CN105930738B - A kind of location-based personalized internet of things service system privacy of user guard method - Google Patents
A kind of location-based personalized internet of things service system privacy of user guard method Download PDFInfo
- Publication number
- CN105930738B CN105930738B CN201610227570.3A CN201610227570A CN105930738B CN 105930738 B CN105930738 B CN 105930738B CN 201610227570 A CN201610227570 A CN 201610227570A CN 105930738 B CN105930738 B CN 105930738B
- Authority
- CN
- China
- Prior art keywords
- user
- location
- application program
- application
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9537—Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Traffic Control Systems (AREA)
Abstract
The invention belongs to Internet of Things applied technical fields, it is related to a kind of location-based personalized internet of things service system privacy of user guard method, the user location and motion track hiding method that k anonymities and information based on regression analysis prefetch realize anonymous to the k of the current location of user and motion track hide, mobile subscriber takes protection in real time according to the location privacy protection demand of oneself, and determine the degree protected to the position of oneself, system starts corresponding privacy protection mode according to attendant application type used by a user, enable mobile subscriber's degree that autonomous control hides its position when using location-based service and time, while enjoying the facility that location-based Internet of Things service band comes, the privacy information of oneself is protected to the greatest extent.
Description
Technical field:
The invention belongs to Internet of Things applied technical fields, are related to a kind of location-based personalized internet of things service system use
Family method for secret protection, especially a kind of user in the personalized Internet of Things service customization system positioned based on mobile subscriber
In secret protection, the method that user location, historical movement path and anticipated movement route are protected is realized.
Background technology:
It is to realize the basis of Internet of Things personalized service that prediction, which actively provides service, according to the demand of user, nothing in Internet of Things
Place not sensory perceptual system sustainably monitor and acquire target information;The powerful communication network of combining wireless and cable technology,
Any desired place can be transmitted data in real time and carries out intelligent processing;And the platform service pattern based on cloud computing
Make it possible it is remote, it is real-time obtain target current and historical information.Environment of internet of things provides much for mobile subscriber
Value-added service, location-based personalization internet of things service system start high speed development.Location-based personalization Internet of Things clothes
The current location that business system can be based on user and the corresponding information on services of pre- direction finding user recommendation to its motion track, and according to
The personalized Internet of Things of the case where user customization/offer service is served by system.Location-based internet of things service system
Large-scale application needs mobile positioning technique, mobile subscriber track modeling and optimization, the correlations such as signature analysis and secret protection
The support of technology.
In location-based internet of things service system, it is necessary first to obtain the position of user by certain location technology user
Confidence ceases, and is excavated and is handled to location information, establishes the motion track model of user, then, could be current according to user
Position and corresponding information on services is recommended to the pre- direction finding user of its motion track, and provide the Internet of Things system of related service
System.For example, location-based internet of things service system user can with the nearest hospital of interrogating range oneself, restaurant, gas station etc.,
Menu, dish valence or the oil price etc. of gas station in certain restaurant can even be inquired.Existing location based service system is big
A variety of location technologies such as GPS, wifi, base station are all taken based in the synthesis location technology of one, when user installation positioning terminal
And, it can be achieved that real-time tracking to people, vehicle and cargo etc. after corresponding application program.
But the location technology to reach its maturity to user be accurately positioned, location-based individual character
Compound the Internet services have gradually developed as a kind of novel spatial Information Service pattern, and before showing good market
Scape and growth momentum, in hardware aspect, it is possible to provide the technology and Intelligent mobile equipment of function and service based on location-based service
It is more and more;In software aspects, the companies such as Google, Baidu provide the application program using location dependent information, Microsoft
Windows7 provides the built-in application programming interfaces based on location-based service.Based on the current location information of mobile subscriber, and
Historical track predicts that its behavior can provide the Internet of Things service of high quality for it.But the user under environment of internet of things faces ratio
The more serious privacy information security threat of Internet service system, is mainly due to:On the one hand, with the privacy of Internet
Problem is only related to Internet user different, even if Internet of Things network users are not serviced using Internet of Things, similarly there is privacy
Problem [1].This is because the perception terminal type of Internet of Things is more and substantial amounts, it is useful to institute not directed to specific user
The information at family carries out the operations such as automatically acquiring, store, forward and handle.Also, these operations are likely to not know in user
It is carried out in the case of feelings;On the other hand, under cloud computing environment, the sensitive information pattern obtained using data mining technology will more
It is abundant and accurate.By the not only possible identity comprising specific user of the context aware data of sensitive information schema creation, position, wealth
The individual privacy informations such as business, movement locus, behavior, living habit, it is also possible to social relationships, social role including user
(such as work unit, responsibility) confidential information.If these include the context aware data of user privacy information by malicious third parties
It obtains, it would be possible to user privacy information be caused to be revealed.Since Internet of Things has the characteristics that isomerism and complexity, the privacy letter of user
Breath is once reveal, and not only its propagation path and range are uncontrollable, and the injury and loss thereby resulted in is also unable to control and estimates.
With the development of mobile positioning technique, mobile Internet, geographic position information system, previous location privacy protection
Technology is all significantly improved from accuracy, popularity and real-time.According to whether guarded by location is provided in positioning,
Existing mobile positioning technique can be divided into the location technology of basic fixed position technology and position safety, and basic fixed position technology is in realization pair
Its guarded by location problem is not accounted for when the positioning of target, the correlative study of such technology is carried out more early, also relatively ripe;
Research about position secure localization technology is concentrated mainly on wireless sensor network, the positioning of existing most of position safety
Algorithm is too simple for certain hypothesis of network, is not suitable with that Internet of Things is various and complex environment;It is protected based on anonymous privacy
The advantages of maintaining method is to calculate simply, and delay is few, and resource consumption is relatively low, such method can be not only used for data-privacy protection, also may be used
It is protected for sensitive sequence pattern, there is preferable application prospect in Internet of Things secret protection, still, such method can be one
The loss for determining to cause initial data in degree, reduces the accuracy of data, meanwhile, it is anonymous after data and the direct phase of initial data
It closes, secret protection degree is lower than encryption technology.One has been achieved in terms of traditional data mining field, sensitive mode protection
Fixed research, but there is no the opening, the complex environments that consider Internet of Things cloud computing for most of researchs, to distributed, Parallel Sequence mould
The research that formula is excavated is less;Meanwhile encryption technology and multiparty collaboration etc. generally require terminal device with stronger information processing
Ability and certain memory space, and encryption and decryption processes need the longer calculating time, and mobile terminal device is not suitable for
Using the secret protection agreement based on complicated data encryption algorithm.
Due to still immature currently based on the secret protection technology of position, this greatly hinders location-based personalization
The promotion and application of internet of things service system, shortcoming and defect existing for existing user location privacy concealment scheme are mainly wrapped
It includes:When ID of traditional location privacy protection Mechanism Model overwhelming majority both for user, by increasing at random and changing
The ID of user hides the current location information of user, and the scale-model investigation for the query messages protection of user is few;Second is that passing
The method for secret protection based on inquiry of system mostly only considers the case where single inquiry of user, is transported for the user of continuous-query
The research of dynamic rail mark protection is not very much, therefore secret protection is ineffective;Third, existing LBS location privacy protection methods exist
When realization, the system architecture completed by independent third party's anonymous server is largely taken.What is taken is the sight of centralization
Mode.Processing bottleneck can be caused when needing the data volume hidden very big, influences communication efficiency, and real-time is not high, and anonymous
The confidence level of server itself is also to be worthy of consideration.
Invention content:
It is hidden for the new environment of Internet of Things and existing user it is an object of the invention to overcome disadvantage of the existing technology
The deficiency of private protection technique, design, which provides, to be proposed and realizes a kind of personalized Internet of Things service based on mobile subscriber's intelligent terminal
System user method for secret protection realizes having for the positions associated privacy such as the position to user, motion track, and trip custom
Effect protection.
To achieve the goals above, the present invention is to the individual character compound based on mobile subscriber current location and movement pattern
The Internet services system carry out privacy of user protection detailed process be:
(1), one secret protection client application, the privacy are installed firstly the need of the intelligent mobile terminal in user
After protecting application client to open, will reside in memory, if it is starting for the first time, user firstly the need of configuring,
To select and add the application program for needing to carry out guarded by location, if not adding or carrying out position guarantor currently without any need
The application of shield, then the secret protection end application automatically exit from;When next time start when, require again user selection need into
The application program of row guarded by location;If not starting for the first time, it is laggard that user starts the application program for needing to carry out guarded by location
Enter step (2), user can reselect and add the application program for needing to carry out guarded by location at any time;
(2), after mobile subscriber will need the application program for carrying out guarded by location to be added to ecret protection application program, also
It needs according to the location privacy protection demand of oneself to be one k (k of the program setting>=2) value, ecret protection application program according to
The k values that user provides are that the application program for carrying out guarded by location is needed to establish corresponding regression analysis model (as shown in Figure 1), are used
Modeled with the motion track to user, and realize user location k- anonymities and may the information of point of interest the behaviour such as prefetch
Make;When detecting that user's message to be sent includes self-position, secret protection client-side program first blocks the message
It cuts, the destination sent further according to current time, the current location of user, message and message content etc. determine what user used
Then location-based service type searches for local location conten caching record, judges whether corresponding record, corresponded to if existing
Caching record, then local buffered results are directly issued into application program and return to user, and the message of interception is deleted;If
The record is not present in local caching record, then combines the content of the motion track historical record and inquiry of user, using building
The mode of vertical regression analysis generates (k-1) a user interest point analysis predicted position different from the inquiring position of user, so
The current location information of this position (k-1) and user is mixed to the new information for generating and including k position data afterwards, and is sent
It is fed the server of the corresponding Internet of Things of application program (IOT) service provider of row guarded by location, waits for and replying;When receiving
When being returned the result from IOT service provider, if should the result is that user expect as a result, if provide it to it is corresponding apply journey
Sequence, and in local preservation;If not user require as a result, this result is then saved in local;
(3), the caching record of each application program was all provided with there are one the cache invalidation time, was believed when being stored in local position
Breath record deletes the record more than after the out-of-service time automatically, convenient for continuing data cached and carrying out Directory Enquiries to data
Reason.
Secret protection client application of the present invention includes application management module to be protected, user's movement
Three function modules of track modeling module and customer position information protection module;Application management module packet wherein to be protected
It includes application program to be protected and adds two sub-function modules of module and application management module to be protected, application program to be protected adds
Add module input executable application programs name and k values, exports shielded the application list, application program management mould to be protected
Block inputs executable application programs name and k values, exports the k- anonymous location Protection parameters models of shielded application program;User
Motion track modeling module inputs historical position, the time series (p, t) of user, exports the regression analysis mould of user's motion track
Type;Customer position information protection module inputs the regression analysis model and k values of user's motion track, exports m location point and right
The location service information answered.
The specific work process of application program add module to be protected of the present invention is:It first searches and selects intelligent mobile
All mounted application programs in terminal;It searches again and confirms whether the application program of selection is present in shielded application
In program listing, if having existed in shielded the application list, prompt " program has been under secret protection,
Please select new program to be protected ", and return to waiting for user and re-start selection;If the program of selection is answered there is no shielded
K values (k is inputted with user in program listing, is then prompted>=2), to determine the concealment journey to the location information for including in the program
Degree, and shielded the application list is added in the program.
The specific work process of application management module to be protected of the present invention is:First from application program to be protected
The executable application programs name of user's selection is searched in list, and if it exists, then provide current k values, and user is prompted to input new k
Value, then judge whether the k values that user newly inputs meet the requirements, that is, judge whether k is more than or equal to 2, if meeting the requirements, with new k
Value replaces old value, then, customer position information is called to hide module, generates the customer position information based on new k values and hides mould
Type;If the new value of k of input is unsatisfactory for requiring, prompt the k values newly inputted undesirable, and require user re-enter or
It abandons changing.
The specific work process of user's motion track modeling module of the present invention is:First by the historical position of user, when
Between sequence (p, t) be converted into array, and judge whether correlation matrix reversible, recycle local regression parser to generate user and move
The regression analysis model of dynamic rail mark, and according to the required precision of track to be modeled, select local regression attenuation coefficient.
Customer position information protection module of the present invention is realized true to user by way of based on prefetching and taking more
The concealment of location information, specific implementation process are:
(1) according to the current actual position information of user, the recurrence established in user's motion track modeling module point is utilized
The point of destination for analysing model estimation user's next step chooses possibility point of destination of the m location point as the lower moved further of user, selected
The number m of location point is not less than k values.
(2) to each possible point of destination, centered on the point, k neighbouring location points of reselection, then, to object
The Internet services system sends the service request information of (k+1) a location point including the point and its k close position, and will
The information on services received carries out local cache, and mechanism is prefetched by information, by the actual position of user and its inquiring position point
It opens, to avoid user's location privacy caused by inquiry from revealing;
(3) when secret protection client application monitors that the service that user sends to some internet of things service system is asked
When asking in message comprising specific location information, the message is intercepted first, while searched whether in the buffer comprising the position
Service log, if having in caching, directly extracted from local cache record as a result, and be supplied to user, by local slow
Depositing, which reduces user, sends the number of query messages, and further inquires the position of user with it and separate, to further carry
The high location privacy protection degree of user;
(4) to having the characteristics that the internet of things service system of timeliness is handled:One is all set for each application program
The cache invalidation time deletes the record after being stored in local location information record more than the out-of-service time automatically.
The user location and motion track hiding method that k- anonymities and information the present invention is based on regression analysis prefetch are realized
Anonymous to the k- of the current location of user and motion track to hide, mobile subscriber is real according to the location privacy protection demand of oneself
When take protection, and determine the degree protected to the position of oneself, system is served by journey according to used by a user
Sequence type starts corresponding privacy protection mode, and mobile subscriber's autonomous control when using location-based service is enable to hide its position
Degree and the time protect oneself to the greatest extent while enjoying the facility that location-based Internet of Things service band comes
Privacy information.
Compared with prior art, the present invention haing the following advantages:First, being taken based on the mode of subscription client, locally chase after
Track user provides the concealment of location information, existing LBS location privacy protection methods in real time in the operation of mobile intelligent terminal
When realizing, the system architecture completed by independent third party's anonymous server is taken mostly, or based on client-server end
Framework.What both frameworks were taken is all the realization method of centralization, when system user is very big, data volume to be treated
Processing bottleneck can be caused, influences communication efficiency, and the confidence level of anonymous server itself is also to be worthy of consideration;Second is that the present invention
Secret protection program operates in client, and the degree for carrying out secret protection and protection is actively chosen whether by user;Third, using
Method based on regression analysis establishes the motion track model of mobile subscriber, for specific location-based service application, passes through analysis
The historical record of user mixes the position of user with these possible points of interest to generate multiple possible points of interest, from
And realize and the K- grades of user current location hidden, this mode and traditional location privacy protection Mechanism Model mostly use greatly with
It is different come the current location information for hiding user with the ID for changing user that machine increases dummy location;Fourth, the use based on regression analysis
Family interest point prediction obtains the relevant information of multiple positions, and carries out local cache every time.When user is in query messages below
In position be buffered in local, then be not required to really send the message, can directly from local cache record in extraction as a result, simultaneously
It is supplied to user, the number that user sends query messages is reduced by local cache, to further improve the position of user
Secret protection degree;Fifth, distributed realization method, the intelligent mobile client based on user is realized to self-position
Concealment operations have complete independence and controllability since user can independently select degree and the time of position concealment.
Description of the drawings:
Fig. 1 is regression analysis model modeling process schematic block diagram of the present invention.
Fig. 2 is that the privacy of user of the present invention protects workflow schematic block diagram.
Specific implementation mode:
The present invention will be further described by way of example and in conjunction with the accompanying drawings.
Embodiment:
The present embodiment to the personalized internet of things service system based on mobile subscriber current location and movement pattern into
Row privacy of user protection detailed process be:
(1), one secret protection client application, the privacy are installed firstly the need of the intelligent mobile terminal in user
After protecting application client to open, will reside in memory, if it is starting for the first time, user firstly the need of configuring,
To select and add the application program for needing to carry out guarded by location, if not adding or carrying out position guarantor currently without any need
The application of shield, then the secret protection end application automatically exit from;When next time start when, require again user selection need into
The application program of row guarded by location;If not starting for the first time, it is laggard that user starts the application program for needing to carry out guarded by location
Enter step (2), user can reselect and add the application program for needing to carry out guarded by location at any time;
(2), after mobile subscriber will need the application program for carrying out guarded by location to be added to ecret protection application program, also
It needs according to the location privacy protection demand of oneself to be one k (k of the program setting>=2) value, ecret protection application program according to
The k values that user provides are that the application program for carrying out guarded by location is needed to establish corresponding regression analysis model (as shown in Figure 1), are used
Modeled with the motion track to user, and realize user location k- anonymities and may the information of point of interest the behaviour such as prefetch
Make;When detecting that user's message to be sent includes self-position, secret protection client-side program first blocks the message
It cuts, the destination sent further according to current time, the current location of user, message and message content etc. determine what user used
Then location-based service type searches for local location conten caching record, judges whether corresponding record, corresponded to if existing
Caching record, then local buffered results are directly issued into application program and return to user, and the message of interception is deleted;If
The record is not present in local caching record, then combines the content of the motion track historical record and inquiry of user, using building
The mode of vertical regression analysis generates (k-1) a user interest point analysis predicted position different from the inquiring position of user, so
The current location information of this position (k-1) and user is mixed to the new information for generating and including k position data afterwards, and is sent
It is fed the server of the corresponding Internet of Things of application program (IOT) service provider of row guarded by location, waits for and replying;When receiving
When being returned the result from IOT service provider, if should the result is that user expect as a result, if provide it to it is corresponding apply journey
Sequence, and in local preservation;If not user require as a result, this result is then saved in local;
(3), the caching record of each application program was all provided with there are one the cache invalidation time, was believed when being stored in local position
Breath record deletes the record more than after the out-of-service time automatically, convenient for continuing data cached and carrying out Directory Enquiries to data
Reason.
The process that the present embodiment establishes regression analysis model is:Different types of positioning in personalized internet of things service system
Equipment cooperates, and the real time position that user is obtained using customer position information correcting algorithm (using existing correcting algorithm) is believed
Breath, the real-time position information of user include the information such as the ID of the user, position (can be longitude and latitude or significant place) and time,
Personalized internet of things service system persistently records the historical position record set of the producible user of location information of user, and to user
Current location record with historical position record set carry out space-time analysis, obtain user's movement pattern model, and pre- with this
Mobile route and the time for estimating user's next step, the IOT service provider on the route are ready in advance, thereby using
Family obtains the service of personalized high quality.
Secret protection client application described in the present embodiment includes application management module to be protected, Yong Huyi
Three function modules of dynamic rail mark modeling module and customer position information protection module;Application management module wherein to be protected
Add two sub-function modules of module and application management module to be protected, application program to be protected including application program to be protected
Add module inputs executable application programs name and k values, exports shielded the application list, application program management to be protected
Module inputs executable application programs name and k values, exports the k- anonymous location Protection parameters models of shielded application program;With
Historical position, the time series (p, t) of family motion track modeling module input user, exports the regression analysis of user's motion track
Model;Customer position information protection module input user's motion track regression analysis model and k values, export m location point and
Corresponding location service information.
The specific work process of application program add module to be protected described in the present embodiment is:It first searches and selects intelligent sliding
All mounted application programs in dynamic terminal;It searches again and confirms whether the application program of selection is present in shielded answer
With in program listing, if having existed in shielded the application list, prompt that " program has been in secret protection
Under, new program to be protected please be select ", and return to waiting for user and re-start selection;If there is no protected for the program of selection
The application list in, then prompt user to input k values (k>=2), to determine to the hidden of the location information that includes in the program
It hides degree, and shielded the application list is added in the program.
The specific work process of application management module to be protected described in the present embodiment is:First from application journey to be protected
The executable application programs name of user's selection is searched in sequence table, and if it exists, then provide current k values, and prompt user's input new
K values, then judge whether the k values that user newly inputs meet the requirements, that is, judge whether k is more than or equal to 2, if meeting the requirements, use
New k values replace old value, then, customer position information are called to hide module, generate the customer position information concealment based on new k values
Model;If the new value of the k of input is unsatisfactory for requiring, prompt the k values newly inputted undesirable, and user is required to re-enter
Or it abandons changing.
The specific work process of user's motion track modeling module described in the present embodiment is:First by the historical position of user,
Time series (p, t) is converted into array, and judges whether correlation matrix is reversible, and local regression parser is recycled to generate user
The regression analysis model of motion track, and according to the required precision of track to be modeled, select local regression attenuation coefficient.
Customer position information protection module described in the present embodiment is realized true to user by way of based on prefetching and taking more
The concealment of real location information, specific implementation process are:
(1) according to the current actual position information of user, the recurrence established in user's motion track modeling module point is utilized
The point of destination for analysing model estimation user's next step chooses possibility point of destination of the m location point as the lower moved further of user, selected
The number m of location point is not less than k values.
(2) to each possible point of destination, centered on the point, k neighbouring location points of reselection, then, to object
The Internet services system sends the service request information of (k+1) a location point including the point and its k close position, and will
The information on services received carries out local cache, and mechanism is prefetched by information, by the actual position of user and its inquiring position point
It opens, to avoid user's location privacy caused by inquiry from revealing;
(3) when secret protection client application monitors that the service that user sends to some internet of things service system is asked
When asking in message comprising specific location information, the message is intercepted first, while searched whether in the buffer comprising the position
Service log, if having in caching, directly extracted from local cache record as a result, and be supplied to user, by local slow
Depositing, which reduces user, sends the number of query messages, and further inquires the position of user with it and separate, to further carry
The high location privacy protection degree of user.
(4) for having the characteristics that the processing of the internet of things service system of timeliness:The application proposes gentle based on prefetching
Whether the Privacy Preservation Mechanism deposited when such as inquiring restaurant or parking lot, as a result prefetches the little application of timeliness,
Non-service affecting quality, but if the application that user uses requirement of real-time high, such as inquiry is real-time traffic
When the advertising campaign of information or some sales field, the result prefetched and user really inquire between result when occurring in the presence of certain
Difference, also, over time, difference between the two may be increasing, on the other hand, in order to ensure position
The effect of information hiding, the value of k is often much larger than 1, in this way, the most of location information prefetched is to take less than, when user continues
When using the secret protection program, the location information prefetched will be more and more, since the memory capacity of mobile terminal is limited, because
This can seriously affect the property of customer mobile terminal when the data prefetched are more than a certain amount of, in this regard, the present embodiment is for every
Kind application program all sets a cache invalidation time, after being stored in local location information record more than the out-of-service time, by this
Record is deleted automatically, and lower program is required to timeliness for those, and the cache invalidation time is also longer, and to timeliness
It is required that high application, selects a smaller cache invalidation time value.
Claims (6)
1. a kind of location-based personalized internet of things service system privacy of user guard method, it is characterised in that specific steps
For:
(1), secret protection client application, secret protection client are installed firstly the need of the intelligent mobile terminal in user
It after holding application program to open, will reside in memory, if it is starting for the first time, user is firstly the need of configuring, to select simultaneously
Addition needs to carry out the application program of guarded by location, if not adding or carrying out answering for guarded by location currently without any required
With then the secret protection client application automatically exits from;When starting next time, user's selection is required to need into line position again
Set the application program of protection;If not starting for the first time, user enters step after starting the application program for needing to carry out guarded by location
Suddenly (2), user can reselect and add the application program for needing to carry out guarded by location at any time;
(2), after mobile subscriber will need the application program for carrying out guarded by location to be added to secret protection client application,
It also needs to according to the location privacy protection demand of oneself be one k value of the program setting, k>=2, secret protection client application
The k values that program is provided according to user are that the application program for carrying out guarded by location is needed to establish corresponding regression analysis model, to
The motion track of user is modeled, and realizes the pre- extract operation of information of the k- anonymities and possible point of interest of user location;When
When detecting that user's message to be sent includes self-position, secret protection client application first blocks the message
It cuts, the destination and message content sent further according to current time, the current location of user, message determines the position that user uses
Service type is set, local location conten caching record is then searched for, judges whether corresponding record, if there are corresponding
Local buffered results are then directly issued application program and return to user, and the message of interception is deleted by caching record;If this
The record is not present in the caching record on ground, then combines the content of the motion track historical record and inquiry of user, utilizes foundation
The mode of regression analysis generate the k user interest point analysis predicted positions different from the inquiring position of user that subtract 1, then will
The current location information of this k subtracts 1 position and user mix the new information for generating and including k position data, and be sent into
The server of the corresponding Internet of Things service provider of application program of row guarded by location is waited for and being replied;Internet of Things are come from when receiving
Net service provider is when returning the result, if should the result is that it is that user expects as a result, if provide it to corresponding application program, and
In local preservation;If not user require as a result, this result is then saved in local;
(3), the caching record of each application program was all provided with there are one the cache invalidation time, was remembered when being stored in local location information
Record deletes the record more than after the out-of-service time automatically, convenient for continuing data cached and carrying out query processing to data.
2. location-based personalized internet of things service system privacy of user guard method according to claim 1, feature
It is the application management module that the secret protection client application includes to be protected, user's motion track modeling mould
Three function modules of block and customer position information protection module;Application management module wherein to be protected includes to be protected answers
Submodule and application program management submodule to be protected are added with program, application program addition submodule input to be protected is executable
Application name and k values export shielded the application list, and application program management submodule input to be protected is executable to answer
With program name and k values, the k- anonymous location Protection parameters models of shielded application program are exported;User's motion track models mould
Block inputs historical position, the time series of user, exports the regression analysis model of user's motion track;Customer position information is protected
Module inputs the regression analysis model and k values of user's motion track, exports m location point and corresponding location service information.
3. location-based personalized internet of things service system privacy of user guard method according to claim 2, feature
It is that the specific work process of the application program addition submodule to be protected is:It first searches and selects institute on intelligent mobile terminal
There is mounted application program;It searches again and confirms whether the application program of selection is present in shielded the application list
In, if having existed in shielded the application list, prompt that " program has been under secret protection, please be selected new
Program to be protected ", and return to waiting for user and re-start selection;If shielded Application Column is not present in the program of selection
In table, then user is prompted to input k values, k>=2, to determine the concealment degree to the location information for including in the program, and should
Shielded the application list is added in program.
4. location-based personalized internet of things service system privacy of user guard method according to claim 2, feature
It is that the specific work process of the application program management submodule to be protected is:First looked into from the application list to be protected
The executable application programs name for looking for user to select, and if it exists, then provide current k values, and user is prompted to input new k values, then sentence
Whether the k values that disconnected user newly inputs meet the requirements, that is, judge whether k is more than or equal to 2, if meeting the requirements, are replaced with new k values
Then old value calls customer position information protection module, generate the customer position information based on new k values and hide model;If input
The new value of k be unsatisfactory for requiring, then prompt the k values newly inputted undesirable, and user is required to re-enter or abandon to change.
5. location-based personalized internet of things service system privacy of user guard method according to claim 2, feature
It is that the specific work process of user's motion track modeling module is:First the historical position of user, time series are converted
At array, and judge whether correlation matrix is reversible, local regression parser is recycled to generate the recurrence point of user's motion track
Model is analysed, and according to the required precision of track to be modeled, selects local regression attenuation coefficient.
6. location-based personalized internet of things service system privacy of user guard method according to claim 2, feature
It is that the customer position information protection module by way of based on prefetching and taking more, is realized to user's actual position information
Concealment, specific implementation process are:
(1) according to the current actual position information of user, the regression analysis mould established in user's motion track modeling module is utilized
Type estimates the point of destination of user's next step, chooses possibility point of destination of the m location point as the lower moved further of user, selected location
The number m of point is not less than k values;
(2) to each possible point of destination, centered on the point of destination, k neighbouring location points of reselection, then, to object
The Internet services system sends the service request information that the k including the point of destination and its k close position adds 1 location point,
And the information on services received is subjected to local cache, mechanism is prefetched by information, by the actual position of user and its poll bit
It sets and separates, to avoid user's location privacy caused by inquiry from revealing;
(3) when secret protection client application monitors that the service request that user sends to some internet of things service system disappears
When in breath including specific location information, the message is intercepted first, while searching whether the clothes comprising the position in the buffer
Business record, if caching in have, directly from local cache record in extract as a result, and be supplied to user, dropped by local cache
Low user sends the number of query messages, and further inquires the position of user with it and separate, to further improve
The location privacy protection degree of user;
(4) to having the characteristics that the internet of things service system of timeliness is handled:A caching is all set for each application program
Out-of-service time deletes the record after being stored in local location information record more than the out-of-service time automatically.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610227570.3A CN105930738B (en) | 2016-04-13 | 2016-04-13 | A kind of location-based personalized internet of things service system privacy of user guard method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610227570.3A CN105930738B (en) | 2016-04-13 | 2016-04-13 | A kind of location-based personalized internet of things service system privacy of user guard method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105930738A CN105930738A (en) | 2016-09-07 |
CN105930738B true CN105930738B (en) | 2018-09-18 |
Family
ID=56838997
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610227570.3A Active CN105930738B (en) | 2016-04-13 | 2016-04-13 | A kind of location-based personalized internet of things service system privacy of user guard method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105930738B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911670B (en) * | 2017-01-13 | 2020-09-29 | 重庆邮电大学 | Privacy protection system and method in Internet of vehicles |
CN106954182A (en) * | 2017-03-13 | 2017-07-14 | 步步高电子商务有限责任公司 | A kind of anonymous region generation method and location privacy protection method |
CN107145504B (en) * | 2017-03-21 | 2020-02-21 | 南京邮电大学 | Privacy protection method for user movement track similarity comparison |
CN108200537B (en) * | 2017-12-18 | 2020-01-31 | 西安电子科技大学 | Privacy protection method based on track prediction |
CN109905386A (en) * | 2019-02-20 | 2019-06-18 | 徐建红 | A kind of station address protection system and its working method based on user information safety |
CN111447546A (en) * | 2019-03-01 | 2020-07-24 | 维沃移动通信有限公司 | Control method and communication unit for location service |
CN110516476B (en) * | 2019-08-31 | 2022-05-13 | 贵州大学 | Geographical indistinguishable location privacy protection method based on frequent location classification |
CN111786970B (en) * | 2020-06-18 | 2021-06-04 | 武汉大学 | Cache-based cooperative location obfuscation anonymous privacy protection method and system |
CN111737774B (en) * | 2020-06-23 | 2022-09-20 | 广东小天才科技有限公司 | Privacy peep-proof method and intelligent equipment |
CN111988763B (en) * | 2020-08-28 | 2022-03-01 | 安徽大学 | Bus-networking position privacy protection method based on bus cache |
CN115310135B (en) * | 2022-10-09 | 2023-02-07 | 北京中超伟业信息安全技术股份有限公司 | Storage data safe storage method and system based on hidden model |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102014114A (en) * | 2010-07-09 | 2011-04-13 | 北京哈工大计算机网络与信息安全技术研究中心 | Method and device for protecting location privacies of objects in Internet of things |
CN103763106A (en) * | 2014-01-15 | 2014-04-30 | 东南大学 | Position privacy protection method in Internet-of-Things authentication |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030130893A1 (en) * | 2000-08-11 | 2003-07-10 | Telanon, Inc. | Systems, methods, and computer program products for privacy protection |
US8473729B2 (en) * | 2003-09-15 | 2013-06-25 | Intel Corporation | Method and apparatus for managing the privacy and disclosure of location information |
-
2016
- 2016-04-13 CN CN201610227570.3A patent/CN105930738B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102014114A (en) * | 2010-07-09 | 2011-04-13 | 北京哈工大计算机网络与信息安全技术研究中心 | Method and device for protecting location privacies of objects in Internet of things |
CN103763106A (en) * | 2014-01-15 | 2014-04-30 | 东南大学 | Position privacy protection method in Internet-of-Things authentication |
Also Published As
Publication number | Publication date |
---|---|
CN105930738A (en) | 2016-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105930738B (en) | A kind of location-based personalized internet of things service system privacy of user guard method | |
EP2592885B1 (en) | System and method for acquiring statistics of navigation information | |
US8966114B2 (en) | System and method for providing privacy and limited exposure services for location based services | |
CN105491519B (en) | Based on the method for secret protection under real-time query scene continuous in location-based service | |
US20070060171A1 (en) | Method and apparatus for developing location-based applications utilizing a location-based portal | |
CN107274296A (en) | People's catalogue with social privacy and contact person's linked character | |
CN101355714A (en) | System and method for real time pooling vehicle | |
US20150142980A1 (en) | Context-Based Selection of Instruction Sets for Connecting Through Captive Portals | |
CN105556932B (en) | The method and apparatus for enabling mobile application to obtain MAC Address to obtain location information | |
US8539600B2 (en) | Data processing system, and data processing apparatus and user terminal equipment therefor, and computer-readable storage medium and data processing method thereof | |
CN110460958A (en) | Internet of Things broadcasting method, device, broadcasting station and storage medium | |
EP3966598B1 (en) | Privacy management | |
CN105578412A (en) | Position anonymization method based on position service and system | |
CN102487406B (en) | A kind of terminal address book enhancing system of cloud mode | |
US20180336212A1 (en) | Search result prioritization based on device location | |
CN104144381A (en) | Mobile phone positioning application method based on CRM | |
CN114172964A (en) | Scheduling method and device for content distribution network, communication equipment and storage medium | |
US11228568B1 (en) | Anonymization of user data for privacy across distributed computing systems | |
US20160150080A1 (en) | A url transmission system and means thereof | |
RU2008140139A (en) | CUSTOMER VOIP INFORMATION | |
Kaur et al. | A study on location based services and TTP based privacy preserving techniques | |
US20160198454A1 (en) | Systems and methods for ad hoc cellular communications | |
CN114598774B (en) | Cloud mobile phone communication method and system | |
US11782996B2 (en) | On-demand location visit conversion metrics | |
AU2017366668B2 (en) | On-demand location visit conversion metrics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |