CN108449335A - A kind of location-based service method for secret protection and system based on range cover - Google Patents
A kind of location-based service method for secret protection and system based on range cover Download PDFInfo
- Publication number
- CN108449335A CN108449335A CN201810212081.XA CN201810212081A CN108449335A CN 108449335 A CN108449335 A CN 108449335A CN 201810212081 A CN201810212081 A CN 201810212081A CN 108449335 A CN108449335 A CN 108449335A
- Authority
- CN
- China
- Prior art keywords
- range
- user
- inquiry
- sequence
- query
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000004224 protection Effects 0.000 title claims abstract description 77
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000010276 construction Methods 0.000 claims abstract description 24
- 230000009466 transformation Effects 0.000 claims description 8
- 238000012216 screening Methods 0.000 claims description 4
- 230000000875 corresponding effect Effects 0.000 description 50
- 230000008859 change Effects 0.000 description 9
- 230000002633 protecting effect Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 238000007418 data mining Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 101100391182 Dictyostelium discoideum forI gene Proteins 0.000 description 1
- 206010068052 Mosaicism Diseases 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 210000003765 sex chromosome Anatomy 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of location-based service method for secret protection covered based on range and systems.The method covers scale sequence, makes its satisfaction for user's query context sequence, construction inquiry:The inquiring position sequence of user's query context sequenceThe inquiring position sequence that scale sequence is covered with inquiry meets the constraint of position enquiring relevance;The inquiry covers corresponding subsequence in scale sequence and meets cover range accuracy;The inquiry covers corresponding subsequence in scale sequence and meets cover range high efficiency;The inquiry covers corresponding subsequence in scale sequence and meets cover wide security.The system comprises the location privacy protection servers being arranged between user terminal and location server;For for given user's query context sequence, construction inquiry to cover scale sequence, submits to location server and obtain return query result, screen as the query result in user's query context and return to user.The present invention has effectively achieved LBS inquiry secret protections.
Description
Technical field
The invention belongs to networks to service secret protection technical field, more particularly, to a kind of position covered based on range
Set service privacy protection method and system.
Background technology
With the development of wireless communication and mobile positioning technique, more and more mobile devices have GPS positioning work(
It can so that location-based service (LBS) increased popularity, it has become towards one of most promising service of mobile subscriber.LBS refers to base
In the geographical location information that positioning of mobile equipment function is provided, the various information inquiry service provided to the user is typical
Using including mainly:Convenience store nearby is such as inquired in map class application, such as Google Maps, and the inquiry based on point of interest.Mesh
Before, LBS achieves immense success in social commercial field, it was reported that global LBS relative commercials application annual earnings have surpassed
Cross 15,000,000,000 dollars.It is asked safely however, LBS while bringing huge convenient to individual, has also caused serious location privacy
Topic.Because user is when obtaining location-based service, it usually needs report their current geographic position, i.e. inquiring position.These positions
Confidence ceases highly sensitive privacy, and the personal whereabouts of user can be accurately inferred to using them.These sensitive individual subscriber whereabouts
It is leaked to insincere third party, such as LBS providers, serious threat will certainly be constituted safely to the location privacy of user.LBS
The concern that is just causing people increasingly extensive of location privacy safety problem, how to be effectively protected the LBS location privacies peace of user
Have become a urgent problem to be solved entirely.
In order to protect the location privacy of LBS safe, researcher has been presented for many methods, including:Assumed name method, fuzz method,
Enciphered method and dummy argument method etc..(1) assumed name method refers to that the assumed name that the user identifier in inquiring LBS is constructed temporarily with one replaces,
To cut off the contact between user and inquiry.However, assumed name method is subject to the threat of data mining, and due to user's body
Part is hidden, this is also an obstacle to needing the application of authentication.(2) fuzz method refers to extensive (using hidden area) or disturbs
Location information in dynamic (using noise) user's inquiry so that attacker's None- identified goes out user's specific location.Due to issuing clothes
Be engaged in device is modified inquiry, and the accuracy of service can be reduced when many.In addition, assumed name method and fuzz method generally rely on
In trusted third party's anonymous server, this is easy to cause performance bottleneck and privacy bottleneck.(3) enciphered method refers to by using encryption
Technology makes user's inquiry completely invisible to server, typical as being based on privacy information to achieve the purpose that secret protection
Retrieve the LBS enciphered methods of (PIR).But enciphered method usually require that change server LBS algorithms, and need additional hardware and
The support of complicated algorithm reduces the actual availability of method.(4) dummy argument method is before inquiry is exposed to server, in advance
Dummy argument is added, and dummy argument inquiry and true inquiry are submitted together so that server is difficult to obtain user's actual position.This kind of skill
Art depends on the construction quality of dummy argument, is prone to the supposition attack based on data distribution characteristics.
In conclusion effective LBS location privacy method for security protection needs the requirement for meeting the following aspects.(1)
The safety for ensureing user location privacy, even if that is, attacker has grasped abundant priori, it is also difficult to from LBS search sequences
In be inferred to the actual position track of user.(2) ensure that the accuracy of the final LBS query results of mobile subscriber, i.e. comparison introduce
Privacy Preservation Mechanism it is front and back, the finally obtained service result of user should be consistent.(3) actual availability of LBS is not damaged,
I.e. Privacy Preservation Mechanism does not require to change the LBS algorithms of server end, does not need additional hardware supported, will not look into LBS
The execution efficiency of inquiry, which constitutes conspicuousness, to be influenced.Wherein, it is desirable that (2) and (3) is required actually to require location privacy protection method
Client user and server end LBS algorithms are realized fully transparent.The more safe and reliable and availability height there is still a need for exploitation
Position enquiring method for secret protection and system.
Invention content
For the disadvantages described above or Improvement requirement of the prior art, the present invention provides a kind of position clothes covered based on range
Business method for secret protection and system, its object is to cover range by constructing to inquire, before location-based service high efficiency is controllable
It puts, effective protection location-based service personal secrets, thus solves to need exist for developing more safe and reliable and availability height
Position enquiring method for secret protection and the technical issues of system.
To achieve the above object, according to one aspect of the present invention, a kind of location-based service covered based on range is provided
Method for secret protection, for given user's query context sequenceRange sequence is covered in construction inquiry
RowSo that the inquiry covers scale sequence and meets the following conditions simultaneously:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceIts corresponding inquiry is covered
The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same
Position, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith
ThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and covers wide security.
Preferably, the location-based service method for secret protection covered based on range, the condition 3 are i.e. arbitraryMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Preferably, the location-based service method for secret protection covered based on range, the condition 4 are i.e. arbitraryMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,For inquiry
Cover corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence
The arbitary inquiry P of rowkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context
The distance between central point, α are distance threshold.
Preferably, the location-based service method for secret protection covered based on range, inquiry cover range according to
Following method construct:
(1) data acquisition:Obtain user's current queries range P, user's history query context sequence And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains:For the user's history query context sequence obtained in step (1)In appoint
One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L are identical as the central point P@L of user's current queries range, then described to go through
Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake
Range P is covered for user's current queries range P respective queries*Inquiring position, i.e.,:
Or
The level r=1,2 of the band of position is traversed ..., rm, for the band of position D that arbitrary levels are r, when it is wrapped simultaneously
P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*It falls in the history
Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraints:User's current queries range P respective queries cover range P*For
Central point isQuery context or in level be r band of position D*In;
(3) candidate query range set is obtained:Obtain it is all meet in step (2) or position enquiring relevance constraint item
Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if
:
(4) it obtains inquiry and covers range:For the candidate query range set that step (3) obtains, preferential according to safety,
The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*;
When according to the preferential search strategy search user's current queries range P respective queries cover range P of safety*When,
User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3)
Privacy server end the highest candidate query range of safety coefficient, i.e.,:
When according to the preferential search strategy search user's current queries range P respective queries cover range P of high efficiency*When,
User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3)
The highest candidate query range of location-based service efficiency caused by protection, i.e.,:
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When,
User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3)
Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, i.e.,:
Preferably, the structure of range is covered in the location-based service method for secret protection covered based on range, the inquiry
The method of making further includes step:
(5) query context is covered in stochastic transformation:For the cover query context P obtained in step (4)*=(P*@L,P*@
R), by the radius for covering query context be extended at random 1.0~1.2 times and as after expansion cover query context radius,
The cover query context after random expanded scope is obtained, the cover query context as user's query context P constructions.
Other side according to the invention provides a kind of location-based service intimacy protection system covered based on range,
It includes the location privacy protection server being arranged between user terminal and location server;The location privacy protection service
Device is trusted client, for for given user's query context sequenceConstruction inquiry is covered
Scale sequenceInquiry cover scale sequence is submitted into location server, and obtains position
It sets server and returns to query result, be the query result in user's query context by query result screening, and return to use
Family.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceIts corresponding inquiry is covered
The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same
Position, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith
ThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;
The level in region is higher, and the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and covers wide security.
Preferably, the location-based service intimacy protection system covered based on range, the condition 3 are i.e. arbitraryMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Preferably, the location-based service intimacy protection system covered based on range, the condition 4 are i.e. arbitraryMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,For inquiry
Cover corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence
The arbitary inquiry P of rowkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context
The distance between central point, α are distance threshold.
Preferably, the location-based service intimacy protection system covered based on range, the position covered based on range
Service intimacy protection system is set, including:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about
Beam condition:User's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer
The secondary band of position D for r*In;It is preferred that including the first submodule and the second submodule;First submodule is used to look into when it
Ask the central point P of rangekWhen@L are identical as the central point P@L of user's current queries range, then the historical query scale sequence
In inquiry PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries
Range P respective queries cover range P*Inquiring position, i.e.,:The second submodule is for traversing position
The level r=1,2 in region is set ..., rm, for the band of position D that arbitrary levels are r, when it comprising present scope P and goes through simultaneously
History query context Pk, then user's current queries range P respective queries cover range P*It falls in the historical query range PkHistory
Cover rangeThe level at place is the band of position D of r*In;
Candidate query range set acquisition module, for obtaining all satisfaction inquiry relevance constraintss, covering range
Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Range acquisition module is covered in inquiry, for from candidate query range set, according to the search strategy that user selects,
It searches for user's current queries range P respective queries and covers range P*;Including:Safety first search submodule, for according to peace
The preferential search strategy search user's current queries range P respective queries of full property cover range P*:By candidate query range set
Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end
Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency
Query context P respective queries cover range P*:By the highest candidate query model of location-based service efficiency in candidate query range set
It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony
Preferential search strategy search user's current queries range P respective queries cover range P*:It will be used in candidate query range set
Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user
Preceding query context P respective queries cover range P*。
Preferably, the location-based service intimacy protection system covered based on range, the position covered based on range
Service intimacy protection system is set, further includes:Stochastic transformation module is looked into for covering the cover that range acquisition module obtains to inquiry
Ask range P*=(P*@L,P*@R), the radius for covering query context is extended to 1.0~1.2 times at random and as covering after expansion
The radius of lid query context obtains the cover query context after random expanded scope, the cover as user's query context P constructions
Query context.
In general, through the invention it is contemplated above technical scheme is compared with the prior art, can obtain down and show
Beneficial effect:
Method and system energy provided by the invention:(1) ensure that the safety of location privacy, i.e. attacker are difficult to according to priori
Knowledge analyzes the true inquiring position or query context of user from LBS request sequences.(2) ensure the efficient of location-based service
Property, i.e. secret protection will not influence too much the overall performance of location-based service.(3) ensure the accuracy of location-based service, i.e.,
Before and after comparing secret protection, the location-based service result that user obtains is consistent.(4) availability of protective position service, i.e., it is hidden
Private protection does not change the LBS algorithms of server-side, does not change existing LBS framework, does not change the existing use habit of user yet..
Description of the drawings
Fig. 1 is the location-based service intimacy protection system structural schematic diagram provided by the invention covered based on range;
Fig. 2 is the location-based service method for secret protection query result schematic diagram provided by the invention covered based on range.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.As long as in addition, technical characteristic involved in the various embodiments of the present invention described below
It does not constitute a conflict with each other and can be combined with each other.
Meaning LBS inquiries of the invention are represented by E=(U, A, T, P), wherein:U is user label;A is querying attributes
(such as hospital, hotel);T is corresponding timestamp when submitting inquiry;P is inquiring position and relevant parameter.Inquiry request E associations
Query context P be represented by a border circular areas, i.e. P is represented by P=(P@L, P@R), wherein P@L indicate range center
Point position, P R indicate the radius of circular scope.The location service request that query context sequence is initiated whithin a period of time by user
The query context contained is constituted, and can be denoted asWherein, Pk(k=1,2 ..., n) indicate one
Query context.The query context center that inquiring position sequence is contained by the location service request that user initiates whithin a period of time
Point is constituted, and can be denoted asWherein, Lk=Pk@L indicate an inquiring position.
The location-based service method for secret protection provided by the invention covered based on range, specially:For given user
Query context sequenceScale sequence is covered in construction inquiry So that institute
Inquiry is stated to cover scale sequence while meeting the following conditions:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceIts corresponding inquiry is covered
The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same
Position, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith
ThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;
The level in region is higher, and the position that it includes is also more, possesses highest level rmThe band of position, that is, entire map, belong to
The bands of position same level r collection is combined intoIt meets following characteristics:
Feature 1, any two same level band of position is non-intersecting, i.e.,:
Feature 2, any two same level region area is equal, i.e. (wherein, AR indicates region area):
The union of feature 3, all same level bands of position is equal to map itself, i.e.,:
Feature 4, arbitrary region are both contained in the region of some higher, i.e.,:
In fact, there is the associations of very strong position between the inquiry request that same user is initiated whithin a period of time
Property.It is mainly manifested in, these inquiry requests usually surround several fixed positions or region (such as user's residence or unit) and send out
It rises.The attacker for knowing abundant background knowledge is easy to know this relevance rule between user's inquiring position, and accordingly
Come reduce privacy methods construction cover range area, to reduce user location privacy insincere server end safety
Property.Illustrate the problem below by way of a simply example.Assuming that attacker has grasped, user is in two different time points
The inquiry request submitted surrounds the same fixed position and initiates (being assumed to be P@L).Assuming that privacy methods are asked for the two
Constructing the cover range generated is respectivelyWithDue to covering rangeWithLocation-based service accuracy is must satisfy, because
This,So according to priori, attacker it could be assumed that:
Therefore, range is covered to be reduced into the protecting effect of position personal secretsI.e. in inquiry service twice, attacker
Eliminable cover range is respectively:WithSo that defining the 4 cover models provided
It encloses safety and is unable to get guarantee.
Therefore to consider the association sex chromosome mosaicism between user's inquiring position, i.e., the position initiated whithin a period of time with user
Inquiry request sequence is research unit so that constructing should also show to accord between the center of the cover scale sequence of generation
It shares family and really inquires the position relevance of rule (for example, in the preceding example, covering rangeWithSimilarly surround phase
It is initiated with position, i.e.,), so that attacker is difficult to reduce cover range, reduce the guarantor for covering range
Protect effect.
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and cover range high efficiency, i.e., arbitrarilyMeetWherein ρ is to cover
Range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and cover wide security, i.e., arbitrarilyMeetWherein μ is to cover
Lid wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,For inquiry
Cover corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence
The arbitary inquiry P of rowkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context
The distance between central point, α are distance threshold, when cover range centerWith user's inquiring position PkDistance between@L is super
When crossing the threshold value, attacker can not know the true inquiring position of user or range substantially, and the safety of location privacy at this time reaches
Peak (i.e. 1.0).
The inquiry is covered range and can be constructed as follows:
(1) data acquisition:Obtain user's current queries range P, user's history query context sequence And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains:For the user's history query context sequence obtained in step (1)In appoint
One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L are identical as the central point P@L of user's current queries range, then described to go through
Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake
Range P is covered for user's current queries range P respective queries*Inquiring position, i.e.,:
Or
The level r=1,2 of the band of position is traversed ..., rm, for the band of position D that arbitrary levels are r, when it is wrapped simultaneously
P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*It falls in the history
Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraints:User's current queries range P respective queries cover range P*For
Central point isQuery context or in level be r band of position D*In;
(3) candidate query range set is obtained:Obtain it is all meet in step (2) or position enquiring relevance constraint item
Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if
:
(4) it obtains inquiry and covers range:For the candidate query range set that step (3) obtains, preferential according to safety,
The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*;
When according to the preferential search strategy search user's current queries range P respective queries cover range P of safety*When,
User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3)
Privacy server end the highest candidate query range of safety coefficient, i.e.,:
When covering range P* according to the preferential search strategy search user's current queries range P respective queries of high efficiency,
User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3)
The highest candidate query range of location-based service efficiency caused by protection, i.e.,:
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When,
User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3)
Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, i.e.,:
Preferably, in order to further improve the security, further include that query context is covered in step (5) stochastic transformation:For step
Suddenly the cover query context P obtained in (4)*=(P*@L,P*@R), the radius for covering query context is extended to 1.0 at random~
1.2 times and as after expansion cover query context radius, obtain the cover query context after random expanded scope, as with
The cover query context of family query context P constructions.
It is provided by the invention based on range cover location-based service intimacy protection system, as shown in Figure 1, including setting with
Location privacy protection server between family terminal and location server;The location privacy protection server is credible client
End, for for given user's query context sequence Scale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server
Query result is returned, is the query result in user's query context by query result screening, and return to user.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceIts corresponding inquiry is covered
The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same
Position, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith
ThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;
The level in region is higher, and the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and cover range high efficiency, i.e., arbitrarilyMeetWherein ρ is to cover
Range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence
RowMeet and cover wide security, i.e., arbitrarilyMeetWherein μ is to cover
Lid wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,For inquiry
Cover corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence
The arbitary inquiry P of rowkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context
The distance between central point, α are distance threshold, when cover range centerWith user's inquiring position PkDistance between@L is super
When crossing the threshold value, attacker can not know the true inquiring position of user or range substantially, and the safety of location privacy at this time reaches
Peak (i.e. 1.0).
Preferably, the location-based service intimacy protection system covered based on range, including:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about
Beam condition:User's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer
The secondary band of position D for r*In;It is preferred that including the first submodule and the second submodule;First submodule is used to look into when it
Ask the central point P of rangekWhen@L are identical as the central point P@L of user's current queries range, then the historical query scale sequence
In inquiry PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries
Range P respective queries cover range P*Inquiring position, i.e.,:The second submodule is for traversing position
The level r=1,2 in region is set ..., rm, for the band of position D that arbitrary levels are r, when it comprising present scope P and goes through simultaneously
History query context Pk, then user's current queries range P respective queries cover range P*It falls in the historical query range PkHistory
Cover rangeThe level at place is the band of position D of r*In;
Candidate query range set acquisition module, for obtaining all satisfaction inquiry relevance constraintss, covering range
Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Range acquisition module is covered in inquiry, for from candidate query range set, according to the search strategy that user selects,
It searches for user's current queries range P respective queries and covers range P*;Including:Safety first search submodule, for according to peace
The preferential search strategy search user's current queries range P respective queries of full property cover range P*:By candidate query range set
Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end
Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency
Query context P respective queries cover range P*:By the highest candidate query model of location-based service efficiency in candidate query range set
It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony
Preferential search strategy search user's current queries range P respective queries cover range P*:It will be used in candidate query range set
Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user
Preceding query context P respective queries cover range P*。
It is preferred that the location-based service intimacy protection system covered based on range, further includes:Stochastic transformation module, for pair
The cover query context P that range acquisition module obtains is covered in inquiry*=(P*@L,P*@R), the radius for covering query context is random
It is extended to 1.0~1.2 times and as the radius of the cover query context after expansion, obtains the inquiry of the cover after random expanded scope
Range, the cover query context as user's query context P constructions.
The present invention basic thought be:Client-based architecture passes through the location service request submitted for user
Construction generates a new location service request, and (wherein, the true query context of user is by well-designed " covering a range " institute
Substitute) so that insincere server end is difficult to know the true inquiring position of user.Finally, client is returned from server end
LBS results in filter out corresponding user's true request as a result, so that it is guaranteed that user can finally obtain accurate LBS inquiry
As a result.
Based on above-mentioned secret protection frame, introduce the user location privacy model towards LBS, its formal definitions privacy
Client is that user location services request constructs the constraint that the cover range generated need to meet in protect-ing frame structure, to ensure position
Set the safety of the high efficiency and location privacy of service.In addition, privacy model also contemplates inquiring position (i.e. in query context
The heart) between constraint so that even if attacker has grasped the complete LBS request sequences that the rules of customer search Behavior and client are submitted
Row, are still difficult to analyze user location privacy, further ensure the safety of location privacy.
It is embodiment below:
Embodiment 1
A kind of location-based service method for secret protection covered based on range, specially:For given user's query context
SequenceScale sequence is covered in construction inquiry
For each current queries range P in given user's query context sequence, range is covered in corresponding inquiry
It can construct as follows:
(1) data acquisition:Obtain user's current queries range P, user's history query context sequence And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains:For the user's history query context sequence obtained in step (1)In appoint
One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L are identical as the central point P@L of user's current queries range, then described to go through
Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake
Range P is covered for user's current queries range P respective queries*Inquiring position, i.e.,:
Or
The level r=1,2 of the band of position is traversed ..., rm, for the band of position D that arbitrary levels are r, when it is wrapped simultaneously
P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*It falls in the history
Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraints:User's current queries range P respective queries cover range P*For
Central point isQuery context or in level be r band of position D*In;
(3) candidate query range set is obtained:Obtain it is all meet in step (2) or position enquiring relevance constraint item
Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if
:
(4) it obtains inquiry and covers range:For the candidate query range set that step (3) obtains, preferential according to safety,
The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*;
When according to the preferential search strategy search user's current queries range P respective queries cover range P of safety*When,
User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3)
Privacy server end the highest candidate query range of safety coefficient, i.e.,:
When according to the preferential search strategy search user's current queries range P respective queries cover range P of high efficiency*When,
User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3)
The highest candidate query range of location-based service efficiency caused by protection, i.e.,:
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When,
User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3)
Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, i.e.,:
(5) query context is covered in stochastic transformation:For the cover query context P obtained in step (4)*=(P*@L,P*@
R), by the radius for covering query context be extended at random 1.0~1.2 times and as after expansion cover query context radius,
The cover query context after random expanded scope is obtained, the cover query context as user's query context P constructions.
One inquiry of construction covers range specific steps and following pseudocode expression can be used:
Based on above-mentioned location privacy protection frame and model, specific Optimization Solution algorithm is provided.It operates in credible client
End can be that the location service request sequence structure that user submits generates one group of new request sequence for meeting the constraint of privacy Model Condition
Row, meet LBS user location secret protection demands well.
By theory analysis and experimental evaluation, the validity of privacy model and privacy algorithm is verified:
The present embodiment method does not change the accuracy of location-based service, does not change existing location-based service algorithm, does not change yet
The existing platform architecture of location-based service.As shown in fig. 2, it can be seen that the present embodiment secret protection is to location-based service high efficiency
It influences to depend on covering range area, i.e., if ignoring the execution time of client privacy algorithm itself, introduces privacy and protect
After protection mechanism, the execution time needed for a location-based service about will be added to original m times, and wherein m is to cover range area
With the ratio of query context areaAnd cover range area by the safety of impact position privacy, i.e. m values are got over
Greatly
Then the risk of privacy exposure is lower.So the LBS performance loss caused by secret protection is linearly positively correlated with visitor
The cover range area of family end construction, thus performance loss is controllable, will not significantly reduce location-based service efficiency.Next this is analyzed
The safety of literary method.Below in conjunction with challenge model, point three kinds of situations consider.
(1) can attacker according to the cover range P of method construct*Itself deduce user's inquiring position P@L or inquiry
Range PCovering range P*In, user's query context center has been replaced (range radius has also been extended) so that attack
Person is according to P*The probability value for deducing user inquiring position P@L is equal to(wherein | P*| it is P*The position units quantity of covering),
I.e. probability value is extremely low.Since attacker does not know the radius P R of the true query context P of user, he deduces whole user in turn
The probability of query context P also wants smaller.Certainly, if attacker has grasped algorithm copy and (grasped algorithm principle, and known
The road currently employed search strategy of algorithm and dependent thresholds parameter), it is known that the radius P@R of user's query context, attacker
User inquiring position P@L, which can be deduced, can probably fall in the outer ring for covering range P*, but determine the radius (sentence for covering range
4 and 10) when, algorithm adds a random value θ so that the probability that attacker guesses user location P@L still minimum (is approximately equal to)。
(2) can attacker according to the cover scale sequence that client is submitted whithin a period of timeDeduce user's
Some inquiring position P@L or query context PThis is that attacker can grasp according to advance with afore-mentioned maximum difference
User's inquiring position association come reduce cover range area, improve the probability value for successfully deducing user location.Before such as
Example, attacker according to priori it is concluded that:User inquiring position P@L necessarily fall the cover range at twoWith
It is interior.At this point, cover range to the protecting effect of location privacy become forI.e. attacker deduces user's inquiring position
The probability value of P@L is equal toIfIt is much smaller thanOrExtreme influence imitates the cover of location privacy
Fruit.However, since context of methods considers such case, that is, the cover range constructed also embodies this position pass well
Connection property (such as in front in example, covers rangeWithIt will meet) so that
OrI.e. attacker is difficult to reduce the protecting effect for covering range accordingly.
It (3), can be according to cover scale sequence after attacker's acquisition operates in the Privacy preserving algorithms copy of client
Deduce user's inquiring position P@L or query context PAt this point, attacker can one by one input to algorithm copy covers range
P*In each position units Lk∈P*(also assume that attacker has grasped currently employed search strategy and related threshold here
Value parameter), then can observation algorithm construct output and cover range P*.If it succeeds, showing LkIt is user's real user position
It sets.However, such trial can't succeed (and obtaining above-mentioned conclusion success), because our methods are covered in determination
Lid range P*Radius when, add a random value θ (see sentence 4 and 10) so that twice it is identical input can also obtain not
With output, or even if identical output if do not reach the identical conclusion of input.
Although in conclusion attacker knows abundant background knowledge, but be difficult to be recorded from server-side goes through
The inquiring position or range of user are identified in history inquiry, thus context of methods has preferable personal secrets.In addition, according to
The related work of chapters and sections 2, it can be seen that:(1) assumed name method is subject to the threat of data mining, and hides user identity
Reduce the practicability of method;(2) fuzz method usually requires modification inquiry, this can reduce service accuracy to a certain degree, and
Performance bottleneck and privacy bottleneck are also easy to cause to the dependence of third party's anonymous server;(3) enciphered method has usually required that change
There are LBS algorithms, and need the support of additional hardware and complicated algorithm, reduces method practicability;(4) dummy argument method is prone to
Supposition attack based on data distribution characteristics, leads to poor safety.It is qualitative with existing methods that table 1 gives context of methods
Comparison result.As can be seen from Table 1:Compared to existing method, context of methods is in safety, accuracy, high efficiency and availability
Possess better comprehensive performance, has effectively achieved LBS inquiry secret protections.
The qualitative comparison of 1 validity of table
Comparative approach | Personal secrets | Service accuracy | Service high efficiency | Actual availability |
Context of methods | It is good | It is good | Generally | It is good |
Assumed name method | It is good | It is good | It is good | It is bad |
Fuzz method | It is good | It is bad | It is good | It is good |
Enciphered method | It is good | It is good | It is good | It is bad |
Dummy argument method | Generally | It is good | Generally | It is good |
Embodiment 2
A kind of location-based service intimacy protection system covered based on range, as shown in Figure 1, including setting in user terminal and
Location privacy protection server between location server;The location privacy protection server be trusted client, for pair
In given user's query context sequenceScale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server
Query result is returned, is the query result in user's query context by query result screening, and return to user;
The location-based service intimacy protection system covered based on range, including:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about
Beam condition:User's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer
The secondary band of position D for r*In;Including the first submodule and the second submodule;First submodule is used to work as its query context
Central point PkWhen@l are identical as the central point P@L of user's current queries range, then looking into the historical query scale sequence
Ask PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries range P
Respective queries cover range P*Inquiring position, i.e.,:The second submodule is for traversing the band of position
Level r=1,2 ..., rm, for the band of position D that arbitrary levels are r, when it includes present scope P and historical query simultaneously
Range Pk, then user's current queries range P respective queries cover range P*It falls in the historical query range PkHistory cover model
It enclosesThe level at place is the band of position D of r*In;
Candidate query range set acquisition module, for obtaining all satisfaction inquiry relevance constraintss, covering range
Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Range acquisition module is covered in inquiry, for from candidate query range set, according to the search strategy that user selects,
It searches for user's current queries range P respective queries and covers range P*;Including:Safety first search submodule, for according to peace
The preferential search strategy search user's current queries range P respective queries of full property cover range P*:By candidate query range set
Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end
Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency
Query context P respective queries cover range P*:By the highest candidate query model of location-based service efficiency in candidate query range set
It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony
Preferential search strategy search user's current queries range P respective queries cover range P*:It will be used in candidate query range set
Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user
Preceding query context P respective queries cover range P*。
Stochastic transformation module, for covering the cover query context P that range acquisition module obtains to inquiry*=(P*@L,
P*@R), the radius for covering query context is extended to 1.0~1.2 times at random and as half of the cover query context after expansion
Diameter obtains the cover query context after random expanded scope, the cover query context as user's query context P constructions.
It is considered incredible at the present embodiment LBS service device end, it is the maximum target of attacker.It is assumed that attacking
The control that the person of hitting has been obtained for server end (assumes that attacker is hacker or the server admin for breaking through server
Member).The system architecture provided from Fig. 1, it can be seen that:Attacker can know that client submits all position enquiring sequences
(i.e. historical query sequence), but they are to cover new search sequence (and the non-user that construction generates by the privacy algorithm of client
True search sequence).So location privacy protection method needs to prevent cover query context recognition sequence of the attacker from grasp
Go out the true inquiring position (or query context) of mobile subscriber.In addition, the attacker for obtaining LBS service device end control possesses
Powerful ability, it possesses complete cartographic information, and is responsible for executing LBS algorithms, therefore attacker may grasp use
Many position enquiring rules at family, for example, user often likes initiates service request etc. around which fixed position or region.
At this point, attacker can reduce according to this relevance between this user's inquiring position covers range.The ability of attacker
More than that, he may also be aware of the presence for the LBS Privacy preserving algorithms for operating in client, so he is also possible to obtain
The copy of Privacy preserving algorithms, then, the LBS search sequences that oneself will be grasped input Privacy preserving algorithms, and observe algorithm
Output covers range area as a result, reducing accordingly.
As it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, not to
The limitation present invention, all within the spirits and principles of the present invention made by all any modification, equivalent and improvement etc., should all include
Within protection scope of the present invention.
Claims (10)
1. a kind of location-based service method for secret protection covered based on range, which is characterized in that inquire model for given user
Enclose sequenceScale sequence is covered in construction inquiry So that described look into
It askes and covers scale sequence while meeting the following conditions:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryIt is full
Sufficient position enquiring relevance constraint, i.e.,:
For the inquiring position sequence of user's query context sequenceModel is covered in its corresponding inquiry
Enclose the inquiring position sequence of sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithFor same position
It sets, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWithThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence
Meet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence
Meet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence
Meet and covers wide security.
2. the location-based service method for secret protection covered as described in claim 1 based on range, which is characterized in that the condition
3 is i.e. arbitraryMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,For
Corresponding subsequence in scale sequence is covered in inquiryQuery context circular scope radius.
3. the location-based service method for secret protection covered as described in claim 1 based on range, which is characterized in that the condition
4 is i.e. arbitraryMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,It is covered for inquiry
Corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence
Arbitary inquiry PkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context center
The distance between point, α is distance threshold.
4. the location-based service method for secret protection covered based on range as described in claims 1 to 3 any one, feature are existed
In the inquiry is covered range and constructed as follows:
(1) data acquisition:Obtain user's current queries range P, user's history query context sequence
And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains:For the user's history query context sequence obtained in step (1)In any look into
Ask Pk, k=1,2 ..., n:
As the central point P of its query contextkWhen@L are identical as the central point P@L of user's current queries range, then the historical query
Inquiry P in scale sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user
Current queries range P respective queries cover range P*Inquiring position, i.e.,:
Or
The level r=1,2 of the band of position is traversed ..., rm, for the band of position D that arbitrary levels are r, when it is simultaneously comprising current
Range P and historical query range Pk, then user's current queries range P respective queries cover range P*It falls in the historical query model
Enclose PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraints:User's current queries range P respective queries cover range P*Centered on point
ForQuery context or in level be r band of position D*In;
(3) candidate query range set is obtained:Obtain it is all meet in step (2) or position enquiring relevance constraints,
The set for covering range accuracy, covering range high efficiency and covering the query context of wide securityI.e. so that:
(4) it obtains inquiry and covers range:It is preferential according to safety, efficient for the candidate query range set that step (3) obtains
Property preferential or harmonious preferential search strategy, search user's current queries range P respective queries cover range P*;
When according to the preferential search strategy search user's current queries range P respective queries cover range P of safety*When, user works as
Preceding query context P respective queries cover range P*User location privacy exists in the candidate query range set obtained for step (3)
The highest candidate query range of safety coefficient of server end, i.e.,:
When according to the preferential search strategy search user's current queries range P respective queries cover range P of high efficiency*When, user works as
Preceding query context P respective queries cover range P*Location privacy protection institute in the candidate query range set obtained for step (3)
Caused by the highest candidate query range of location-based service efficiency, i.e.,:
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, user works as
Preceding query context P respective queries cover range P*User location privacy exists in the candidate query range set obtained for step (3)
The safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, i.e.,:
5. the location-based service method for secret protection covered based on range as described in Claims 1-4 any one, feature are existed
In it further includes step that the building method of range is covered in the inquiry:
(5) query context is covered in stochastic transformation:For the cover query context P obtained in step (4)*=(P*@L,P*@R), it will
Cover query context radius be extended at random 1.0~1.2 times and as after expansion cover query context radius, obtain with
Cover query context after machine expanded scope, the cover query context as user's query context P constructions.
6. a kind of location-based service intimacy protection system covered based on range, which is characterized in that including setting in user terminal and
Location privacy protection server between location server;The location privacy protection server be trusted client, for pair
In given user's query context sequence Scale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server
Query result is returned, is the query result in user's query context by query result screening, and return to user.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiry
Meet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceModel is covered in its corresponding inquiry
Enclose the inquiring position sequence of sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithFor same position
It sets, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWithThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;Region
Level it is higher, the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence
Meet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence
Meet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence
Meet and covers wide security.
7. the location-based service intimacy protection system covered as claimed in claim 6 based on range, which is characterized in that the condition
3 is i.e. arbitraryMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,For
Corresponding subsequence in scale sequence is covered in inquiryQuery context circular scope radius.
8. the location-based service intimacy protection system covered as claimed in claim 6 based on range, which is characterized in that the condition
4 is i.e. arbitraryMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,It is covered for inquiry
Corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence
Arbitary inquiry PkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context center
The distance between point, α is distance threshold.
9. the location-based service intimacy protection system covered based on range as described in claim 6 to 8 any one, feature are existed
In, the location-based service intimacy protection system covered based on range, including:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequence
And user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance and constrain item
Part:User's current queries range P respective queries cover range P*Centered on point beQuery context or in level be r
Band of position D*In;It is preferred that including the first submodule and the second submodule;First submodule is used to work as its query context
Central point PkWhen@L are identical as the central point P@L of user's current queries range, then looking into the historical query scale sequence
Ask PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries range P
Respective queries cover range P*Inquiring position, i.e.,:The second submodule is for traversing the band of position
Level r=1,2 ..., rm, for the band of position D that arbitrary levels are r, when it includes present scope P and historical query simultaneously
Range Pk, then user's current queries range P respective queries cover range P*It falls in the historical query range PkHistory cover model
It enclosesThe level at place is the band of position D of r*In;
Candidate query range set acquisition module is accurate for obtaining all satisfaction inquiry relevance constraintss, cover range
Property, cover range high efficiency and cover wide security query context setI.e. so that:
Range acquisition module is covered in inquiry, for from candidate query range set, according to the search strategy that user selects, searching for
User's current queries range P respective queries cover range P*;Including:Safety first search submodule, for according to safety
Preferential search strategy search user's current queries range P respective queries cover range P*:It will be used in candidate query range set
Family location privacy server end the highest candidate query range of safety coefficient as user's current queries range P respective queries
Cover range P*;High efficiency first search submodule, for searching for user's current queries according to the preferential search strategy of high efficiency
Range P respective queries cover range P*:The highest candidate query range of location-based service efficiency in candidate query range set is made
Range P is covered for user's current queries range P respective queries*;Harmonious first search submodule, for according to harmonious preferential
Search strategy search user's current queries range P respective queries cover range P*:By user position in candidate query range set
Privacy is set currently to look into as user in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency
It askes range P respective queries and covers range P*。
10. the location-based service intimacy protection system covered based on range as described in claim 6 to 9 any one, feature
It is, the location-based service intimacy protection system covered based on range further includes:Stochastic transformation module, for being covered to inquiry
The cover query context P that lid range acquisition module obtains*=(P*@L,P*@R), the radius for covering query context is extended at random
1.0~1.2 times and as after expansion cover query context radius, obtain the cover query context after random expanded scope,
Cover query context as user's query context P constructions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810212081.XA CN108449335B (en) | 2018-03-15 | 2018-03-15 | A kind of location-based service method for secret protection and system based on range cover |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810212081.XA CN108449335B (en) | 2018-03-15 | 2018-03-15 | A kind of location-based service method for secret protection and system based on range cover |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108449335A true CN108449335A (en) | 2018-08-24 |
CN108449335B CN108449335B (en) | 2019-03-08 |
Family
ID=63195277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810212081.XA Expired - Fee Related CN108449335B (en) | 2018-03-15 | 2018-03-15 | A kind of location-based service method for secret protection and system based on range cover |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108449335B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414644A (en) * | 2020-03-18 | 2020-07-14 | 支付宝(杭州)信息技术有限公司 | Privacy protection query method based on block chain and block chain system |
CN112084411A (en) * | 2020-09-10 | 2020-12-15 | 绍兴文理学院 | User privacy protection method for personalized information retrieval |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1627177A (en) * | 2003-12-10 | 2005-06-15 | 精工爱普生株式会社 | Control method of image display, conroller and control program |
CN101242467A (en) * | 2007-02-09 | 2008-08-13 | 富士胶片株式会社 | Image processing apparatus |
CN101834861A (en) * | 2010-04-16 | 2010-09-15 | 华中师范大学 | Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service |
US20100287189A1 (en) * | 2009-05-05 | 2010-11-11 | Pioneer Hi-Bred International, Inc. | Acceleration of tag placement using custom hardware |
CN102665207A (en) * | 2012-05-08 | 2012-09-12 | 杭州电子科技大学 | Method used for continuously inquiring hiding user position based on mobile terminal in LBS (location based service) |
US20150032711A1 (en) * | 2013-07-06 | 2015-01-29 | Victor Kunin | Methods for identification of organisms, assigning reads to organisms, and identification of genes in metagenomic sequences |
CN106803825A (en) * | 2017-01-10 | 2017-06-06 | 西安电子科技大学 | Anonymous zone building method based on query context |
-
2018
- 2018-03-15 CN CN201810212081.XA patent/CN108449335B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1627177A (en) * | 2003-12-10 | 2005-06-15 | 精工爱普生株式会社 | Control method of image display, conroller and control program |
CN101242467A (en) * | 2007-02-09 | 2008-08-13 | 富士胶片株式会社 | Image processing apparatus |
US20100287189A1 (en) * | 2009-05-05 | 2010-11-11 | Pioneer Hi-Bred International, Inc. | Acceleration of tag placement using custom hardware |
CN101834861A (en) * | 2010-04-16 | 2010-09-15 | 华中师范大学 | Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service |
CN102665207A (en) * | 2012-05-08 | 2012-09-12 | 杭州电子科技大学 | Method used for continuously inquiring hiding user position based on mobile terminal in LBS (location based service) |
US20150032711A1 (en) * | 2013-07-06 | 2015-01-29 | Victor Kunin | Methods for identification of organisms, assigning reads to organisms, and identification of genes in metagenomic sequences |
CN106803825A (en) * | 2017-01-10 | 2017-06-06 | 西安电子科技大学 | Anonymous zone building method based on query context |
Non-Patent Citations (1)
Title |
---|
王宇航等: "移动互联网中的位置隐私保护研究", 《通信学报》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414644A (en) * | 2020-03-18 | 2020-07-14 | 支付宝(杭州)信息技术有限公司 | Privacy protection query method based on block chain and block chain system |
CN112084411A (en) * | 2020-09-10 | 2020-12-15 | 绍兴文理学院 | User privacy protection method for personalized information retrieval |
CN112084411B (en) * | 2020-09-10 | 2021-04-20 | 绍兴文理学院 | User privacy protection method for personalized information retrieval |
Also Published As
Publication number | Publication date |
---|---|
CN108449335B (en) | 2019-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dong et al. | Novel privacy-preserving algorithm based on frequent path for trajectory data publishing | |
Zhao et al. | ILLIA: Enabling $ k $-anonymity-based privacy preserving against location injection attacks in continuous LBS queries | |
Liu et al. | Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services | |
Huo et al. | Privacy-preserving point-of-interest recommendation based on geographical and social influence | |
CN105491519B (en) | Based on the method for secret protection under real-time query scene continuous in location-based service | |
US10078743B1 (en) | Cross identification of users in cyber space and physical world | |
Chen et al. | Measuring query privacy in location-based services | |
CN106254314B (en) | A kind of position enquiring information on services guard method and system | |
Li et al. | DALP: A demand‐aware location privacy protection scheme in continuous location‐based services | |
Ying et al. | Protecting location privacy with clustering anonymization in vehicular networks | |
Saravanan et al. | Preserving privacy in the context of location based services through location hider in mobile-tourism | |
Kim et al. | Hilbert‐order based spatial cloaking algorithm in road network | |
CN108449335B (en) | A kind of location-based service method for secret protection and system based on range cover | |
Zhang et al. | Privacy quantification model based on the Bayes conditional risk in Location-based services | |
CN107770722A (en) | The method for secret protection of location-based service based on the information constrained double stealthy regions in side | |
Nosouhi et al. | A hybrid location privacy protection scheme in big data environment | |
Zhang et al. | Protecting the Moving User’s Locations by Combining Differential Privacy and k‐Anonymity under Temporal Correlations in Wireless Networks | |
Wang et al. | Privacy preserving for continuous query in location based services | |
CN111800786B (en) | Track privacy protection method based on k anonymity | |
Wightman et al. | MaPIR: Mapping-based private information retrieval for location privacy in LBISs | |
Manju et al. | Dispersed dummy selection approach for location‐based services to preempt user‐profiling | |
Ju et al. | Location privacy protection for smartphone users using quadtree entropy maps | |
Zhao et al. | EPLA: efficient personal location anonymity | |
Teerakanok et al. | Preserving User Anonymity in Context‐Aware Location‐Based Services: A Proposed Framework | |
Jadallah et al. | Aman: Spatial cloaking for privacy-aware location-based queries in the cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190308 |
|
CF01 | Termination of patent right due to non-payment of annual fee |