CN107133527B - A kind of personalized recommendation method based on location privacy protection - Google Patents

A kind of personalized recommendation method based on location privacy protection Download PDF

Info

Publication number
CN107133527B
CN107133527B CN201710260761.4A CN201710260761A CN107133527B CN 107133527 B CN107133527 B CN 107133527B CN 201710260761 A CN201710260761 A CN 201710260761A CN 107133527 B CN107133527 B CN 107133527B
Authority
CN
China
Prior art keywords
location
user
area
query
radius
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710260761.4A
Other languages
Chinese (zh)
Other versions
CN107133527A (en
Inventor
邢玲
马强
张琦
高建平
陈松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Science and Technology
Original Assignee
Henan University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Science and Technology filed Critical Henan University of Science and Technology
Priority to CN201710260761.4A priority Critical patent/CN107133527B/en
Publication of CN107133527A publication Critical patent/CN107133527A/en
Application granted granted Critical
Publication of CN107133527B publication Critical patent/CN107133527B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9537Spatial or temporal dependent retrieval, e.g. spatiotemporal queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明公开了一种基于位置隐私保护的个性化推荐方法,以用户真实位置P0为圆心,dmax为半径生成隐匿区域Z0,通过近邻位置点坐标计算均值,再以均值坐标位置点为圆心,dmax为半径,重新生成隐匿区域Z′0,应用服务器将隐匿区域Z′0半径至Dmax,生成推荐区域Z1,根据服务请求信息query,结合用户历史购买商家记录,对推荐区域Z1内商家排序即获得个性化推荐列表。本发明从整体上保证了生成的位置(虚假轨迹)信息在结构上保证了与真实位置(轨迹)的一致性,从而可以有效的抵御背景知识攻击。同时,由于隐匿区域和推荐区域是同一个圆心,所以在有效抵御隐私攻击同时又可以为用户提供优质的推荐服务。

The invention discloses a personalized recommendation method based on location privacy protection. The user's real location P0 is used as the center of the circle, and dmax is used as the radius to generate a hidden area Z0. is the center of the circle, dmax is the radius, regenerate the hidden area Z′ 0 , and the application server converts the radius of the hidden area Z′ 0 to Dmax to generate a recommended area Z 1 . 1. Sort the merchants within 1 to get a personalized recommendation list. The present invention ensures that the generated position (false trajectory) information is structurally consistent with the real position (trajectory) on the whole, thereby effectively resisting background knowledge attacks. At the same time, since the hidden area and the recommended area are in the same circle center, it can provide users with high-quality recommendation services while effectively resisting privacy attacks.

Description

一种基于位置隐私保护的个性化推荐方法A personalized recommendation method based on location privacy protection

技术领域technical field

本发明属于数据挖掘和隐私保护技术领域,更为具体地讲,涉及一种基于位置隐私保护的个性化推荐方法。The invention belongs to the technical field of data mining and privacy protection, and more specifically relates to a personalized recommendation method based on location privacy protection.

背景技术Background technique

自2003年以来,就有研究者开始对移动用户位置的隐私保护进行相关工作,提出了一些经典的算法,对这些算法进行分类,主要有假轨迹数据法、抑制法和数据泛化法。Since 2003, some researchers have begun to work on the privacy protection of mobile user locations, and proposed some classic algorithms. These algorithms are classified, mainly including false trajectory data method, suppression method and data generalization method.

通常假轨迹数据法实现起来比较简单,数据存储量大以及数据可用性相对比较差。抑制法对轨迹隐私保护是通过限制敏感信息的发布,这种方法实现简单计算量小,但是数据容易失真。数据泛化法即基于泛化的轨迹隐私保护算法,保证了数据不会失真,但是计算量比较大。Usually the false trajectory data method is relatively simple to implement, with a large amount of data storage and relatively poor data availability. The suppression method protects trajectory privacy by restricting the release of sensitive information. This method is simple and requires little computation, but the data is easily distorted. The data generalization method is a trajectory privacy protection algorithm based on generalization, which ensures that the data will not be distorted, but the amount of calculation is relatively large.

目前位置隐私保护技术通常采用文献[Gedik,Bu&#,Liu L.Protecting LocationPrivacy with Personalized k-Anonymity:Architecture and Algorithms[J].IEEETransactions on Mobile Computing,2008,7(1):1-18.]k-anonymity即位置K匿名算法,这是目前位置隐私保护的主流方法。位置K匿名算法是一种普遍用于位置隐私保护方法,该方法就是把查询用户在一定区域范围内与其他k-1个用户一起发送给位置服务器,这样就难以判断出真实的查询用户,位置K匿名算法对查询用户的单个位置的隐私保护效果不错,但是不适合连续查询,攻击者可以通过对用户位置连续时刻查询求交集,从而算出查询用户的真实位置信息。At present, location privacy protection technology usually adopts literature [Gedik, Bu&#, Liu L.Protecting LocationPrivacy with Personalized k-Anonymity: Architecture and Algorithms[J].IEEETransactions on Mobile Computing,2008,7(1):1-18.]k -anonymity is the location K anonymity algorithm, which is the current mainstream method for location privacy protection. The location K anonymous algorithm is a method commonly used for location privacy protection. This method is to send the query user to the location server together with other k-1 users within a certain area, so that it is difficult to determine the real query user , location The K-anonymity algorithm has a good effect on the privacy protection of the query user's single location, but it is not suitable for continuous query. The attacker can calculate the real location information of the query user by querying the intersection of the user's location at continuous time.

文献[Theodoridis,State-of-the-art in privacy preserving data mining[C]//ACM SIGMOD Record.2004.]把主流隐私保护数据挖掘方法分为五类:①、数据的分布的一些方式;②、以数据或规则的隐藏方式,分为基于数据失真、数据匿名、数据加密等;③、在数据挖掘技术层面,有聚类挖掘、关联规则挖掘、分类挖掘等;④、以隐藏的对象来说,分为原始数据隐藏、规则或模式隐藏等;⑤、以隐私保护技术层面,分为基于启发式、基于密码学以及基于重构技术的方法。The document [Theodoridis, State-of-the-art in privacy preserving data mining[C]//ACM SIGMOD Record.2004.] divides mainstream privacy-preserving data mining methods into five categories: ① Some ways of data distribution; ② 1. Based on the way of hiding data or rules, it is divided into data distortion, data anonymity, data encryption, etc.; ③. At the level of data mining technology, there are cluster mining, association rule mining, classification mining, etc.; ④. Said that it is divided into original data hiding, rule or pattern hiding, etc.; ⑤, in terms of privacy protection technology, it is divided into heuristic-based, cryptography-based and reconstruction-based methods.

隐私保护和数据挖掘是一对矛盾体。知识挖掘、机器学习、人工智能等技术的研究和应用使得大数据分析的力量越来越强大,同时也为对个人隐私的保护带来了更加严峻的挑战。Privacy protection and data mining are a pair of contradictions. The research and application of knowledge mining, machine learning, artificial intelligence and other technologies have made the power of big data analysis more and more powerful, and at the same time brought more severe challenges to the protection of personal privacy.

发明内容Contents of the invention

本发明的目的在于克服现有技术的不足,提出一种基于位置隐私保护的个性化推荐方法,以有效抵御背景知识攻击、用户行为模式攻击等隐私攻击,并在有效抵御攻击的同时,为用户提供优质的推荐服务。The purpose of the present invention is to overcome the deficiencies in the prior art and propose a personalized recommendation method based on location privacy protection to effectively resist privacy attacks such as background knowledge attacks and user behavior pattern attacks, and to provide users with Provide high-quality referral services.

为实现上述发明目的,本发明基于位置隐私保护的个性化推荐方法,其特征在于,包括以下步骤:In order to achieve the purpose of the above invention, the personalized recommendation method based on location privacy protection of the present invention is characterized in that it includes the following steps:

(1)、根据查询用户位置生成隐匿区域(1) Generate a hidden area according to the location of the query user

1.1)、位置服务器接收查询用户发送位置服务请求Q={P0(x,y),c,query},其中,P0(x,y)为查询用户真实位置,(x,y)为其坐标,c为用户设置的隐私保护程度,c>1,query为用户发送的服务请求信息;1.1), the location server receives the location service request Q={P 0 (x,y),c,query} sent by the querying user, where P 0 (x,y) is the real location of the querying user, and (x,y) is its Coordinates, c is the degree of privacy protection set by the user, c>1, query is the service request information sent by the user;

1.2)、以查询用户真实位置P0(x,y)为圆心,半径为dmax生成隐匿区域Z0,其中,半径dmax=R×c,R为保护系数;1.2), take the query user's real position P 0 (x, y) as the center, and generate a hidden area Z 0 with a radius of dmax, where the radius dmax=R×c, and R is the protection coefficient;

1.3)、判定隐匿区域Z0域内用户真实位置P0(x,y)的近邻位置点个数n是否满足n>k,若不满足则需要随机插入k-n个位置点,其中,k为隐匿区域所需位置点数,根据具体实施情况确定;1.3) Determine whether the number n of the neighbors of the user’s real position P 0 (x, y) in the hidden area Z 0 satisfies n>k, and if not, kn position points need to be randomly inserted, where k is the hidden area The required location points are determined according to the specific implementation situation;

(2)、根据查询用户真实位置P0(x,y)近邻位置点重新计算隐匿区域(2) Recalculate the hidden area according to the query user's real position P 0 (x, y) neighboring position points

2.1)、位置服务器随机选定隐匿区域Z0的k个近邻位置点;2.1), the location server randomly selects k adjacent location points of the hidden area Z0 ;

2.2)、得到k个近邻位置点的坐标,并计算坐标均值,通过公式2.2), obtain the coordinates of the k nearest neighbors, and calculate the mean value of the coordinates, through the formula

得到均值坐标位置点其中,xi,yi为k位置点第i个的坐标;Get the mean coordinate position point Among them, x i , y i are the coordinates of the i-th point at position k;

2.3)、位置服务器以均值坐标位置点为圆心,dmax为半径,重新生成隐匿区域Z′0,并把整个隐匿区域Z′0作为用户当前位置发送给应用服务器,同时,将服务请求信息也发送给应用服务器;2.3), the location server uses the mean coordinate location point is the center of the circle, dmax is the radius, regenerate the hidden area Z′ 0 , and send the entire hidden area Z′ 0 as the user’s current location to the application server, and at the same time, send the service request information to the application server;

(3)、推荐用户附近商家(3) Recommend businesses near the user

3.1)、应用服务器将隐匿区域Z′0半径至Dmax,生成推荐区域Z13.1), the application server generates the recommended area Z 1 from the hidden area Z′ 0 radius to Dmax;

3.2)、应用服务器根据用户发送的服务请求信息query,结合用户历史购买商家记录,对推荐区域Z1内商家排序即获得个性化推荐列表并返回给查询用户。3.2), the application server sorts the merchants in the recommendation area Z1 according to the service request information query sent by the user, combined with the user's historical purchase merchant records, and then obtains a personalized recommendation list and returns it to the query user.

本发明的目的是这样实现的。The purpose of the present invention is achieved like this.

本发明基于位置隐私保护的个性化推荐方法,取用户真实位置坐标,以用户真实位置P0为圆心,dmax为半径生成隐匿区域Z0,并通过真实位置近邻位置点坐标计算均值,再以均值坐标位置点为圆心,dmax为半径,重新生成隐匿区域Z′0,并把整个隐匿区域Z′0作为用户当前位置发送给应用服务器,同时,将服务请求信息也发送给应用服务器;应用服务器将隐匿区域Z′0半径至Dmax,生成推荐区域Z1,然后根据用户发送的服务请求信息query,结合用户历史购买商家记录,对推荐区域Z1内商家排序即获得个性化推荐列表。本发明从整体上保证了生成的位置(虚假轨迹)信息在结构上保证了与真实位置(轨迹)的一致性,从而可以有效的抵御背景知识攻击。隐匿区域采用近邻位置坐标生成,由于采用位置坐标均值计算,使得虚假位置更接近人群集中的地方,这种方式可以使真实位置对应的场所与隐匿区域对应场所一致性,可以有效抵御针对用户行为模式的攻击。由于隐匿区域和推荐区域是同一个圆心,所以在有效抵御隐私攻击同时又可以为用户提供优质的推荐服务。The present invention is based on a personalized recommendation method based on location privacy protection, which takes the user's real location coordinates, takes the user's real location P0 as the center, and dmax as the radius to generate a hidden area Z0, and calculates the mean value through the coordinates of the real location's neighbors, and then uses the mean coordinate position point is the center of the circle, dmax is the radius, regenerate the hidden area Z′ 0 , and send the entire hidden area Z′ 0 as the user’s current location to the application server, and at the same time, send the service request information to the application server; the application server will hide the area Z ′ 0 radius to Dmax, generate a recommendation area Z 1 , and then according to the service request information query sent by the user, combined with the user's historical purchase merchant records, sort the merchants in the recommendation area Z 1 to obtain a personalized recommendation list. The present invention ensures that the generated position (false trajectory) information is structurally consistent with the real position (trajectory) on the whole, thereby effectively resisting background knowledge attacks. The hidden area is generated using the coordinates of the nearest neighbors. Since the calculation of the mean value of the position coordinates is used, the false location is closer to the place where the crowd is concentrated. This method can make the place corresponding to the real location consistent with the place corresponding to the hidden area, which can effectively resist targeting user behavior patterns. s attack. Since the hidden area and the recommended area have the same center, it can effectively resist privacy attacks and provide users with high-quality recommendation services.

附图说明Description of drawings

图1是本发明应用的个性化推荐系统的结构示意图;Fig. 1 is a schematic structural diagram of a personalized recommendation system applied in the present invention;

图2是本发明基于位置隐私保护的个性化推荐方法一种具体实施方式流程图;Fig. 2 is a flow chart of a specific embodiment of the personalized recommendation method based on location privacy protection in the present invention;

图3是形成隐匿区域的示意图;Fig. 3 is a schematic diagram of forming a hidden area;

图4是隐匿区域与推荐区域关系图;Figure 4 is a diagram of the relationship between the hidden area and the recommended area;

图5是本发明中均值坐标位置点的轨迹图;Fig. 5 is mean value coordinate position point among the present invention track map;

图6是连续查询时位置攻击示意图;Fig. 6 is a schematic diagram of location attack during continuous query;

图7是最大速度攻击示意图;Fig. 7 is a schematic diagram of maximum speed attack;

图8是第三方所能接收到的查询用户位置轨迹图;Fig. 8 is the track map of the query user's position that the third party can receive;

图9是无背景知识情况下与位置K匿名算法保护度对比图;Fig. 9 is a comparison diagram of the protection degree of the position K anonymous algorithm without background knowledge;

图10是有背景知识情况下与随机K-匿名隐私保护度对比图;Figure 10 is a comparison of random K-anonymous privacy protection degree with background knowledge;

图11是位置隐匿对推荐准确率影响图。Figure 11 is a graph showing the influence of location concealment on recommendation accuracy.

具体实施方式Detailed ways

下面结合附图对本发明的具体实施方式进行描述,以便本领域的技术人员更好地理解本发明。需要特别提醒注意的是,在以下的描述中,当已知功能和设计的详细描述也许会淡化本发明的主要内容时,这些描述在这里将被忽略。Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings, so that those skilled in the art can better understand the present invention. It should be noted that in the following description, when detailed descriptions of known functions and designs may dilute the main content of the present invention, these descriptions will be omitted here.

图1是本发明应用的个性化推荐系统的结构示意图。Fig. 1 is a schematic structural diagram of a personalized recommendation system applied in the present invention.

在本实施例中,个性化推荐系统的工作过程如下:In this embodiment, the working process of the personalized recommendation system is as follows:

①、查询用户向位置服务器发出位置服务请求,将自己的位置服务请求经过加密处理后发送给位置服务器。其中查询用户的私钥信息只有自己知道,查询用户与位置服务器之间是经过加密处理的可靠通信。①. The querying user sends a location service request to the location server, and sends the location service request to the location server after encryption. Among them, the private key information of the inquiring user is known only to oneself, and the reliable communication between the inquiring user and the location server is encrypted.

②、位置服务器对接收到的位置信息、服务信息进行解密,并根据的真实位置信息和隐私保护程度生成隐匿区域。②. The location server decrypts the received location information and service information, and generates a hidden area according to the real location information and the degree of privacy protection.

③、位置服务器将求得的隐匿区域、服务请求信息一起打包发送给应用服务器。③. The location server packages and sends the obtained hidden area and service request information to the application server.

④、应用服务器将接收到的服务请求信息query,结合用户历史购买商家记录,对推荐区域Z1内商家排序即获得个性化推荐列表,并发送给查询用户。④. The application server combines the received service request information query with the user's historical purchase merchant records, sorts the merchants in the recommendation area Z1 to obtain a personalized recommendation list, and sends it to the query user.

图2是本发明基于位置隐私保护的个性化推荐方法一种具体实施方式流程图。FIG. 2 is a flow chart of a specific embodiment of the location privacy protection-based personalized recommendation method of the present invention.

在本实施例中,如图1所示,本发明基于位置隐私保护的个性化推荐方法,其特征在于,包括以下步骤:In this embodiment, as shown in Figure 1, the personalized recommendation method based on location privacy protection of the present invention is characterized in that it includes the following steps:

步骤S1:根据查询用户位置生成隐匿区域Step S1: Generate a hidden area according to the query user location

步骤S1.1:位置服务器接收查询用户发送位置服务请求Q={P0(x,y),c,query},其中,P0(x,y)为查询用户真实位置,(x,y)为其坐标,c为用户设置的隐私保护程度,c>1,query为用户发送的服务请求信息。Step S1.1: The location server receives the location service request Q={P 0 (x,y),c,query} sent by the querying user, where P 0 (x,y) is the real location of the querying user, (x,y) Its coordinates, c is the degree of privacy protection set by the user, c>1, and query is the service request information sent by the user.

在本实施例中,x,y是用于坐标的经纬度。查询用户位置为成都市成华区牛王庙,其经纬度为(104.099962,30.651244),发送位置服务请求到位置服务器,位置服务器根据查询用户位置生成隐匿区域Z0,具体为:In this embodiment, x,y are latitude and longitude for the coordinates. The location of the query user is Niuwangmiao, Chenghua District, Chengdu, and its latitude and longitude are (104.099962, 30.651244). Send a location service request to the location server, and the location server generates a hidden area Z 0 according to the location of the query user, specifically:

位置服务器(Location Based Service,简称LBS)接收查询用户发送的位置服务请求,接收信息是Q={P0(x,y),c,query},其中,P0(104.099962,30.651244)是查询用户真实位置,c为用户设置的隐私保护程度,c>1,query为用户发送的服务请求信息,在本实施例中,query是用户发送的请求附近饭店信息。The location server (Location Based Service, referred to as LBS) receives the location service request sent by the query user, and the received information is Q={P 0 (x,y),c,query}, where P 0 (104.099962,30.651244) is the query user real location, c is the privacy protection level set by the user, c>1, query is the service request information sent by the user, and in this embodiment, query is the requested nearby restaurant information sent by the user.

步骤S1.2:以查询用户真实位置P0(x,y)为圆心,半径为dmax生成隐匿区域Z0,其中,半径dmax=R×c,R为位置服务器设置的保护系数。Step S1.2: Take the real location P 0 (x, y) of the query user as the center and generate a hidden area Z 0 with a radius dmax, where the radius dmax=R×c, and R is the protection coefficient set by the location server.

位置服务器接收到位置服务请求后开始对查询用户真实位置进行隐匿运算,以P0(104.099962,30.651244)为圆心,半径为dmax生成隐匿区域Z0,其中dmax=R×c,在本实施例中,设置保护系数R=0.5km,隐私保护程度c=2,位置服务器将生成一公里半径范围内的隐匿区域Z0After the location server receives the location service request, it starts to perform concealment calculations on the real location of the inquiring user, with P 0 (104.099962, 30.651244) as the center and a radius of dmax to generate a hidden area Z 0 , where dmax=R×c, in this embodiment , set the protection coefficient R=0.5km, the privacy protection degree c=2, and the location server will generate a hidden area Z 0 within a radius of one kilometer.

步骤S1.3:判定隐匿区域Z0域内用户真实位置P0(x,y)的近邻位置点个数n是否满足n>k,若不满足则需要随机插入k-n个位置点,其中,k为隐匿区域所需位置点数,根据具体实施情况确定。在本实施例中,k确定为10。Step S1.3: Determine whether the number n of the adjacent location points n of the user’s real location P 0 (x, y) in the hidden area Z 0 satisfies n>k, if not, it is necessary to randomly insert kn location points, where k is The location points required for the hidden area are determined according to the specific implementation. In this embodiment, k is determined to be 10.

步骤S2:以根据用户真实位置P0(x,y)近邻位置点重新计算隐匿区域Step S2: Recalculate the hidden area according to the user's real position P 0 (x, y) neighboring position points

步骤S2.1:位置服务器随机选定隐匿区域Z0的k=10个近邻位置点;Step S2.1: The location server randomly selects k=10 neighboring location points in the hidden area Z0 ;

步骤S2.2:得到k=10个近邻位置点的坐标,并计算坐标均值,通过公式Step S2.2: Obtain the coordinates of k=10 neighboring points, and calculate the mean value of the coordinates, through the formula

得到均值坐标位置点其中,xi,yi为k位置点第i个的坐标。在本实施例中,均值坐标位置点的坐标为(104.099692,30.650444)。Get the mean coordinate position point Among them, x i , y i are the coordinates of the i-th point at position k. In this example, the mean coordinate position point The coordinates are (104.099692,30.650444).

步骤S2.3:位置服务器以均值坐标位置点为圆心,dmax为半径,重新生成隐匿区域Z′0,并把整个隐匿区域Z′0作为用户当前位置发送给应用服务器,同时,将服务请求信息也发送给应用服务器。Step S2.3: The location server coordinates the location point with the mean value is the center of the circle, and dmax is the radius, regenerate the hidden area Z' 0 , and send the entire hidden area Z' 0 as the user's current location to the application server, and at the same time, send the service request information to the application server.

步骤S3:推荐用户附近商家Step S3: Recommend businesses near the user

步骤S3.1:应用服务器将隐匿区域Z′0半径至Dmax,生成推荐区域Z1Step S3.1: The application server sets the radius of the hidden area Z'0 to Dmax to generate a recommended area Z1 ;

步骤S3.2:应用服务器根据查询用户发送的服务请求信息query,结合查询用户历史购买商家记录,对推荐区域Z1内商家排序即获得个性化推荐列表。Step S3.2: The application server sorts the merchants in the recommendation area Z1 according to the service request information query sent by the querying user, combined with the querying user's historical purchase merchant records, and obtains a personalized recommendation list.

在本实施例中,应用服务器在对商家进行排序前,需要对商家的特征和权重进行训练得到。抽取应用服务器数据库中购买人数较多的1000个商家,分为正负例样本(购买的为正例样本、浏览没购买的为负例样本),抽取商家特征,特征包括是否停车、面积、价格、用户评分……等,然后利用逻辑回归算法的随机梯度下降法对正负例样本进行训练,得到商家的特征和权重。In this embodiment, before the application server sorts the merchants, it needs to obtain the characteristics and weights of the merchants through training. Extract 1,000 merchants with a large number of purchasers in the application server database, divide them into positive and negative samples (purchased ones are positive samples, and those that browse without purchases are negative samples), and extract merchant characteristics, including whether parking, area, price , user ratings, etc., and then use the stochastic gradient descent method of the logistic regression algorithm to train the positive and negative samples to obtain the characteristics and weights of the merchants.

在本实施例中,如图3所示,左侧圆形区域是以查询用户真实位置P0为圆心一公里半径范围内的隐匿区域Z0,随机选定隐匿区域Z0的k=10个近邻位置点(用X表示),形成右侧圆形区域是以均值坐标位置点为圆心一公里半径范围内的隐匿区域Z′0In this embodiment, as shown in FIG. 3, the circular area on the left is a hidden area Z 0 within a radius of one kilometer with the real location P 0 of the inquiring user as the center, and k=10 hidden areas Z 0 are randomly selected. Neighboring position points (indicated by X), forming a circular area on the right is the mean coordinate position point is the hidden area Z′ 0 within a radius of one kilometer from the center of the circle.

在本实施例中,将隐匿区域Z′0半径至Dmax=3km,生成推荐区域。推荐区域与隐匿区域的关系如图4所示,图4中内圆形区域是隐匿区域,半径为dmax,包括隐匿区域在内的半径为Dmax的整个圆形区域为推荐区域。推荐区域可以描述为用户均值坐标位置点为圆心,一个半径为Dmax圆形区域,隐匿区域也是一个以用户均值坐标位置点为圆心的圆形区域,用用户均值坐标位置点代表整个隐匿区域的位置,虽然用户位置被隐匿,但是对查询用户的推荐服务是一个与隐匿区域有很大重叠的圆形区域,所以说,对查询用户位置隐私保护的同时还能给查询用户提供优质的推荐服务,保证数据的可用性。In this embodiment, the radius of the concealed area Z′ 0 is set to Dmax=3km to generate a recommended area. The relationship between the recommended area and the hidden area is shown in Figure 4. In Figure 4, the inner circular area is the hidden area with a radius of dmax, and the entire circular area with a radius of Dmax including the hidden area is the recommended area. The recommended area can be described as the user mean coordinate position point is the center of the circle, a circular area with a radius of Dmax, and the hidden area is also a position point based on the user's mean value coordinates is the circular area with the center of the circle, using the user mean coordinate position point Represents the location of the entire hidden area. Although the user's location is hidden, the recommendation service for the querying user is a circular area with a large overlap with the hidden area. Therefore, while protecting the privacy of the querying user's location, it can also give the querying user Provide high-quality recommendation services and ensure data availability.

在本实施例中,将应用服务器把用户均值坐标位置点三公里范围内所有的饭店分为分为正负例样本(购买的为正例样本、浏览没购买的为负例样本),抽取商家特征,特征包括是否停车、面积、价格、用户评分……等,然后利用逻辑回归算法的随机梯度下降法对正负例样本进行训练,得到商家的特征和权重,最后获取查询用户的历史记录,得到查询用户历史购买商家记录,对推荐区域Z1内商家排序即获得个性化推荐列表。In this embodiment, the application server will put the user's mean value coordinate position point All restaurants within a three-kilometer radius are divided into positive and negative samples (purchased ones are positive samples, and those browsed but not purchased are negative samples), and the characteristics of the merchants are extracted, including whether parking, area, price, user rating... etc., and then use the stochastic gradient descent method of the logistic regression algorithm to train the positive and negative samples to obtain the characteristics and weights of the merchants, and finally obtain the historical records of the query user to obtain the historical purchase merchant records of the query user. For the merchants in the recommended area Z1 Sort to get a personalized recommendation list.

图5展示了在三个不同时刻,当查询用户发送位置服务请求,隐匿区域Z0与基于均值坐标位置点形成的轨迹,圆心位置(黑原点)是查询用户真实位置P0,黑三角形是生成的隐匿区域Z′0的圆心二者不同,从而隐匿了查询用户的位置。Figure 5 shows that at three different moments, when the querying user sends a location service request, the hidden area Z 0 and the location point based on the mean coordinates The formed trajectory, the position of the center of the circle (black origin) is the real position P 0 of the query user, and the black triangle is the center of the generated hidden area Z′ 0 The two are different, thereby hiding the location of the querying user.

位置K匿名算法是一种普遍采用的位置隐私和查询隐私保护方法,该方法就是把查询用户在一定区域范围内与其他k-1个用户一起发送给位置服务器,这样就难以判断出真实的查询用户。位置K匿名算法对单个查询用户位置的隐私保护效果不错,但是不适合连续查询。图6是连续查询攻击:当攻击者截获查询用户不同时刻位置查询信息,通过观察不同时刻申请查询中包含的不同位置,对查询用户位置连续时刻查询求交集,从而算出查询用户的真实位置信息。The location K anonymous algorithm is a commonly used location privacy and query privacy protection method. This method is to send the query user to the location server together with other k-1 users within a certain area, so that it is difficult to judge the real query user. The location K anonymity algorithm has a good privacy protection effect on the location of a single query user, but it is not suitable for continuous query. Figure 6 is a continuous query attack: when the attacker intercepts the query user's location query information at different times, by observing the different locations included in the application query at different times, and intersecting the query user's location at consecutive time queries, the real location information of the query user is calculated.

如图6所示:攻击者通过对位置信息四个时刻发起连续查询,t1时刻查询匿名位置信息得到的是(A,B,D,E,F),t2(A,B,G,C,D),t3(A,B,C,E,G),t4(A,C,E,G,F)。在这些位置点中要找出A,虽然每次查询只能得到一个匿名集,不能分辨出到底是谁发起的位置请求,但是通过对这四个时刻查询的位置集合求交集就能辨认出A。As shown in Figure 6: the attacker initiates continuous query of the location information at four times, and the anonymous location information obtained at time t1 is (A, B, D, E, F), and at t2 (A, B, G, C, D), t3(A,B,C,E,G), t4(A,C,E,G,F). To find A in these location points, although each query can only get an anonymous set, it is impossible to tell who initiated the location request, but A can be identified by intersecting the location sets queried at these four times .

图7是最大速度攻击示意图,它是背景知识攻击的一种,在T1时刻用户C发起位置查询,随后便生成两个假位置点A、B,并生成匿名区域S1;在T2时刻用户C再次发起位置查询,同样生成匿名区域S2。如果这时候攻击者获取到用户的交通方式,从而可以大致推断出用户的速度为V,根据速度可以求得用户在T1带T2时刻能够到达的最大范围P,从而可以推理出P与S2的交集便是用户能够去到的真实区域,进一步得到真实位置点C。通过本发明对位置坐标隐匿处理,可以很好的防御连续查询攻击和最大速度攻击。Figure 7 is a schematic diagram of the maximum speed attack, which is a kind of background knowledge attack. At T1, user C initiates a location query, and then generates two fake locations A and B, and generates an anonymous area S1; at T2, user C again A location query is initiated, and an anonymous area S2 is also generated. If the attacker obtains the user's transportation mode at this time, it can be roughly inferred that the user's speed is V, and according to the speed, the maximum range P that the user can reach between T1 and T2 can be obtained, so that the intersection of P and S2 can be inferred It is the real area that the user can go to, and the real location point C is further obtained. Through the hidden processing of the position coordinates in the present invention, the continuous query attack and the maximum speed attack can be well defended.

图8展示的是经过本发明处理后,第三方接收到的查询用户的位置轨迹信息,由于本发明对用户位置进行泛化处理,第三方只能接收到查询用户的位置信息为圆形的隐匿区域,其圆心位置是均值坐标位置点而查询用户真实位置P0被隐匿,攻击者无法确定该真实位置。Figure 8 shows the location trajectory information of the querying user received by the third party after the processing of the present invention. Since the present invention performs generalized processing on the user's location, the third party can only receive the hidden location information of the querying user as a circle. area, whose center position is the mean coordinate position point However, the query user's real location P0 is hidden, and the attacker cannot determine the real location.

通过发明提出的基于位置坐标均值算法对查询用户真实位置P0隐匿处理,采用基于Shannon熵理论来衡量算法的匿名程度,首先给出香农熵的定义:By inventing and proposing an algorithm based on the mean value of location coordinates, the real location P 0 of the query user is concealed, and Shannon entropy theory is used to measure the degree of anonymity of the algorithm. First, the definition of Shannon entropy is given:

设随机变量x是有限集合X中的取值,那么随机变量x的熵的定义为:Suppose a random variable x is a value in a finite set X, then the entropy of a random variable x is defined as:

p(x)为当变量值为x时的概率。攻击者对隐私信息发起攻击,成功攻破隐私信息为一个事件集X,攻击者成功识破某个用户的隐私信息是事件集中的某一个事件x,那么隐私保护程度就可以通过攻击者成功攻击用户的信息熵来度量。位置K匿名算法在传统的位置隐私保护中是应用最为广泛的算法,实验将本发明和位置K匿名算法在隐私保护度上来度量。p(x) is the probability when the value of the variable is x. The attacker launches an attack on the private information and successfully breaks the private information into an event set X, and the attacker successfully finds out that a user's private information is an event x in the event set, then the degree of privacy protection can pass the attacker's successful attack on the user's Measured by information entropy. The location K anonymous algorithm is the most widely used algorithm in the traditional location privacy protection, and the experiment measures the degree of privacy protection of the present invention and the location K anonymous algorithm.

当无背景知识时,攻击者能够成功获得用户位置信息的概率:When there is no background knowledge, the probability that an attacker can successfully obtain user location information:

如果设置Q为攻击者拥有的单条轨迹的背景知识的权重值,1≤Q≤n。攻击者可能掌握区域内某些位置点的背景知识,那么掌握背景知识的节点位置隐私被攻击者成功获取的概率为Q/n+1或Q/k+1,设m为一次查询中在匿名区域内攻击者掌握的背景知识的节点个数,攻击者不通过背景知识能够获得用户位置信息的概率为:If Q is set as the weight value of the background knowledge of a single trajectory owned by the attacker, 1≤Q≤n. The attacker may have the background knowledge of certain locations in the area, so the probability that the location privacy of the node with the background knowledge is successfully obtained by the attacker is Q/n+1 or Q/k+1, let m be the anonymous The number of nodes with background knowledge mastered by the attacker in the area, the probability that the attacker can obtain user location information without background knowledge is:

式中Qi表示攻击者根据第i个用户掌握的,当权值Qi=1时,表示攻击者没有掌握任何有用的背景知识,Qi=n表示攻击者已经掌握足够的背景知识完全能够确定用户的位置信息。通过计算概率,根据信息熵来度量隐私保护程度,熵值越大表示隐私保护程度越好。In the formula, Q i means that the attacker has mastered it according to the i-th user. When the weight Q i =1, it means that the attacker has not mastered any useful background knowledge. Qi = n means that the attacker has mastered enough background knowledge to be able to Determine the user's location information. By calculating the probability, the degree of privacy protection is measured according to the information entropy. The larger the entropy value, the better the degree of privacy protection.

图9为攻击者在没有掌握背景知识情况下,本发明与位置K匿名算法的隐私保护度对比,这里的隐私保护度是依靠上文提到的信息熵来表示,横坐标k表示位置K匿名算法中k个近邻节点,纵坐标H/bit表示信息熵的值。当攻击者掌握一定的背景知识时,本发明与位置K匿名算法的隐私保护度对比图如图10所示。从图10中可以看出,在攻击者无背景知识情况下,本发明的隐私保护度是强于位置K匿名算法。Figure 9 is a comparison of the privacy protection degree of the present invention and the position K anonymous algorithm without the attacker having background knowledge. The privacy protection degree here is represented by the information entropy mentioned above, and the abscissa k represents position K anonymity In the algorithm, there are k neighbor nodes, and the vertical coordinate H/bit represents the value of information entropy. When the attacker has certain background knowledge, the privacy protection degree comparison between the present invention and the position K anonymous algorithm is shown in Fig. 10 . It can be seen from Fig. 10 that the privacy protection degree of the present invention is stronger than that of the position K anonymous algorithm when the attacker has no background knowledge.

推荐准确率可以定义为:提取出的正确的信息条数除以提取的信息条数,由于本发明是分类算法实现的推荐系统,准确率可以定义为:提取出的正类样本个数除以提取的总个数。为了衡量位置隐匿处理后对推荐系统的影响,所以将没有隐匿处理和通过隐匿处理后的推荐准确度进行对比,如图11所示:图11中为五次发起推荐请求,将有位置隐匿情况下推荐的准确率和无隐匿情况下进行对比,从图中可以看出,隐匿处理后的数据对推荐准确率的影响并不大,推荐准确率始终可以保持在90%以上。Recommendation accuracy can be defined as: the number of correct information extracted divided by the number of information extracted, since the present invention is a recommendation system implemented by a classification algorithm, accuracy can be defined as: the number of positive samples extracted divided by The total number of extractions. In order to measure the impact on the recommendation system after location concealment processing, the recommendation accuracy without concealment processing is compared with that after concealment processing, as shown in Figure 11: Figure 11 is five recommendation requests initiated, and there will be location concealment Comparing the recommended accuracy rate with that without concealment, it can be seen from the figure that the hidden data has little effect on the recommendation accuracy rate, and the recommendation accuracy rate can always be maintained above 90%.

尽管上面对本发明说明性的具体实施方式进行了描述,以便于本技术领域的技术人员理解本发明,但应该清楚,本发明不限于具体实施方式的范围,对本技术领域的普通技术人员来讲,只要各种变化在所附的权利要求限定和确定的本发明的精神和范围内,这些变化是显而易见的,一切利用本发明构思的发明创造均在保护之列。Although the illustrative specific embodiments of the present invention have been described above, so that those skilled in the art can understand the present invention, it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, As long as various changes are within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

Claims (2)

1. a kind of personalized recommendation method based on location privacy protection, which comprises the following steps:
(1), secret area is generated according to inquiry user location
1.1), location server receives inquiry user and sends location service request Q={ P0(x, y), c, query }, wherein P0(x, It y) is inquiry user's actual position, (x, y) is its coordinate, and c is the secret protection degree of user setting, and c > 1, query are user The service request information of transmission;
1.2), to inquire user's actual position P0(x, y) is the center of circle, and radius is that dmax generates secret area Z0, wherein radius Dmax=R × c, R are protection factor;
1.3), determine secret area Z0Intra domain user actual position P0Whether the neighbor positions point number n of (x, y) meets n > k, if It is unsatisfactory for, needs k-n location point of radom insertion, wherein k is that position needed for secret area is counted, according to specific implementation situation It determines;
(2), according to inquiry user's actual position P0(x, y) neighbor positions point recalculates secret area
2.1), location server selectes secret area Z at random0K neighbor positions point;
2.2) coordinate of k neighbor positions point, and coordinates computed mean value, are obtained, formula is passed through
Obtain HCCI combustion location pointWherein, xi,yiFor i-th of coordinate of k location point;
2.3), location server is with HCCI combustion location pointFor the center of circle, dmax is radius, regenerates secret area Z '0, and Entire secret area Z '0It is sent to application server as user current location, meanwhile, service request information is also sent to Application server;
(3), businessman near recommended user
3.1), application server is by secret area Z '0Radius generates to Dmax and recommends region Z1
3.2), the service request information query that application server is sent according to user buys merchant record in conjunction with user's history, To recommendation region Z1Interior businessman's sequence obtains personalized recommendation list and returns to inquiry user.
2. the personalized recommendation method according to claim 1 based on location privacy protection, which is characterized in that application service Device needs to be trained the feature and weight of businessman, obtains the feature and weight of businessman before being ranked up to businessman:
The businessman that purchase number is more in application server database is extracted, is divided into positive and negative example sample, wherein purchase is positive example The sample that is negative that sample, browsing are not bought extracts businessman feature, and feature includes whether parking, area, price, user's scoring, Then positive and negative example sample is trained using the stochastic gradient descent method of logistic regression algorithm, obtains the feature and power of businessman Weight.
CN201710260761.4A 2017-04-20 2017-04-20 A kind of personalized recommendation method based on location privacy protection Active CN107133527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710260761.4A CN107133527B (en) 2017-04-20 2017-04-20 A kind of personalized recommendation method based on location privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710260761.4A CN107133527B (en) 2017-04-20 2017-04-20 A kind of personalized recommendation method based on location privacy protection

Publications (2)

Publication Number Publication Date
CN107133527A CN107133527A (en) 2017-09-05
CN107133527B true CN107133527B (en) 2019-10-29

Family

ID=59715731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710260761.4A Active CN107133527B (en) 2017-04-20 2017-04-20 A kind of personalized recommendation method based on location privacy protection

Country Status (1)

Country Link
CN (1) CN107133527B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525933B (en) * 2018-11-16 2020-02-04 中国科学院信息工程研究所 Location privacy protection method and device
CN110825955B (en) * 2019-06-27 2024-06-25 安徽师范大学 Distributed differential privacy recommendation method based on location service
CN112711702A (en) * 2019-10-25 2021-04-27 华为技术有限公司 Recommendation method based on user privacy data, and apparatus, medium, and system thereof
CN112367662B (en) * 2020-12-07 2022-12-27 河南科技大学 Location offset-based all-fake k anonymous location privacy protection method in Internet of vehicles
CN113792329B (en) * 2021-08-12 2023-04-07 荣耀终端有限公司 Permission optimization method and related equipment
CN113626714B (en) * 2021-08-23 2024-09-03 支付宝(杭州)信息技术有限公司 Service information display method, device and equipment based on privacy protection
CN114146413B (en) * 2021-11-29 2024-09-27 腾讯科技(深圳)有限公司 Virtual object control method, device, equipment, storage medium and program product
CN114004664A (en) * 2022-01-05 2022-02-01 杭州车凌网络科技有限公司 APP software interaction method based on SaaS platform
CN115017395A (en) * 2022-07-27 2022-09-06 华控清交信息科技(北京)有限公司 Merchant inquiry method, device and device for merchant inquiry

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873317A (en) * 2010-06-07 2010-10-27 孟小峰 Position privacy protection method for perceiving service quality
CN103428688A (en) * 2013-07-23 2013-12-04 浙江工商大学 Continuous location-based service privacy protection method for vehicle-mounted self-organizing network
CN104050267A (en) * 2014-06-23 2014-09-17 中国科学院软件研究所 Individuality recommendation method and system protecting user privacy on basis of association rules
CN104618864A (en) * 2015-01-26 2015-05-13 电子科技大学 False location based privacy protection method in location service
CN105307111A (en) * 2014-07-07 2016-02-03 南京理工大学常熟研究院有限公司 Position privacy protection method based on incremental neighbour inquiry
CN106209813A (en) * 2016-07-05 2016-12-07 中国科学院计算技术研究所 A kind of method for secret protection anonymous based on position and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873317A (en) * 2010-06-07 2010-10-27 孟小峰 Position privacy protection method for perceiving service quality
CN103428688A (en) * 2013-07-23 2013-12-04 浙江工商大学 Continuous location-based service privacy protection method for vehicle-mounted self-organizing network
CN104050267A (en) * 2014-06-23 2014-09-17 中国科学院软件研究所 Individuality recommendation method and system protecting user privacy on basis of association rules
CN105307111A (en) * 2014-07-07 2016-02-03 南京理工大学常熟研究院有限公司 Position privacy protection method based on incremental neighbour inquiry
CN104618864A (en) * 2015-01-26 2015-05-13 电子科技大学 False location based privacy protection method in location service
CN106209813A (en) * 2016-07-05 2016-12-07 中国科学院计算技术研究所 A kind of method for secret protection anonymous based on position and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于坐标变换的 k 匿名位置隐私保护方法;林少聪等;《小型坐标变换的K米明位置隐私保护方法》;20160131;第119-123页 *

Also Published As

Publication number Publication date
CN107133527A (en) 2017-09-05

Similar Documents

Publication Publication Date Title
CN107133527B (en) A kind of personalized recommendation method based on location privacy protection
Wu et al. A location privacy-preserving system based on query range cover-up or location-based services
Luo et al. Blockchain enabled trust-based location privacy protection scheme in VANET
CN103746957B (en) Trust evaluation system based on privacy protection and construction method thereof
Yang et al. Density-based location preservation for mobile crowdsensing with differential privacy
CN107360551B (en) Location privacy protection method based on differential privacy in vehicle-mounted self-organizing network
Wang et al. Privacy protection in mobile crowd sensing: a survey
US20090030778A1 (en) System, method and apparatus for secure multiparty location based services
CN108600271B (en) A privacy protection method for trust status assessment
CN112035880B (en) Track privacy protection service recommendation method based on preference perception
Xiong et al. Reward-based spatial crowdsourcing with differential privacy preservation
CN107862219A (en) The guard method of demand privacy in a kind of social networks
Piao et al. User privacy protection for a mobile commerce alliance
CN105245345A (en) A highly reliable sensing data collection algorithm based on the anonymous reputation of mobile sensing users in crowd sensing
Liu et al. A privacy-preserving framework for trust-oriented point-of-interest recommendation
CN110765472A (en) Location privacy protection method based on block chain and distributed storage
CN111797433A (en) A Differential Privacy-Based LBS Service Privacy Protection Method
Wang et al. Protecting multi-party privacy in location-aware social point-of-interest recommendation
Li et al. Secure semantic-aware search over dynamic spatial data in VANETs
CN113254743B (en) A secure semantic-aware search method for dynamic spatial data in Internet of Vehicles
CN111259434B (en) Privacy protection method for individual preference position in track data release
Zhang et al. A novel attributes anonymity scheme in continuous query
CN110430526A (en) Method for secret protection based on credit assessment
CN114166229B (en) Healthy travel route planning system based on redundant defense avoidance algorithm
Mouratidis Strong location privacy: A case study on shortest path queries

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant