of things service system privacy of user guard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610227570.3A CN105930738B (en) 2016-04-13 2016-04-13 A kind of location-based personalized internet of things service system privacy of user guard method

Publications (2)

Publication Number Publication Date
CN105930738A CN105930738A (en) 2016-09-07
CN105930738B true CN105930738B (en) 2018-09-18

Family

ID=56838997

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610227570.3A Active CN105930738B (en) 2016-04-13 2016-04-13 A kind of location-based personalized internet of things service system privacy of user guard method

Country Status (1)

Country Link
CN (1) CN105930738B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911670B (en) * 2017-01-13 2020-09-29 重庆邮电大学 Privacy protection system and method in Internet of vehicles
CN106954182A (en) * 2017-03-13 2017-07-14 步步高电子商务有限责任公司 A kind of anonymous region generation method and location privacy protection method
CN107145504B (en) * 2017-03-21 2020-02-21 南京邮电大学 Privacy protection method for user movement track similarity comparison
CN108200537B (en) * 2017-12-18 2020-01-31 西安电子科技大学 Privacy protection method based on track prediction
CN109905386A (en) * 2019-02-20 2019-06-18 徐建红 A kind of station address protection system and its working method based on user information safety
CN111447546A (en) * 2019-03-01 2020-07-24 维沃移动通信有限公司 Control method and communication unit for location service
CN110516476B (en) * 2019-08-31 2022-05-13 贵州大学 Geographical indistinguishable location privacy protection method based on frequent location classification
CN111786970B (en) * 2020-06-18 2021-06-04 武汉大学 Cache-based cooperative location obfuscation anonymous privacy protection method and system
CN111737774B (en) * 2020-06-23 2022-09-20 广东小天才科技有限公司 Privacy peep-proof method and intelligent equipment
CN111988763B (en) * 2020-08-28 2022-03-01 安徽大学 Bus-networking position privacy protection method based on bus cache
CN115310135B (en) * 2022-10-09 2023-02-07 北京中超伟业信息安全技术股份有限公司 Storage data safe storage method and system based on hidden model

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014114A (en) * 2010-07-09 2011-04-13 北京哈工大计算机网络与信息安全技术研究中心 Method and device for protecting location privacies of objects in Internet of things
CN103763106A (en) * 2014-01-15 2014-04-30 东南大学 Position privacy protection method in Internet-of-Things authentication

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030130893A1 (en) * 2000-08-11 2003-07-10 Telanon, Inc. Systems, methods, and computer program products for privacy protection
US8473729B2 (en) * 2003-09-15 2013-06-25 Intel Corporation Method and apparatus for managing the privacy and disclosure of location information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014114A (en) * 2010-07-09 2011-04-13 北京哈工大计算机网络与信息安全技术研究中心 Method and device for protecting location privacies of objects in Internet of things
CN103763106A (en) * 2014-01-15 2014-04-30 东南大学 Position privacy protection method in Internet-of-Things authentication

Also Published As

Publication number Publication date
CN105930738A (en) 2016-09-07

Similar Documents

Publication Publication Date Title
CN105930738B (en) A kind of location-based personalized internet of things service system privacy of user guard method
EP2592885B1 (en) System and method for acquiring statistics of navigation information
US8966114B2 (en) System and method for providing privacy and limited exposure services for location based services
CN105491519B (en) Based on the method for secret protection under real-time query scene continuous in location-based service
US20070060171A1 (en) Method and apparatus for developing location-based applications utilizing a location-based portal
CN107274296A (en) People's catalogue with social privacy and contact person's linked character
CN101355714A (en) System and method for real time pooling vehicle
US20150142980A1 (en) Context-Based Selection of Instruction Sets for Connecting Through Captive Portals
CN105556932B (en) The method and apparatus for enabling mobile application to obtain MAC Address to obtain location information
US8539600B2 (en) Data processing system, and data processing apparatus and user terminal equipment therefor, and computer-readable storage medium and data processing method thereof
CN110460958A (en) Internet of Things broadcasting method, device, broadcasting station and storage medium
EP3966598B1 (en) Privacy management
CN105578412A (en) Position anonymization method based on position service and system
CN102487406B (en) A kind of terminal address book enhancing system of cloud mode
US20180336212A1 (en) Search result prioritization based on device location
CN104144381A (en) Mobile phone positioning application method based on CRM
CN114172964A (en) Scheduling method and device for content distribution network, communication equipment and storage medium
US11228568B1 (en) Anonymization of user data for privacy across distributed computing systems
US20160150080A1 (en) A url transmission system and means thereof
RU2008140139A (en) CUSTOMER VOIP INFORMATION
Kaur et al. A study on location based services and TTP based privacy preserving techniques
US20160198454A1 (en) Systems and methods for ad hoc cellular communications
CN114598774B (en) Cloud mobile phone communication method and system
US11782996B2 (en) On-demand location visit conversion metrics
AU2017366668B2 (en) On-demand location visit conversion metrics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant