CN108449335A - A kind of location-based service method for secret protection and system based on range cover - Google Patents

A kind of location-based service method for secret protection and system based on range cover Download PDF

Info

Publication number
CN108449335A
CN108449335A CN201810212081.XA CN201810212081A CN108449335A CN 108449335 A CN108449335 A CN 108449335A CN 201810212081 A CN201810212081 A CN 201810212081A CN 108449335 A CN108449335 A CN 108449335A
Authority
CN
China
Prior art keywords
range
user
inquiry
sequence
query
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810212081.XA
Other languages
Chinese (zh)
Other versions
CN108449335B (en
Inventor
吴宗大
李仁超
徐湖鹏
谢坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou University of Technology
Original Assignee
Wenzhou University Oujiang College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou University Oujiang College filed Critical Wenzhou University Oujiang College
Priority to CN201810212081.XA priority Critical patent/CN108449335B/en
Publication of CN108449335A publication Critical patent/CN108449335A/en
Application granted granted Critical
Publication of CN108449335B publication Critical patent/CN108449335B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of location-based service method for secret protection covered based on range and systems.The method covers scale sequence, makes its satisfaction for user's query context sequence, construction inquiry:The inquiring position sequence of user's query context sequenceThe inquiring position sequence that scale sequence is covered with inquiry meets the constraint of position enquiring relevance;The inquiry covers corresponding subsequence in scale sequence and meets cover range accuracy;The inquiry covers corresponding subsequence in scale sequence and meets cover range high efficiency;The inquiry covers corresponding subsequence in scale sequence and meets cover wide security.The system comprises the location privacy protection servers being arranged between user terminal and location server;For for given user's query context sequence, construction inquiry to cover scale sequence, submits to location server and obtain return query result, screen as the query result in user's query context and return to user.The present invention has effectively achieved LBS inquiry secret protections.

Description

A kind of location-based service method for secret protection and system based on range cover
Technical field
The invention belongs to networks to service secret protection technical field, more particularly, to a kind of position covered based on range Set service privacy protection method and system.
Background technology
With the development of wireless communication and mobile positioning technique, more and more mobile devices have GPS positioning work( It can so that location-based service (LBS) increased popularity, it has become towards one of most promising service of mobile subscriber.LBS refers to base In the geographical location information that positioning of mobile equipment function is provided, the various information inquiry service provided to the user is typical Using including mainly:Convenience store nearby is such as inquired in map class application, such as Google Maps, and the inquiry based on point of interest.Mesh Before, LBS achieves immense success in social commercial field, it was reported that global LBS relative commercials application annual earnings have surpassed Cross 15,000,000,000 dollars.It is asked safely however, LBS while bringing huge convenient to individual, has also caused serious location privacy Topic.Because user is when obtaining location-based service, it usually needs report their current geographic position, i.e. inquiring position.These positions Confidence ceases highly sensitive privacy, and the personal whereabouts of user can be accurately inferred to using them.These sensitive individual subscriber whereabouts It is leaked to insincere third party, such as LBS providers, serious threat will certainly be constituted safely to the location privacy of user.LBS The concern that is just causing people increasingly extensive of location privacy safety problem, how to be effectively protected the LBS location privacies peace of user Have become a urgent problem to be solved entirely.
In order to protect the location privacy of LBS safe, researcher has been presented for many methods, including:Assumed name method, fuzz method, Enciphered method and dummy argument method etc..(1) assumed name method refers to that the assumed name that the user identifier in inquiring LBS is constructed temporarily with one replaces, To cut off the contact between user and inquiry.However, assumed name method is subject to the threat of data mining, and due to user's body Part is hidden, this is also an obstacle to needing the application of authentication.(2) fuzz method refers to extensive (using hidden area) or disturbs Location information in dynamic (using noise) user's inquiry so that attacker's None- identified goes out user's specific location.Due to issuing clothes Be engaged in device is modified inquiry, and the accuracy of service can be reduced when many.In addition, assumed name method and fuzz method generally rely on In trusted third party's anonymous server, this is easy to cause performance bottleneck and privacy bottleneck.(3) enciphered method refers to by using encryption Technology makes user's inquiry completely invisible to server, typical as being based on privacy information to achieve the purpose that secret protection Retrieve the LBS enciphered methods of (PIR).But enciphered method usually require that change server LBS algorithms, and need additional hardware and The support of complicated algorithm reduces the actual availability of method.(4) dummy argument method is before inquiry is exposed to server, in advance Dummy argument is added, and dummy argument inquiry and true inquiry are submitted together so that server is difficult to obtain user's actual position.This kind of skill Art depends on the construction quality of dummy argument, is prone to the supposition attack based on data distribution characteristics.
In conclusion effective LBS location privacy method for security protection needs the requirement for meeting the following aspects.(1) The safety for ensureing user location privacy, even if that is, attacker has grasped abundant priori, it is also difficult to from LBS search sequences In be inferred to the actual position track of user.(2) ensure that the accuracy of the final LBS query results of mobile subscriber, i.e. comparison introduce Privacy Preservation Mechanism it is front and back, the finally obtained service result of user should be consistent.(3) actual availability of LBS is not damaged, I.e. Privacy Preservation Mechanism does not require to change the LBS algorithms of server end, does not need additional hardware supported, will not look into LBS The execution efficiency of inquiry, which constitutes conspicuousness, to be influenced.Wherein, it is desirable that (2) and (3) is required actually to require location privacy protection method Client user and server end LBS algorithms are realized fully transparent.The more safe and reliable and availability height there is still a need for exploitation Position enquiring method for secret protection and system.
Invention content
For the disadvantages described above or Improvement requirement of the prior art, the present invention provides a kind of position clothes covered based on range Business method for secret protection and system, its object is to cover range by constructing to inquire, before location-based service high efficiency is controllable It puts, effective protection location-based service personal secrets, thus solves to need exist for developing more safe and reliable and availability height Position enquiring method for secret protection and the technical issues of system.
To achieve the above object, according to one aspect of the present invention, a kind of location-based service covered based on range is provided Method for secret protection, for given user's query context sequenceRange sequence is covered in construction inquiry RowSo that the inquiry covers scale sequence and meets the following conditions simultaneously:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceIts corresponding inquiry is covered The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same Position, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith ThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and covers wide security.
Preferably, the location-based service method for secret protection covered based on range, the condition 3 are i.e. arbitraryMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Preferably, the location-based service method for secret protection covered based on range, the condition 4 are i.e. arbitraryMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,For inquiry Cover corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence The arbitary inquiry P of rowkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context The distance between central point, α are distance threshold.
Preferably, the location-based service method for secret protection covered based on range, inquiry cover range according to Following method construct:
(1) data acquisition:Obtain user's current queries range P, user's history query context sequence And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains:For the user's history query context sequence obtained in step (1)In appoint One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L are identical as the central point P@L of user's current queries range, then described to go through Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake Range P is covered for user's current queries range P respective queries*Inquiring position, i.e.,:
Or
The level r=1,2 of the band of position is traversed ..., rm, for the band of position D that arbitrary levels are r, when it is wrapped simultaneously P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*It falls in the history Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraints:User's current queries range P respective queries cover range P*For Central point isQuery context or in level be r band of position D*In;
(3) candidate query range set is obtained:Obtain it is all meet in step (2) or position enquiring relevance constraint item Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if :
(4) it obtains inquiry and covers range:For the candidate query range set that step (3) obtains, preferential according to safety, The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*
When according to the preferential search strategy search user's current queries range P respective queries cover range P of safety*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy server end the highest candidate query range of safety coefficient, i.e.,:
When according to the preferential search strategy search user's current queries range P respective queries cover range P of high efficiency*When, User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3) The highest candidate query range of location-based service efficiency caused by protection, i.e.,:
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, i.e.,:
Preferably, the structure of range is covered in the location-based service method for secret protection covered based on range, the inquiry The method of making further includes step:
(5) query context is covered in stochastic transformation:For the cover query context P obtained in step (4)*=(P*@L,P*@ R), by the radius for covering query context be extended at random 1.0~1.2 times and as after expansion cover query context radius, The cover query context after random expanded scope is obtained, the cover query context as user's query context P constructions.
Other side according to the invention provides a kind of location-based service intimacy protection system covered based on range, It includes the location privacy protection server being arranged between user terminal and location server;The location privacy protection service Device is trusted client, for for given user's query context sequenceConstruction inquiry is covered Scale sequenceInquiry cover scale sequence is submitted into location server, and obtains position It sets server and returns to query result, be the query result in user's query context by query result screening, and return to use Family.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceIts corresponding inquiry is covered The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same Position, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith ThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r; The level in region is higher, and the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and covers wide security.
Preferably, the location-based service intimacy protection system covered based on range, the condition 3 are i.e. arbitraryMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Preferably, the location-based service intimacy protection system covered based on range, the condition 4 are i.e. arbitraryMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,For inquiry Cover corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence The arbitary inquiry P of rowkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context The distance between central point, α are distance threshold.
Preferably, the location-based service intimacy protection system covered based on range, the position covered based on range Service intimacy protection system is set, including:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about Beam condition:User's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer The secondary band of position D for r*In;It is preferred that including the first submodule and the second submodule;First submodule is used to look into when it Ask the central point P of rangekWhen@L are identical as the central point P@L of user's current queries range, then the historical query scale sequence In inquiry PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries Range P respective queries cover range P*Inquiring position, i.e.,:The second submodule is for traversing position The level r=1,2 in region is set ..., rm, for the band of position D that arbitrary levels are r, when it comprising present scope P and goes through simultaneously History query context Pk, then user's current queries range P respective queries cover range P*It falls in the historical query range PkHistory Cover rangeThe level at place is the band of position D of r*In;
Candidate query range set acquisition module, for obtaining all satisfaction inquiry relevance constraintss, covering range Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Range acquisition module is covered in inquiry, for from candidate query range set, according to the search strategy that user selects, It searches for user's current queries range P respective queries and covers range P*;Including:Safety first search submodule, for according to peace The preferential search strategy search user's current queries range P respective queries of full property cover range P*:By candidate query range set Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency Query context P respective queries cover range P*:By the highest candidate query model of location-based service efficiency in candidate query range set It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony Preferential search strategy search user's current queries range P respective queries cover range P*:It will be used in candidate query range set Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user Preceding query context P respective queries cover range P*
Preferably, the location-based service intimacy protection system covered based on range, the position covered based on range Service intimacy protection system is set, further includes:Stochastic transformation module is looked into for covering the cover that range acquisition module obtains to inquiry Ask range P*=(P*@L,P*@R), the radius for covering query context is extended to 1.0~1.2 times at random and as covering after expansion The radius of lid query context obtains the cover query context after random expanded scope, the cover as user's query context P constructions Query context.
In general, through the invention it is contemplated above technical scheme is compared with the prior art, can obtain down and show Beneficial effect:
Method and system energy provided by the invention:(1) ensure that the safety of location privacy, i.e. attacker are difficult to according to priori Knowledge analyzes the true inquiring position or query context of user from LBS request sequences.(2) ensure the efficient of location-based service Property, i.e. secret protection will not influence too much the overall performance of location-based service.(3) ensure the accuracy of location-based service, i.e., Before and after comparing secret protection, the location-based service result that user obtains is consistent.(4) availability of protective position service, i.e., it is hidden Private protection does not change the LBS algorithms of server-side, does not change existing LBS framework, does not change the existing use habit of user yet..
Description of the drawings
Fig. 1 is the location-based service intimacy protection system structural schematic diagram provided by the invention covered based on range;
Fig. 2 is the location-based service method for secret protection query result schematic diagram provided by the invention covered based on range.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.As long as in addition, technical characteristic involved in the various embodiments of the present invention described below It does not constitute a conflict with each other and can be combined with each other.
Meaning LBS inquiries of the invention are represented by E=(U, A, T, P), wherein:U is user label;A is querying attributes (such as hospital, hotel);T is corresponding timestamp when submitting inquiry;P is inquiring position and relevant parameter.Inquiry request E associations Query context P be represented by a border circular areas, i.e. P is represented by P=(P@L, P@R), wherein P@L indicate range center Point position, P R indicate the radius of circular scope.The location service request that query context sequence is initiated whithin a period of time by user The query context contained is constituted, and can be denoted asWherein, Pk(k=1,2 ..., n) indicate one Query context.The query context center that inquiring position sequence is contained by the location service request that user initiates whithin a period of time Point is constituted, and can be denoted asWherein, Lk=Pk@L indicate an inquiring position.
The location-based service method for secret protection provided by the invention covered based on range, specially:For given user Query context sequenceScale sequence is covered in construction inquiry So that institute Inquiry is stated to cover scale sequence while meeting the following conditions:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceIts corresponding inquiry is covered The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same Position, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith ThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r; The level in region is higher, and the position that it includes is also more, possesses highest level rmThe band of position, that is, entire map, belong to The bands of position same level r collection is combined intoIt meets following characteristics:
Feature 1, any two same level band of position is non-intersecting, i.e.,:
Feature 2, any two same level region area is equal, i.e. (wherein, AR indicates region area):
The union of feature 3, all same level bands of position is equal to map itself, i.e.,:
Feature 4, arbitrary region are both contained in the region of some higher, i.e.,:
In fact, there is the associations of very strong position between the inquiry request that same user is initiated whithin a period of time Property.It is mainly manifested in, these inquiry requests usually surround several fixed positions or region (such as user's residence or unit) and send out It rises.The attacker for knowing abundant background knowledge is easy to know this relevance rule between user's inquiring position, and accordingly Come reduce privacy methods construction cover range area, to reduce user location privacy insincere server end safety Property.Illustrate the problem below by way of a simply example.Assuming that attacker has grasped, user is in two different time points The inquiry request submitted surrounds the same fixed position and initiates (being assumed to be P@L).Assuming that privacy methods are asked for the two Constructing the cover range generated is respectivelyWithDue to covering rangeWithLocation-based service accuracy is must satisfy, because This,So according to priori, attacker it could be assumed that: Therefore, range is covered to be reduced into the protecting effect of position personal secretsI.e. in inquiry service twice, attacker Eliminable cover range is respectively:WithSo that defining the 4 cover models provided It encloses safety and is unable to get guarantee.
Therefore to consider the association sex chromosome mosaicism between user's inquiring position, i.e., the position initiated whithin a period of time with user Inquiry request sequence is research unit so that constructing should also show to accord between the center of the cover scale sequence of generation It shares family and really inquires the position relevance of rule (for example, in the preceding example, covering rangeWithSimilarly surround phase It is initiated with position, i.e.,), so that attacker is difficult to reduce cover range, reduce the guarantor for covering range Protect effect.
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and cover range high efficiency, i.e., arbitrarilyMeetWherein ρ is to cover Range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and cover wide security, i.e., arbitrarilyMeetWherein μ is to cover Lid wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,For inquiry Cover corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence The arbitary inquiry P of rowkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context The distance between central point, α are distance threshold, when cover range centerWith user's inquiring position PkDistance between@L is super When crossing the threshold value, attacker can not know the true inquiring position of user or range substantially, and the safety of location privacy at this time reaches Peak (i.e. 1.0).
The inquiry is covered range and can be constructed as follows:
(1) data acquisition:Obtain user's current queries range P, user's history query context sequence And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains:For the user's history query context sequence obtained in step (1)In appoint One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L are identical as the central point P@L of user's current queries range, then described to go through Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake Range P is covered for user's current queries range P respective queries*Inquiring position, i.e.,:
Or
The level r=1,2 of the band of position is traversed ..., rm, for the band of position D that arbitrary levels are r, when it is wrapped simultaneously P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*It falls in the history Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraints:User's current queries range P respective queries cover range P*For Central point isQuery context or in level be r band of position D*In;
(3) candidate query range set is obtained:Obtain it is all meet in step (2) or position enquiring relevance constraint item Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if :
(4) it obtains inquiry and covers range:For the candidate query range set that step (3) obtains, preferential according to safety, The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*
When according to the preferential search strategy search user's current queries range P respective queries cover range P of safety*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy server end the highest candidate query range of safety coefficient, i.e.,:
When covering range P* according to the preferential search strategy search user's current queries range P respective queries of high efficiency, User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3) The highest candidate query range of location-based service efficiency caused by protection, i.e.,:
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, i.e.,:
Preferably, in order to further improve the security, further include that query context is covered in step (5) stochastic transformation:For step Suddenly the cover query context P obtained in (4)*=(P*@L,P*@R), the radius for covering query context is extended to 1.0 at random~ 1.2 times and as after expansion cover query context radius, obtain the cover query context after random expanded scope, as with The cover query context of family query context P constructions.
It is provided by the invention based on range cover location-based service intimacy protection system, as shown in Figure 1, including setting with Location privacy protection server between family terminal and location server;The location privacy protection server is credible client End, for for given user's query context sequence Scale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server Query result is returned, is the query result in user's query context by query result screening, and return to user.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceIts corresponding inquiry is covered The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same Position, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith ThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r; The level in region is higher, and the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and cover range high efficiency, i.e., arbitrarilyMeetWherein ρ is to cover Range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding sub- sequence in scale sequence RowMeet and cover wide security, i.e., arbitrarilyMeetWherein μ is to cover Lid wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,For inquiry Cover corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence The arbitary inquiry P of rowkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context The distance between central point, α are distance threshold, when cover range centerWith user's inquiring position PkDistance between@L is super When crossing the threshold value, attacker can not know the true inquiring position of user or range substantially, and the safety of location privacy at this time reaches Peak (i.e. 1.0).
Preferably, the location-based service intimacy protection system covered based on range, including:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about Beam condition:User's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer The secondary band of position D for r*In;It is preferred that including the first submodule and the second submodule;First submodule is used to look into when it Ask the central point P of rangekWhen@L are identical as the central point P@L of user's current queries range, then the historical query scale sequence In inquiry PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries Range P respective queries cover range P*Inquiring position, i.e.,:The second submodule is for traversing position The level r=1,2 in region is set ..., rm, for the band of position D that arbitrary levels are r, when it comprising present scope P and goes through simultaneously History query context Pk, then user's current queries range P respective queries cover range P*It falls in the historical query range PkHistory Cover rangeThe level at place is the band of position D of r*In;
Candidate query range set acquisition module, for obtaining all satisfaction inquiry relevance constraintss, covering range Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Range acquisition module is covered in inquiry, for from candidate query range set, according to the search strategy that user selects, It searches for user's current queries range P respective queries and covers range P*;Including:Safety first search submodule, for according to peace The preferential search strategy search user's current queries range P respective queries of full property cover range P*:By candidate query range set Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency Query context P respective queries cover range P*:By the highest candidate query model of location-based service efficiency in candidate query range set It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony Preferential search strategy search user's current queries range P respective queries cover range P*:It will be used in candidate query range set Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user Preceding query context P respective queries cover range P*
It is preferred that the location-based service intimacy protection system covered based on range, further includes:Stochastic transformation module, for pair The cover query context P that range acquisition module obtains is covered in inquiry*=(P*@L,P*@R), the radius for covering query context is random It is extended to 1.0~1.2 times and as the radius of the cover query context after expansion, obtains the inquiry of the cover after random expanded scope Range, the cover query context as user's query context P constructions.
The present invention basic thought be:Client-based architecture passes through the location service request submitted for user Construction generates a new location service request, and (wherein, the true query context of user is by well-designed " covering a range " institute Substitute) so that insincere server end is difficult to know the true inquiring position of user.Finally, client is returned from server end LBS results in filter out corresponding user's true request as a result, so that it is guaranteed that user can finally obtain accurate LBS inquiry As a result.
Based on above-mentioned secret protection frame, introduce the user location privacy model towards LBS, its formal definitions privacy Client is that user location services request constructs the constraint that the cover range generated need to meet in protect-ing frame structure, to ensure position Set the safety of the high efficiency and location privacy of service.In addition, privacy model also contemplates inquiring position (i.e. in query context The heart) between constraint so that even if attacker has grasped the complete LBS request sequences that the rules of customer search Behavior and client are submitted Row, are still difficult to analyze user location privacy, further ensure the safety of location privacy.
It is embodiment below:
Embodiment 1
A kind of location-based service method for secret protection covered based on range, specially:For given user's query context SequenceScale sequence is covered in construction inquiry
For each current queries range P in given user's query context sequence, range is covered in corresponding inquiry It can construct as follows:
(1) data acquisition:Obtain user's current queries range P, user's history query context sequence And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains:For the user's history query context sequence obtained in step (1)In appoint One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L are identical as the central point P@L of user's current queries range, then described to go through Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake Range P is covered for user's current queries range P respective queries*Inquiring position, i.e.,:
Or
The level r=1,2 of the band of position is traversed ..., rm, for the band of position D that arbitrary levels are r, when it is wrapped simultaneously P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*It falls in the history Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraints:User's current queries range P respective queries cover range P*For Central point isQuery context or in level be r band of position D*In;
(3) candidate query range set is obtained:Obtain it is all meet in step (2) or position enquiring relevance constraint item Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if :
(4) it obtains inquiry and covers range:For the candidate query range set that step (3) obtains, preferential according to safety, The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*
When according to the preferential search strategy search user's current queries range P respective queries cover range P of safety*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy server end the highest candidate query range of safety coefficient, i.e.,:
When according to the preferential search strategy search user's current queries range P respective queries cover range P of high efficiency*When, User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3) The highest candidate query range of location-based service efficiency caused by protection, i.e.,:
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, i.e.,:
(5) query context is covered in stochastic transformation:For the cover query context P obtained in step (4)*=(P*@L,P*@ R), by the radius for covering query context be extended at random 1.0~1.2 times and as after expansion cover query context radius, The cover query context after random expanded scope is obtained, the cover query context as user's query context P constructions.
One inquiry of construction covers range specific steps and following pseudocode expression can be used:
Based on above-mentioned location privacy protection frame and model, specific Optimization Solution algorithm is provided.It operates in credible client End can be that the location service request sequence structure that user submits generates one group of new request sequence for meeting the constraint of privacy Model Condition Row, meet LBS user location secret protection demands well.
By theory analysis and experimental evaluation, the validity of privacy model and privacy algorithm is verified:
The present embodiment method does not change the accuracy of location-based service, does not change existing location-based service algorithm, does not change yet The existing platform architecture of location-based service.As shown in fig. 2, it can be seen that the present embodiment secret protection is to location-based service high efficiency It influences to depend on covering range area, i.e., if ignoring the execution time of client privacy algorithm itself, introduces privacy and protect After protection mechanism, the execution time needed for a location-based service about will be added to original m times, and wherein m is to cover range area With the ratio of query context areaAnd cover range area by the safety of impact position privacy, i.e. m values are got over Greatly
Then the risk of privacy exposure is lower.So the LBS performance loss caused by secret protection is linearly positively correlated with visitor The cover range area of family end construction, thus performance loss is controllable, will not significantly reduce location-based service efficiency.Next this is analyzed The safety of literary method.Below in conjunction with challenge model, point three kinds of situations consider.
(1) can attacker according to the cover range P of method construct*Itself deduce user's inquiring position P@L or inquiry Range PCovering range P*In, user's query context center has been replaced (range radius has also been extended) so that attack Person is according to P*The probability value for deducing user inquiring position P@L is equal to(wherein | P*| it is P*The position units quantity of covering), I.e. probability value is extremely low.Since attacker does not know the radius P R of the true query context P of user, he deduces whole user in turn The probability of query context P also wants smaller.Certainly, if attacker has grasped algorithm copy and (grasped algorithm principle, and known The road currently employed search strategy of algorithm and dependent thresholds parameter), it is known that the radius P@R of user's query context, attacker User inquiring position P@L, which can be deduced, can probably fall in the outer ring for covering range P*, but determine the radius (sentence for covering range 4 and 10) when, algorithm adds a random value θ so that the probability that attacker guesses user location P@L still minimum (is approximately equal to)。
(2) can attacker according to the cover scale sequence that client is submitted whithin a period of timeDeduce user's Some inquiring position P@L or query context PThis is that attacker can grasp according to advance with afore-mentioned maximum difference User's inquiring position association come reduce cover range area, improve the probability value for successfully deducing user location.Before such as Example, attacker according to priori it is concluded that:User inquiring position P@L necessarily fall the cover range at twoWith It is interior.At this point, cover range to the protecting effect of location privacy become forI.e. attacker deduces user's inquiring position The probability value of P@L is equal toIfIt is much smaller thanOrExtreme influence imitates the cover of location privacy Fruit.However, since context of methods considers such case, that is, the cover range constructed also embodies this position pass well Connection property (such as in front in example, covers rangeWithIt will meet) so that OrI.e. attacker is difficult to reduce the protecting effect for covering range accordingly.
It (3), can be according to cover scale sequence after attacker's acquisition operates in the Privacy preserving algorithms copy of client Deduce user's inquiring position P@L or query context PAt this point, attacker can one by one input to algorithm copy covers range P*In each position units Lk∈P*(also assume that attacker has grasped currently employed search strategy and related threshold here Value parameter), then can observation algorithm construct output and cover range P*.If it succeeds, showing LkIt is user's real user position It sets.However, such trial can't succeed (and obtaining above-mentioned conclusion success), because our methods are covered in determination Lid range P*Radius when, add a random value θ (see sentence 4 and 10) so that twice it is identical input can also obtain not With output, or even if identical output if do not reach the identical conclusion of input.
Although in conclusion attacker knows abundant background knowledge, but be difficult to be recorded from server-side goes through The inquiring position or range of user are identified in history inquiry, thus context of methods has preferable personal secrets.In addition, according to The related work of chapters and sections 2, it can be seen that:(1) assumed name method is subject to the threat of data mining, and hides user identity Reduce the practicability of method;(2) fuzz method usually requires modification inquiry, this can reduce service accuracy to a certain degree, and Performance bottleneck and privacy bottleneck are also easy to cause to the dependence of third party's anonymous server;(3) enciphered method has usually required that change There are LBS algorithms, and need the support of additional hardware and complicated algorithm, reduces method practicability;(4) dummy argument method is prone to Supposition attack based on data distribution characteristics, leads to poor safety.It is qualitative with existing methods that table 1 gives context of methods Comparison result.As can be seen from Table 1:Compared to existing method, context of methods is in safety, accuracy, high efficiency and availability Possess better comprehensive performance, has effectively achieved LBS inquiry secret protections.
The qualitative comparison of 1 validity of table
Comparative approach Personal secrets Service accuracy Service high efficiency Actual availability
Context of methods It is good It is good Generally It is good
Assumed name method It is good It is good It is good It is bad
Fuzz method It is good It is bad It is good It is good
Enciphered method It is good It is good It is good It is bad
Dummy argument method Generally It is good Generally It is good
Embodiment 2
A kind of location-based service intimacy protection system covered based on range, as shown in Figure 1, including setting in user terminal and Location privacy protection server between location server;The location privacy protection server be trusted client, for pair In given user's query context sequenceScale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server Query result is returned, is the query result in user's query context by query result screening, and return to user;
The location-based service intimacy protection system covered based on range, including:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about Beam condition:User's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer The secondary band of position D for r*In;Including the first submodule and the second submodule;First submodule is used to work as its query context Central point PkWhen@l are identical as the central point P@L of user's current queries range, then looking into the historical query scale sequence Ask PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries range P Respective queries cover range P*Inquiring position, i.e.,:The second submodule is for traversing the band of position Level r=1,2 ..., rm, for the band of position D that arbitrary levels are r, when it includes present scope P and historical query simultaneously Range Pk, then user's current queries range P respective queries cover range P*It falls in the historical query range PkHistory cover model It enclosesThe level at place is the band of position D of r*In;
Candidate query range set acquisition module, for obtaining all satisfaction inquiry relevance constraintss, covering range Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Range acquisition module is covered in inquiry, for from candidate query range set, according to the search strategy that user selects, It searches for user's current queries range P respective queries and covers range P*;Including:Safety first search submodule, for according to peace The preferential search strategy search user's current queries range P respective queries of full property cover range P*:By candidate query range set Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency Query context P respective queries cover range P*:By the highest candidate query model of location-based service efficiency in candidate query range set It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony Preferential search strategy search user's current queries range P respective queries cover range P*:It will be used in candidate query range set Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user Preceding query context P respective queries cover range P*
Stochastic transformation module, for covering the cover query context P that range acquisition module obtains to inquiry*=(P*@L, P*@R), the radius for covering query context is extended to 1.0~1.2 times at random and as half of the cover query context after expansion Diameter obtains the cover query context after random expanded scope, the cover query context as user's query context P constructions.
It is considered incredible at the present embodiment LBS service device end, it is the maximum target of attacker.It is assumed that attacking The control that the person of hitting has been obtained for server end (assumes that attacker is hacker or the server admin for breaking through server Member).The system architecture provided from Fig. 1, it can be seen that:Attacker can know that client submits all position enquiring sequences (i.e. historical query sequence), but they are to cover new search sequence (and the non-user that construction generates by the privacy algorithm of client True search sequence).So location privacy protection method needs to prevent cover query context recognition sequence of the attacker from grasp Go out the true inquiring position (or query context) of mobile subscriber.In addition, the attacker for obtaining LBS service device end control possesses Powerful ability, it possesses complete cartographic information, and is responsible for executing LBS algorithms, therefore attacker may grasp use Many position enquiring rules at family, for example, user often likes initiates service request etc. around which fixed position or region. At this point, attacker can reduce according to this relevance between this user's inquiring position covers range.The ability of attacker More than that, he may also be aware of the presence for the LBS Privacy preserving algorithms for operating in client, so he is also possible to obtain The copy of Privacy preserving algorithms, then, the LBS search sequences that oneself will be grasped input Privacy preserving algorithms, and observe algorithm Output covers range area as a result, reducing accordingly.
As it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, not to The limitation present invention, all within the spirits and principles of the present invention made by all any modification, equivalent and improvement etc., should all include Within protection scope of the present invention.

Claims (10)

1. a kind of location-based service method for secret protection covered based on range, which is characterized in that inquire model for given user Enclose sequenceScale sequence is covered in construction inquiry So that described look into It askes and covers scale sequence while meeting the following conditions:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiryIt is full Sufficient position enquiring relevance constraint, i.e.,:
For the inquiring position sequence of user's query context sequenceModel is covered in its corresponding inquiry Enclose the inquiring position sequence of sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithFor same position It sets, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWithThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and covers wide security.
2. the location-based service method for secret protection covered as described in claim 1 based on range, which is characterized in that the condition 3 is i.e. arbitraryMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,For Corresponding subsequence in scale sequence is covered in inquiryQuery context circular scope radius.
3. the location-based service method for secret protection covered as described in claim 1 based on range, which is characterized in that the condition 4 is i.e. arbitraryMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,It is covered for inquiry Corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence Arbitary inquiry PkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context center The distance between point, α is distance threshold.
4. the location-based service method for secret protection covered based on range as described in claims 1 to 3 any one, feature are existed In the inquiry is covered range and constructed as follows:
(1) data acquisition:Obtain user's current queries range P, user's history query context sequence And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains:For the user's history query context sequence obtained in step (1)In any look into Ask Pk, k=1,2 ..., n:
As the central point P of its query contextkWhen@L are identical as the central point P@L of user's current queries range, then the historical query Inquiry P in scale sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user Current queries range P respective queries cover range P*Inquiring position, i.e.,:
Or
The level r=1,2 of the band of position is traversed ..., rm, for the band of position D that arbitrary levels are r, when it is simultaneously comprising current Range P and historical query range Pk, then user's current queries range P respective queries cover range P*It falls in the historical query model Enclose PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraints:User's current queries range P respective queries cover range P*Centered on point ForQuery context or in level be r band of position D*In;
(3) candidate query range set is obtained:Obtain it is all meet in step (2) or position enquiring relevance constraints, The set for covering range accuracy, covering range high efficiency and covering the query context of wide securityI.e. so that:
(4) it obtains inquiry and covers range:It is preferential according to safety, efficient for the candidate query range set that step (3) obtains Property preferential or harmonious preferential search strategy, search user's current queries range P respective queries cover range P*
When according to the preferential search strategy search user's current queries range P respective queries cover range P of safety*When, user works as Preceding query context P respective queries cover range P*User location privacy exists in the candidate query range set obtained for step (3) The highest candidate query range of safety coefficient of server end, i.e.,:
When according to the preferential search strategy search user's current queries range P respective queries cover range P of high efficiency*When, user works as Preceding query context P respective queries cover range P*Location privacy protection institute in the candidate query range set obtained for step (3) Caused by the highest candidate query range of location-based service efficiency, i.e.,:
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, user works as Preceding query context P respective queries cover range P*User location privacy exists in the candidate query range set obtained for step (3) The safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, i.e.,:
5. the location-based service method for secret protection covered based on range as described in Claims 1-4 any one, feature are existed In it further includes step that the building method of range is covered in the inquiry:
(5) query context is covered in stochastic transformation:For the cover query context P obtained in step (4)*=(P*@L,P*@R), it will Cover query context radius be extended at random 1.0~1.2 times and as after expansion cover query context radius, obtain with Cover query context after machine expanded scope, the cover query context as user's query context P constructions.
6. a kind of location-based service intimacy protection system covered based on range, which is characterized in that including setting in user terminal and Location privacy protection server between location server;The location privacy protection server be trusted client, for pair In given user's query context sequence Scale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server Query result is returned, is the query result in user's query context by query result screening, and return to user.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user's query context sequenceThe inquiring position sequence of scale sequence is covered with inquiry Meet the constraint of position enquiring relevance, i.e.,:
For the inquiring position sequence of user's query context sequenceModel is covered in its corresponding inquiry Enclose the inquiring position sequence of sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithFor same position It sets, i.e.,:
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWithThenWithBelong to the band of position that level is rI.e.:
Wherein, the set of the band of position, that is, position units gathers around there are one level any position region D, is denoted as r;Region Level it is higher, the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user's query context sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and covers wide security.
7. the location-based service intimacy protection system covered as claimed in claim 6 based on range, which is characterized in that the condition 3 is i.e. arbitraryMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor the location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein:Pk@R are the arbitary inquiry P of user's query context sequencekQuery context circular scope radius,For Corresponding subsequence in scale sequence is covered in inquiryQuery context circular scope radius.
8. the location-based service intimacy protection system covered as claimed in claim 6 based on range, which is characterized in that the condition 4 is i.e. arbitraryMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein:Pk@L are the arbitary inquiry P of user's query context sequencekQuery context central point,It is covered for inquiry Corresponding subsequence in scale sequenceQuery context central point, For user's query context sequence Arbitary inquiry PkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context center The distance between point, α is distance threshold.
9. the location-based service intimacy protection system covered based on range as described in claim 6 to 8 any one, feature are existed In, the location-based service intimacy protection system covered based on range, including:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequence And user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance and constrain item Part:User's current queries range P respective queries cover range P*Centered on point beQuery context or in level be r Band of position D*In;It is preferred that including the first submodule and the second submodule;First submodule is used to work as its query context Central point PkWhen@L are identical as the central point P@L of user's current queries range, then looking into the historical query scale sequence Ask PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries range P Respective queries cover range P*Inquiring position, i.e.,:The second submodule is for traversing the band of position Level r=1,2 ..., rm, for the band of position D that arbitrary levels are r, when it includes present scope P and historical query simultaneously Range Pk, then user's current queries range P respective queries cover range P*It falls in the historical query range PkHistory cover model It enclosesThe level at place is the band of position D of r*In;
Candidate query range set acquisition module is accurate for obtaining all satisfaction inquiry relevance constraintss, cover range Property, cover range high efficiency and cover wide security query context setI.e. so that:
Range acquisition module is covered in inquiry, for from candidate query range set, according to the search strategy that user selects, searching for User's current queries range P respective queries cover range P*;Including:Safety first search submodule, for according to safety Preferential search strategy search user's current queries range P respective queries cover range P*:It will be used in candidate query range set Family location privacy server end the highest candidate query range of safety coefficient as user's current queries range P respective queries Cover range P*;High efficiency first search submodule, for searching for user's current queries according to the preferential search strategy of high efficiency Range P respective queries cover range P*:The highest candidate query range of location-based service efficiency in candidate query range set is made Range P is covered for user's current queries range P respective queries*;Harmonious first search submodule, for according to harmonious preferential Search strategy search user's current queries range P respective queries cover range P*:By user position in candidate query range set Privacy is set currently to look into as user in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency It askes range P respective queries and covers range P*
10. the location-based service intimacy protection system covered based on range as described in claim 6 to 9 any one, feature It is, the location-based service intimacy protection system covered based on range further includes:Stochastic transformation module, for being covered to inquiry The cover query context P that lid range acquisition module obtains*=(P*@L,P*@R), the radius for covering query context is extended at random 1.0~1.2 times and as after expansion cover query context radius, obtain the cover query context after random expanded scope, Cover query context as user's query context P constructions.
CN201810212081.XA 2018-03-15 2018-03-15 A kind of location-based service method for secret protection and system based on range cover Expired - Fee Related CN108449335B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810212081.XA CN108449335B (en) 2018-03-15 2018-03-15 A kind of location-based service method for secret protection and system based on range cover

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810212081.XA CN108449335B (en) 2018-03-15 2018-03-15 A kind of location-based service method for secret protection and system based on range cover

Publications (2)

Publication Number Publication Date
CN108449335A true CN108449335A (en) 2018-08-24
CN108449335B CN108449335B (en) 2019-03-08

Family

ID=63195277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810212081.XA Expired - Fee Related CN108449335B (en) 2018-03-15 2018-03-15 A kind of location-based service method for secret protection and system based on range cover

Country Status (1)

Country Link
CN (1) CN108449335B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414644A (en) * 2020-03-18 2020-07-14 支付宝(杭州)信息技术有限公司 Privacy protection query method based on block chain and block chain system
CN112084411A (en) * 2020-09-10 2020-12-15 绍兴文理学院 User privacy protection method for personalized information retrieval

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1627177A (en) * 2003-12-10 2005-06-15 精工爱普生株式会社 Control method of image display, conroller and control program
CN101242467A (en) * 2007-02-09 2008-08-13 富士胶片株式会社 Image processing apparatus
CN101834861A (en) * 2010-04-16 2010-09-15 华中师范大学 Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
US20100287189A1 (en) * 2009-05-05 2010-11-11 Pioneer Hi-Bred International, Inc. Acceleration of tag placement using custom hardware
CN102665207A (en) * 2012-05-08 2012-09-12 杭州电子科技大学 Method used for continuously inquiring hiding user position based on mobile terminal in LBS (location based service)
US20150032711A1 (en) * 2013-07-06 2015-01-29 Victor Kunin Methods for identification of organisms, assigning reads to organisms, and identification of genes in metagenomic sequences
CN106803825A (en) * 2017-01-10 2017-06-06 西安电子科技大学 Anonymous zone building method based on query context

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1627177A (en) * 2003-12-10 2005-06-15 精工爱普生株式会社 Control method of image display, conroller and control program
CN101242467A (en) * 2007-02-09 2008-08-13 富士胶片株式会社 Image processing apparatus
US20100287189A1 (en) * 2009-05-05 2010-11-11 Pioneer Hi-Bred International, Inc. Acceleration of tag placement using custom hardware
CN101834861A (en) * 2010-04-16 2010-09-15 华中师范大学 Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
CN102665207A (en) * 2012-05-08 2012-09-12 杭州电子科技大学 Method used for continuously inquiring hiding user position based on mobile terminal in LBS (location based service)
US20150032711A1 (en) * 2013-07-06 2015-01-29 Victor Kunin Methods for identification of organisms, assigning reads to organisms, and identification of genes in metagenomic sequences
CN106803825A (en) * 2017-01-10 2017-06-06 西安电子科技大学 Anonymous zone building method based on query context

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王宇航等: "移动互联网中的位置隐私保护研究", 《通信学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414644A (en) * 2020-03-18 2020-07-14 支付宝(杭州)信息技术有限公司 Privacy protection query method based on block chain and block chain system
CN112084411A (en) * 2020-09-10 2020-12-15 绍兴文理学院 User privacy protection method for personalized information retrieval
CN112084411B (en) * 2020-09-10 2021-04-20 绍兴文理学院 User privacy protection method for personalized information retrieval

Also Published As

Publication number Publication date
CN108449335B (en) 2019-03-08

Similar Documents

Publication Publication Date Title
Dong et al. Novel privacy-preserving algorithm based on frequent path for trajectory data publishing
Zhao et al. ILLIA: Enabling $ k $-anonymity-based privacy preserving against location injection attacks in continuous LBS queries
Liu et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services
Huo et al. Privacy-preserving point-of-interest recommendation based on geographical and social influence
CN105491519B (en) Based on the method for secret protection under real-time query scene continuous in location-based service
US10078743B1 (en) Cross identification of users in cyber space and physical world
Chen et al. Measuring query privacy in location-based services
CN106254314B (en) A kind of position enquiring information on services guard method and system
Li et al. DALP: A demand‐aware location privacy protection scheme in continuous location‐based services
Ying et al. Protecting location privacy with clustering anonymization in vehicular networks
Saravanan et al. Preserving privacy in the context of location based services through location hider in mobile-tourism
Kim et al. Hilbert‐order based spatial cloaking algorithm in road network
CN108449335B (en) A kind of location-based service method for secret protection and system based on range cover
Zhang et al. Privacy quantification model based on the Bayes conditional risk in Location-based services
CN107770722A (en) The method for secret protection of location-based service based on the information constrained double stealthy regions in side
Nosouhi et al. A hybrid location privacy protection scheme in big data environment
Zhang et al. Protecting the Moving User’s Locations by Combining Differential Privacy and k‐Anonymity under Temporal Correlations in Wireless Networks
Wang et al. Privacy preserving for continuous query in location based services
CN111800786B (en) Track privacy protection method based on k anonymity
Wightman et al. MaPIR: Mapping-based private information retrieval for location privacy in LBISs
Manju et al. Dispersed dummy selection approach for location‐based services to preempt user‐profiling
Ju et al. Location privacy protection for smartphone users using quadtree entropy maps
Zhao et al. EPLA: efficient personal location anonymity
Teerakanok et al. Preserving User Anonymity in Context‐Aware Location‐Based Services: A Proposed Framework
Jadallah et al. Aman: Spatial cloaking for privacy-aware location-based queries in the cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190308

CF01 Termination of patent right due to non-payment of annual fee