CN108449335B - A kind of location-based service method for secret protection and system based on range cover - Google Patents

A kind of location-based service method for secret protection and system based on range cover Download PDF

Info

Publication number
CN108449335B
CN108449335B CN201810212081.XA CN201810212081A CN108449335B CN 108449335 B CN108449335 B CN 108449335B CN 201810212081 A CN201810212081 A CN 201810212081A CN 108449335 B CN108449335 B CN 108449335B
Authority
CN
China
Prior art keywords
range
query
user
inquiry
cover
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810212081.XA
Other languages
Chinese (zh)
Other versions
CN108449335A (en
Inventor
吴宗大
李仁超
徐湖鹏
谢坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou University of Technology
Original Assignee
Wenzhou University Oujiang College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou University Oujiang College filed Critical Wenzhou University Oujiang College
Priority to CN201810212081.XA priority Critical patent/CN108449335B/en
Publication of CN108449335A publication Critical patent/CN108449335A/en
Application granted granted Critical
Publication of CN108449335B publication Critical patent/CN108449335B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of location-based service method for secret protection covered based on range and systems.The method covers scale sequence, makes its satisfaction: the inquiring position sequence of user query scale sequence for user query scale sequence, construction inquiryThe inquiring position sequence for covering scale sequence with inquiry meets the constraint of position enquiring relevance;The inquiry covers corresponding subsequence in scale sequence and meets cover range accuracy;The inquiry covers corresponding subsequence in scale sequence and meets cover range high efficiency;The inquiry covers corresponding subsequence in scale sequence and meets cover wide security.The system comprises the location privacy protection servers being arranged between user terminal and location server;For for given user query scale sequence, construction inquiry to cover scale sequence, submits to location server and obtain return query result, screen as the query result within the scope of user query and return to user.The present invention has effectively achieved LBS inquiry secret protection.

Description

A kind of location-based service method for secret protection and system based on range cover
Technical field
The invention belongs to networks to service secret protection technical field, more particularly, to a kind of position covered based on range Set service privacy protection method and system.
Background technique
With the development of wireless communication and mobile positioning technique, more and more mobile devices have GPS positioning function Can, so that location-based service (LBS) increased popularity, it is had become towards one of most promising service of mobile subscriber.LBS refers to base The geographical location information provided by positioning of mobile equipment function, it is typical for the various information query service that user provides Using map class application, such as Google Maps, and the inquiry based on point of interest is specifically included that, convenience store nearby is such as inquired.Mesh Before, LBS achieves immense success in social commercial field, it was reported that global LBS relative commercial application annual earnings have surpassed Cross 15,000,000,000 dollars.It is asked safely however, LBS while bringing huge convenient to individual, has also caused serious location privacy Topic.Because user is when obtaining location-based service, it usually needs report their current geographic position, i.e. inquiring position.These positions Confidence ceases highly sensitive privacy, and the personal whereabouts of user can be accurately inferred to using them.These sensitive individual subscriber whereabouts Be leaked to insincere third party, such as LBS provider, will certainly the location privacy to user constitute serious threat safely.LBS The concern that is just causing people increasingly extensive of location privacy safety problem, how to be effectively protected the LBS location privacy peace of user A urgent problem to be solved is had become entirely.
In order to protect the location privacy safety of LBS, researcher has been presented for many methods, comprising: assumed name method, fuzz method, Enciphered method and dummy argument method etc..(1) assumed name method refer to by LBS inquire in the assumed name that is temporarily constructed with one of user identifier replace, To cut off the connection between user and inquiry.However, assumed name method is subject to the threat of data mining, and due to user's body Part is hidden, this is also an obstacle to the application of authentication is needed.(2) fuzz method refers to extensive (using hidden area) or disturbs Location information in dynamic (using noise) user query, so that attacker can not identify user's specific location.Due to issuing clothes Be engaged in device is modified inquiry, and the accuracy of service can be reduced when many.In addition, assumed name method and fuzz method generally rely on In trusted third party's anonymous server, this is easy to cause performance bottleneck and privacy bottleneck.(3) enciphered method refers to by using encryption Technology makes user query completely invisible to server, thus achieve the purpose that secret protection, it is typical as being based on privacy information Retrieve the LBS enciphered method of (PIR).But enciphered method usually require that change server LBS algorithm, and need additional hardware and The support of complicated algorithm reduces the actual availability of method.(4) dummy argument method is before inquiry is exposed to server, in advance Dummy argument is added, and dummy argument inquiry and true inquiry are submitted together, so that server is difficult to obtain user's actual position.This kind of skill Art depends on the construction quality of dummy argument, is prone to the supposition attack based on data distribution characteristics.
In conclusion effective LBS location privacy method for security protection needs to meet the requirement of the following aspects.(1) The safety for guaranteeing user location privacy, even if that is, attacker has grasped priori knowledge abundant, it is also difficult to from LBS search sequence In be inferred to the actual position track of user.(2) guarantee the accuracy of the final LBS query result of mobile subscriber, i.e. comparison introduces The front and back of Privacy Preservation Mechanism, the finally obtained service result of user should be consistent.(3) actual availability of LBS is not damaged, I.e. Privacy Preservation Mechanism does not require to change the LBS algorithm of server end, does not need additional hardware supported, will not look into LBS The execution efficiency of inquiry, which constitutes conspicuousness, to be influenced.Wherein, it is desirable that (2) and (3) is required actually to require location privacy protection method Client user and server end LBS algorithm are realized fully transparent.The more safe and reliable and availability height there is still a need for exploitation Position enquiring method for secret protection and system.
Summary of the invention
Aiming at the above defects or improvement requirements of the prior art, the present invention provides a kind of position clothes covered based on range It is engaged in method for secret protection and system, its object is to cover range by construction inquiry, before location-based service high efficiency is controllable It puts, effective protection location-based service personal secrets, thus solves to need exist for developing more safe and reliable and availability height Position enquiring method for secret protection and the technical issues of system.
To achieve the above object, according to one aspect of the present invention, a kind of location-based service covered based on range is provided Method for secret protection, for given user query scale sequenceRange sequence is covered in construction inquiry ColumnSo that the inquiry covers scale sequence and meets the following conditions simultaneously:
Condition 1, the inquiring position sequence of user query scale sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, it may be assumed that
For the inquiring position sequence of user query scale sequenceIts corresponding inquiry is covered The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same Position, it may be assumed that
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWithThenWithBelong to the band of position that level is rThat is:
Wherein, the band of position, that is, position units set possesses a level for any position region D, is denoted as r;
Condition 2, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and covers wide security.
Preferably, the location-based service method for secret protection covered based on range, the condition 3 are i.e. anyMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein: Pk@R is the arbitary inquiry P of user query scale sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Preferably, the location-based service method for secret protection covered based on range, the condition 4 are i.e. anyMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein: Pk@L is the arbitary inquiry P of user query scale sequencekQuery context central point,For inquiry Cover corresponding subsequence in scale sequenceQuery context central point, For user query range sequence The arbitary inquiry P of columnkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context The distance between central point, α are distance threshold.
Preferably, the location-based service method for secret protection covered based on range, inquiry cover range according to Following method construct:
(1) user's current queries range P, user's history query context sequence data acquisition: are obtained And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains: for the user's history query context sequence obtained in step (1)In appoint One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L is identical as the central point P@L of user's current queries range, then described to go through Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake Range P is covered for user's current queries range P respective queries*Inquiring position, it may be assumed that
Or
The level r=1,2 of the band of position is traversed ..., rm, the band of position D for being r for arbitrary levels, when it is wrapped simultaneously P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*Fall in the history Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraint condition: user's current queries range P respective queries cover range P*For Central point isQuery context or in level be r band of position D*In;
(3) obtain candidate query range set: obtain it is all meet in step (2) or position enquiring relevance constraint item Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if :
(4) it obtains inquiry and covers range: the candidate query range set that step (3) are obtained, preferential according to safety, The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*
As the search strategy search user current queries range P respective queries cover range P preferential according to safety*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Safety coefficient highest candidate query range of the privacy in server end, it may be assumed that
As the search strategy search user current queries range P respective queries cover range P preferential according to high efficiency*When, User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3) The highest candidate query range of location-based service efficiency caused by protection, it may be assumed that
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, it may be assumed that
Preferably, the structure of range is covered in the location-based service method for secret protection covered based on range, the inquiry The method of making further comprises the steps of:
(5) query context is covered in stochastic transformation: for the cover query context P obtained in step (4)*=(P*@L,P*@ R), by the radius for covering query context be extended at random 1.0~1.2 times and as after expansion cover query context radius, Cover query context after obtaining random expanded scope, the cover query context as user query range P construction.
Other side according to the invention provides a kind of location-based service intimacy protection system covered based on range, It includes the location privacy protection server being arranged between user terminal and location server;The location privacy protection service Device is trusted client, for for given user query scale sequenceConstruction inquiry is covered Scale sequenceInquiry cover scale sequence is submitted into location server, and obtains position It sets server and returns to query result, the query result is screened as the query result within the scope of user query, and return to use Family.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user query scale sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, it may be assumed that
For the inquiring position sequence of user query scale sequenceIts corresponding inquiry is covered The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same Position, it may be assumed that
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith ThenWithBelong to the band of position that level is rThat is:
Wherein, the band of position, that is, position units set possesses a level for any position region D, is denoted as r; The level in region is higher, and the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and covers wide security.
Preferably, the location-based service intimacy protection system covered based on range, the condition 3 are i.e. anyMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein: Pk@R is the arbitary inquiry P of user query scale sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Preferably, the location-based service intimacy protection system covered based on range, the condition 4 are i.e. anyMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein: Pk@L is the arbitary inquiry P of user query scale sequencekQuery context central point,For inquiry Cover corresponding subsequence in scale sequenceQuery context central point, For user query range sequence The arbitary inquiry P of columnkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context The distance between central point, α are distance threshold.
Preferably, the location-based service intimacy protection system covered based on range, the position covered based on range Set service intimacy protection system, comprising:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about Beam condition: user's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer The secondary band of position D for r*In;It is preferred that including the first submodule and second submodule;First submodule is used to look into when it Ask the central point P of rangekWhen@L is identical as the central point P@L of user's current queries range, then the historical query scale sequence In inquiry PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries Range P respective queries cover range P*Inquiring position, it may be assumed thatThe second submodule is for traversing position The level r=1,2 in region is set ..., rm, the band of position D for being r for arbitrary levels, when it includes simultaneously present scope P and is gone through History query context Pk, then user's current queries range P respective queries cover range P*Fall in the historical query range PkHistory Cover rangeThe level at place is the band of position D of r*In;
Candidate query range set obtains module, for obtaining all satisfaction inquiry relevance constraint conditions, covering range Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Inquiry covers range and obtains module, for from candidate query range set, according to the search strategy that user selects, It searches for user's current queries range P respective queries and covers range P*;It include: safety first search submodule, for according to peace The preferential search strategy search user's current queries range P respective queries of full property cover range P*: by candidate query range set Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency Query context P respective queries cover range P*: by the highest candidate query model of location-based service efficiency in candidate query range set It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony Preferential search strategy search user's current queries range P respective queries cover range P*: it will be used in candidate query range set Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user Preceding query context P respective queries cover range P*
Preferably, the location-based service intimacy protection system covered based on range, the position covered based on range Set service intimacy protection system, further includes: stochastic transformation module is looked into for covering the cover that range acquisition module obtains to inquiry Ask range P*=(P*@L,P*@R), the radius for covering query context is extended to 1.0~1.2 times at random and as covering after expansion The radius of lid query context, the cover query context after obtaining random expanded scope, the cover as user query range P construction Query context.
In general, through the invention it is contemplated above technical scheme is compared with the prior art, can obtain down and show Beneficial effect:
Method and system energy provided by the invention: (1) guaranteeing the safety of location privacy, i.e. attacker is difficult to according to priori Knowledge analyzes the true inquiring position or query context of user from LBS request sequence.(2) guarantee the efficient of location-based service Property, i.e. secret protection will not influence too much the overall performance of location-based service.(3) guarantee the accuracy of location-based service, i.e., Before and after comparing secret protection, the location-based service result that user obtains is consistent.(4) availability of protective position service, i.e., it is hidden Private protection does not change the LBS algorithm of server-side, does not change existing LBS framework, does not change the existing use habit of user yet.
Detailed description of the invention
Fig. 1 is the location-based service intimacy protection system structural schematic diagram provided by the invention covered based on range;
Fig. 2 is the location-based service method for secret protection query result schematic diagram provided by the invention covered based on range.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.As long as in addition, technical characteristic involved in the various embodiments of the present invention described below Not constituting a conflict with each other can be combined with each other.
Present invention meaning LBS inquiry is represented by E=(U, A, T, P), in which: U is user label;A is querying attributes (such as hospital, hotel);T is corresponding timestamp when submitting inquiry;P is inquiring position and relevant parameter.Inquiry request E association Query context P be represented by a border circular areas, i.e. P is represented by P=(P@L, P@R), wherein P@L indicate range center Point position, P R indicate the radius of circular scope.The location service request that query context sequence is initiated whithin a period of time by user The query context contained is constituted, and can be denoted asWherein, Pk(k=1,2 ..., n) indicate one Query context.The query context center that inquiring position sequence is contained by the location service request that user initiates whithin a period of time Point is constituted, and can be denoted asWherein, Lk=Pk@L indicates an inquiring position.
The location-based service method for secret protection provided by the invention covered based on range, specifically: for given user Query context sequenceScale sequence is covered in construction inquiry So that The inquiry covers scale sequence and meets the following conditions simultaneously:
Condition 1, the inquiring position sequence of user query scale sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, it may be assumed that
For the inquiring position sequence of user query scale sequenceIts corresponding inquiry is covered The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same Position, it may be assumed that
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith ThenWithBelong to the band of position that level is rThat is:
Wherein, the band of position, that is, position units set possesses a level for any position region D, is denoted as r; The level in region is higher, and the position that it includes is also more, possesses highest level rmThe band of position, that is, entire map, belong to The band of position same level r collection is combined intoIt meets following characteristics:
Feature 1, any two same level band of position are non-intersecting, it may be assumed that
Feature 2, any two same level region area is equal, i.e. (wherein, AR indicates region area):
The union of feature 3, all same level bands of position is equal to map itself, it may be assumed that
Feature 4, arbitrary region are both contained in the region of some higher, it may be assumed that
In fact, there is the associations of very strong position between the inquiry request that same user is initiated whithin a period of time Property.Be mainly manifested in, these inquiry requests usually surround several fixations position or region (such as user's residence or unit) and send out It rises.The attacker for knowing abundant background knowledge is easy to know the rule of this relevance between user query position, and accordingly Come reduce privacy methods construction cover range area, to reduce user location privacy in the safety of insincere server end Property.Illustrate the problem below by way of a simply example.Assuming that attacker has grasped, user is in two different time points The inquiry request submitted surrounds the same fixed position and initiates (being assumed to be P L).Assuming that privacy methods are the two requests Constructing the cover range generated is respectivelyWithDue to covering rangeWithIt must satisfy location-based service accuracy, because This,So according to priori knowledge, attacker it may be concluded that Therefore, range is covered to be reduced into the protecting effect of position personal secretsI.e. in query service twice, attacker Eliminable cover range is respectively as follows:WithSo that defining the 4 cover models provided It encloses safety and is unable to get guarantee.
Therefore to consider the relevance problem between user query position, i.e., the position initiated whithin a period of time with user Inquiry request sequence is research unit, so that should also show to accord between the center for the cover scale sequence that construction generates It shares family and really inquires the position relevance of rule (for example, in the preceding example, covering rangeWithSimilarly surround phase It is initiated with position, i.e.,), so that attacker is difficult to reduce cover range, reduce the guarantor for covering range Protect effect.
Condition 2, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and cover range high efficiency, i.e., arbitrarilyMeetWherein ρ is to cover Lid range high efficiency threshold value;
WhereinFor location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein: Pk@R is the arbitary inquiry P of user query scale sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Condition 4, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and cover wide security, i.e., arbitrarilyMeetWherein μ is to cover Lid wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein: Pk@L is the arbitary inquiry P of user query scale sequencekQuery context central point,For inquiry Cover corresponding subsequence in scale sequenceQuery context central point, For user query range sequence The arbitary inquiry P of columnkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context The distance between central point, α are distance threshold, when cover range centerWith user query position PkDistance between@L is super When crossing the threshold value, attacker can not know the true inquiring position of user or range substantially, and the safety of location privacy reaches at this time Peak (i.e. 1.0).
The inquiry is covered range and can be constructed as follows:
(1) user's current queries range P, user's history query context sequence data acquisition: are obtained And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains: for the user's history query context sequence obtained in step (1)In appoint One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L is identical as the central point P@L of user's current queries range, then described to go through Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake Range P is covered for user's current queries range P respective queries*Inquiring position, it may be assumed that
Or
The level r=1,2 of the band of position is traversed ..., rm, the band of position D for being r for arbitrary levels, when it is wrapped simultaneously P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*Fall in the history Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraint condition: user's current queries range P respective queries cover range P*For Central point isQuery context or in level be r band of position D*In;
(3) obtain candidate query range set: obtain it is all meet in step (2) or position enquiring relevance constraint item Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if :
(4) it obtains inquiry and covers range: the candidate query range set that step (3) are obtained, preferential according to safety, The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*
As the search strategy search user current queries range P respective queries cover range P preferential according to safety*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Safety coefficient highest candidate query range of the privacy in server end, it may be assumed that
When covering range P* according to the preferential search strategy search user's current queries range P respective queries of high efficiency, User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3) The highest candidate query range of location-based service efficiency caused by protection, it may be assumed that
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, it may be assumed that
It preferably, in order to further improve the security, further include that query context is covered in step (5) stochastic transformation: for step Suddenly the cover query context P obtained in (4)*=(P*@L,P*@R), the radius for covering query context is extended to 1.0 at random~ 1.2 times and the radius as the cover query context after expansion, cover query context after obtaining random expanded scope, as with The cover query context of family query context P construction.
It is provided by the invention based on range cover location-based service intimacy protection system, as shown in Figure 1, include setting with Location privacy protection server between family terminal and location server;The location privacy protection server is credible client End, for for given user query scale sequence Scale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server Query result is returned, the query result is screened as the query result within the scope of user query, and return to user.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user query scale sequenceThe inquiring position sequence of scale sequence is covered with inquiryMeet the constraint of position enquiring relevance, it may be assumed that
For the inquiring position sequence of user query scale sequenceIts corresponding inquiry is covered The inquiring position sequence of lid scale sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithIt is same Position, it may be assumed that
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWith ThenWithBelong to the band of position that level is rThat is:
Wherein, the band of position, that is, position units set possesses a level for any position region D, is denoted as r; The level in region is higher, and the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and cover range high efficiency, i.e., arbitrarilyMeetWherein ρ is to cover Lid range high efficiency threshold value;
WhereinFor location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein: Pk@R is the arbitary inquiry P of user query scale sequencekQuery context circular scope radius,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
Condition 4, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding sub- sequence in scale sequence ColumnMeet and cover wide security, i.e., arbitrarilyMeetWherein μ is to cover Lid wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein: Pk@L is the arbitary inquiry P of user query scale sequencekQuery context central point,For inquiry Cover corresponding subsequence in scale sequenceQuery context central point, For user query range sequence The arbitary inquiry P of columnkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context The distance between central point, α are distance threshold, when cover range centerWith user query position PkDistance between@L is super When crossing the threshold value, attacker can not know the true inquiring position of user or range substantially, and the safety of location privacy reaches at this time Peak (i.e. 1.0).
Preferably, the location-based service intimacy protection system covered based on range, comprising:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about Beam condition: user's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer The secondary band of position D for r*In;It is preferred that including the first submodule and second submodule;First submodule is used to look into when it Ask the central point P of rangekWhen@L is identical as the central point P@L of user's current queries range, then the historical query scale sequence In inquiry PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries Range P respective queries cover range P*Inquiring position, it may be assumed thatThe second submodule is for traversing position The level r=1,2 in region is set ..., rm, the band of position D for being r for arbitrary levels, when it includes simultaneously present scope P and is gone through History query context Pk, then user's current queries range P respective queries cover range P*Fall in the historical query range PkHistory Cover rangeThe level at place is the band of position D of r*In;
Candidate query range set obtains module, for obtaining all satisfaction inquiry relevance constraint conditions, covering range Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Inquiry covers range and obtains module, for from candidate query range set, according to the search strategy that user selects, It searches for user's current queries range P respective queries and covers range P*;It include: safety first search submodule, for according to peace The preferential search strategy search user's current queries range P respective queries of full property cover range P*: by candidate query range set Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency Query context P respective queries cover range P*: by the highest candidate query model of location-based service efficiency in candidate query range set It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony Preferential search strategy search user's current queries range P respective queries cover range P*: it will be used in candidate query range set Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user Preceding query context P respective queries cover range P*
It is preferred that the location-based service intimacy protection system covered based on range, further includes: stochastic transformation module, for pair Inquiry covers range and obtains the cover query context P that module obtains*=(P*@L,P*@R), the radius for covering query context is random It is extended to 1.0~1.2 times and the radius as the cover query context after expansion, the cover inquiry after obtaining random expanded scope Range, the cover query context as user query range P construction.
The basic idea of the invention is that: client-based architecture passes through the location service request submitted for user Construction generates a new location service request, and (wherein, the true query context of user is by well-designed " covering a range " institute Substitution) so that insincere server end is difficult to know the true inquiring position of user.Finally, client is returned from server end LBS result in filter out corresponding user's true request as a result, so that it is guaranteed that user can finally obtain accurate LBS inquiry As a result.
Based on above-mentioned secret protection frame, introduce the user location privacy model towards LBS, its formal definitions privacy Client is that user location services request constructs the constraint that the cover range generated need to meet in protect-ing frame structure, to ensure position Set the safety of the high efficiency and location privacy of service.In addition, privacy model also contemplates inquiring position (i.e. in query context The heart) between constraint, even if so that attacker has grasped the complete LBS request sequence that the rules of customer search Behavior and client are submitted Column, are still difficult to analyze user location privacy, further ensure the safety of location privacy.
The following are embodiments:
Embodiment 1
A kind of location-based service method for secret protection covered based on range, specifically: for given user query range SequenceScale sequence is covered in construction inquiry
For each current queries range P in given user query scale sequence, range is covered in corresponding inquiry It can construct as follows:
(1) user's current queries range P, user's history query context sequence data acquisition: are obtained And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains: for the user's history query context sequence obtained in step (1)In appoint One inquiry Pk, k=1,2 ..., n:
As the central point P of its query contextkIt is when@L is identical as the central point P@L of user's current queries range, then described to go through Inquiry P in history query context sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionMake Range P is covered for user's current queries range P respective queries*Inquiring position, it may be assumed that
Or
The level r=1,2 of the band of position is traversed ..., rm, the band of position D for being r for arbitrary levels, when it is wrapped simultaneously P containing present scope and historical query range Pk, then user's current queries range P respective queries cover range P*Fall in the history Query context PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraint condition: user's current queries range P respective queries cover range P*For Central point isQuery context or in level be r band of position D*In;
(3) obtain candidate query range set: obtain it is all meet in step (2) or position enquiring relevance constraint item Part, the set for covering range accuracy, covering range high efficiency and covering the query context of wide securityEven if :
(4) it obtains inquiry and covers range: the candidate query range set that step (3) are obtained, preferential according to safety, The search strategy that high efficiency is preferential or harmony is preferential, search user's current queries range P respective queries cover range P*
As the search strategy search user current queries range P respective queries cover range P preferential according to safety*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Safety coefficient highest candidate query range of the privacy in server end, it may be assumed that
As the search strategy search user current queries range P respective queries cover range P preferential according to high efficiency*When, User's current queries range P respective queries cover range P*Location privacy in the candidate query range set obtained for step (3) The highest candidate query range of location-based service efficiency caused by protection, it may be assumed that
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, User's current queries range P respective queries cover range P*User location in the candidate query range set obtained for step (3) Privacy is in the safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, it may be assumed that
(5) query context is covered in stochastic transformation: for the cover query context P obtained in step (4)*=(P*@L,P*@ R), by the radius for covering query context be extended at random 1.0~1.2 times and as after expansion cover query context radius, Cover query context after obtaining random expanded scope, the cover query context as user query range P construction.
Constructing an inquiry cover range specific steps can be used following pseudocode expression:
Based on above-mentioned location privacy protection frame and model, specific Optimization Solution algorithm is provided.It operates in credible client End, the location service request sequence structure that can be submitted for user generate one group of new request sequence for meeting the constraint of privacy Model Condition Column, meet LBS user location secret protection demand well.
By theory analysis and experimental evaluation, the validity of privacy model and privacy algorithm is verified:
The present embodiment method does not change the accuracy of location-based service, does not change existing location-based service algorithm, does not change yet The existing platform architecture of location-based service.As shown in fig. 2, it can be seen that the present embodiment secret protection is to location-based service high efficiency It influences to depend on covering range area, i.e., if ignoring the execution time of client privacy algorithm itself, introduces privacy and protect After protection mechanism, the execution time needed for a location-based service about will be added to original m times, and wherein m is to cover range area With the ratio of query context areaAnd cover range area and will affect the safety of location privacy, i.e. m value is got over Greatly
Then the risk of privacy exposure is lower.So LBS performance loss caused by secret protection is linearly positively correlated with visitor The cover range area of family end construction, thus performance loss is controllable, will not significantly reduce location-based service efficiency.Next this is analyzed The safety of literary method.Below in conjunction with challenge model, point three kinds of situations consider.
(1) can attacker according to the cover range P of method construct*Itself deduce user query position P@L or inquiry Range P? covering range P*In, user query range center has been replaced (range radius has also been extended), so that attack Person is according to P*The probability value for deducing user query position P@L is equal to(wherein | P*| it is P*The position units quantity of covering), I.e. probability value is extremely low.Since attacker does not know the radius P R of the true query context P of user, he deduces whole user in turn The probability of query context P is also smaller.Certainly, if attacker has grasped algorithm copy and (grasped algorithm principle, and known The road currently employed search strategy of algorithm and dependent thresholds parameter), it is known that the radius P@R of user query ranges, attacker User query position P@L, which can be deduced, can probably fall in the outer ring for covering range P*, but determine the radius (sentence for covering range 4 and 10) when, algorithm joined a random value θ, so that the probability that attacker guesses user location P@L still minimum (is approximately equal to)。
(2) can attacker according to the cover scale sequence that client is submitted whithin a period of timeDeduce user's Some inquiring position P@L or query context P? this is that attacker can grasp according to preparatory with afore-mentioned maximum difference User query position relevance come reduce cover range area, improve the probability value for successfully deducing user location.Before such as Example, attacker is according to priori knowledge it can be concluded that user query position P@L necessarily falls in two cover rangesWith It is interior.At this point, cover range to the protecting effect of location privacy become forI.e. attacker deduces user query position The probability value of P@L is equal toIfIt is much smaller thanOrExtreme influence imitates the cover of location privacy Fruit.However, the cover range constructed also embodies this position well and closes since context of methods considers such case Connection property (such as in front in example, covers rangeWithIt will meet), so that OrI.e. attacker is difficult to reduce the protecting effect for covering range accordingly.
It (3), can be according to cover scale sequence after attacker's acquisition operates in the Privacy preserving algorithms copy of client Deduce user query position P@L or query context P? at this point, attacker can input one by one to algorithm copy covers range P*In each position units Lk∈P*(also assume that attacker has grasped currently employed search strategy and related threshold here Value parameter), then can observation algorithm construct output and cover range P*.If it succeeds, showing LkIt is user's real user position It sets.However, such trial can't succeed (and obtaining above-mentioned conclusion success), because our methods are covered in determination Lid range P*Radius when, joined a random value θ (see sentence 4 and 10) so that twice it is identical input can also obtain not Same output, or even if identical output, do not reach the identical conclusion of input yet.
Although in conclusion attacker knows background knowledge abundant, but be difficult to be recorded from server-side goes through The inquiring position or range of user are identified in history inquiry, thus context of methods has preferable personal secrets.In addition, according to The related work of chapters and sections 2, it will thus be seen that (1) assumed name method is subject to the threat of data mining, and hides user identity Reduce the practicability of method;(2) fuzz method usually requires modification inquiry, this can reduce service accuracy to a certain degree, and Performance bottleneck and privacy bottleneck are also easy to cause to the dependence of third party's anonymous server;(3) enciphered method has usually required that change There is LBS algorithm, and need the support of additional hardware and complicated algorithm, reduces method practicability;(4) dummy argument method is prone to Supposition attack based on data distribution characteristics, leads to poor safety.It is qualitative with existing methods that table 1 gives context of methods Comparison result.As can be seen from Table 1: compared to existing method, context of methods is in safety, accuracy, high efficiency and availability Possess better comprehensive performance, has effectively achieved LBS inquiry secret protection.
The qualitative comparison of 1 validity of table
Comparative approach Personal secrets Service accuracy Service high efficiency Actual availability
Context of methods It is good It is good Generally It is good
Assumed name method It is good It is good It is good It is bad
Fuzz method It is good It is bad It is good It is good
Enciphered method It is good It is good It is good It is bad
Dummy argument method Generally It is good Generally It is good
Embodiment 2
A kind of location-based service intimacy protection system covered based on range, as shown in Figure 1, include setting in user terminal and Location privacy protection server between location server;The location privacy protection server be trusted client, for pair In given user query scale sequenceScale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server Query result is returned, the query result is screened as the query result within the scope of user query, and return to user;
The location-based service intimacy protection system covered based on range, comprising:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance about Beam condition: user's current queries range P respective queries cover range P*Centered on point beQuery context or be in layer The secondary band of position D for r*In;Including the first submodule and second submodule;First submodule is used to work as its query context Central point PkWhen@l is identical as the central point P@L of user's current queries range, then looking into the historical query scale sequence Ask PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries range P Respective queries cover range P*Inquiring position, it may be assumed thatThe second submodule is for traversing the band of position Level r=1,2 ..., rm, the band of position D for being r for arbitrary levels, when it includes simultaneously present scope P and historical query Range Pk, then user's current queries range P respective queries cover range P*Fall in the historical query range PkHistory cover model It enclosesThe level at place is the band of position D of r*In;
Candidate query range set obtains module, for obtaining all satisfaction inquiry relevance constraint conditions, covering range Accuracy, the set covered range high efficiency and cover the query context of wide securityI.e. so that:
Inquiry covers range and obtains module, for from candidate query range set, according to the search strategy that user selects, It searches for user's current queries range P respective queries and covers range P*;It include: safety first search submodule, for according to peace The preferential search strategy search user's current queries range P respective queries of full property cover range P*: by candidate query range set Middle user location privacy is corresponding as user's current queries range P in the highest candidate query range of safety coefficient of server end Range P is covered in inquiry*;High efficiency first search submodule, for current according to the preferential search strategy search user of high efficiency Query context P respective queries cover range P*: by the highest candidate query model of location-based service efficiency in candidate query range set It encloses and covers range P as user's current queries range P respective queries*;Harmonious first search submodule, for according to harmony Preferential search strategy search user's current queries range P respective queries cover range P*: it will be used in candidate query range set Family location privacy is worked as in the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user Preceding query context P respective queries cover range P*
Stochastic transformation module obtains the cover query context P that module obtains for covering range to inquiry*=(P*@L, P*@R), the radius for covering query context is extended to 1.0~1.2 times at random and as cover query context half after expansion Diameter, the cover query context after obtaining random expanded scope, the cover query context as user query range P construction.
Be considered as at the present embodiment LBS server end it is incredible, it is the maximum target of attacker.It is assumed that attacking The control that the person of hitting has been obtained for server end (assumes that attacker is hacker or the server admin for breaking through server Member).The system architecture provided from Fig. 1, it will thus be seen that attacker can know that client submits all position enquiring sequences (i.e. historical query sequence), but they are new search sequence (and the non-user covering construction by the privacy algorithm of client and generating True search sequence).So location privacy protection method needs to prevent cover query context recognition sequence of the attacker from grasp The true inquiring position (or query context) of mobile subscriber out.In addition, the attacker for obtaining LBS server end control possesses Powerful ability, it possesses complete cartographic information, and is responsible for executing LBS algorithm, therefore attacker may grasp use Many position enquirings rule at family, for example, user, which often likes, initiates service request etc. around the position which is fixed or region. At this point, attacker can reduce according to this relevance between this user query position covers range.The ability of attacker More than that, he may also be aware of the presence for operating in the LBS Privacy preserving algorithms of client, so he is also possible to obtain The copy of Privacy preserving algorithms, then, the LBS search sequence that oneself will be grasped input Privacy preserving algorithms, and observe algorithm Output covers range area as a result, reducing accordingly.
As it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, not to The limitation present invention, any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should all include Within protection scope of the present invention.

Claims (10)

1. a kind of location-based service method for secret protection covered based on range, which is characterized in that for given user query model Enclose sequenceScale sequence is covered in construction inquiry So that the inquiry It covers scale sequence and meets the following conditions simultaneously:
Condition 1, the inquiring position sequence of user query scale sequenceThe inquiring position sequence of scale sequence is covered with inquiry Meet the constraint of position enquiring relevance, it may be assumed that
For the inquiring position sequence of user query scale sequenceModel is covered in its corresponding inquiry Enclose the inquiring position sequence of sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithFor same position It sets, it may be assumed that
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWithThenWithBelong to the band of position that level is rThat is:
Wherein, the band of position, that is, position units set possesses a level for any position region D, is denoted as r;
Condition 2, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and covers wide security.
2. the location-based service method for secret protection covered as described in claim 1 based on range, which is characterized in that the condition 3 is i.e. anyMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein: Pk@R is the arbitary inquiry P of user query scale sequencekQuery context circular scope radius,For Corresponding subsequence in scale sequence is covered in inquiryQuery context circular scope radius.
3. the location-based service method for secret protection covered as described in claim 1 based on range, which is characterized in that the condition 4 is i.e. anyMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein: Pk@L is the arbitary inquiry P of user query scale sequencekQuery context central point,It is covered for inquiry Corresponding subsequence in scale sequenceQuery context central point, For user query scale sequence Arbitary inquiry PkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context center The distance between point, α is distance threshold;Pk@R is the arbitary inquiry P of user query scale sequencekQuery context round model The radius enclosed,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
4. the location-based service method for secret protection covered based on range as described in claims 1 to 3 any one, feature are existed In the inquiry is covered range and constructed as follows:
(1) user's current queries range P, user's history query context sequence data acquisition: are obtained And user's history query context sequenceScale sequence is covered in corresponding inquiry
(2) position enquiring relevance constrains: for the user's history query context sequence obtained in step (1)In any look into Ask Pk, k=1,2 ..., n:
As the central point P of its query contextkWhen@L is identical as the central point P@L of user's current queries range, then the historical query Inquiry P in scale sequencekThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user Current queries range P respective queries cover range P*Inquiring position, it may be assumed that
Or
The level r=1,2 of the band of position is traversed ..., rm, the band of position D for being r for arbitrary levels, when it includes simultaneously current Range P and historical query range Pk, then user's current queries range P respective queries cover range P*Fall in the historical query model Enclose PkHistory cover rangeThe level at place is the band of position D of r*In;
To obtain position enquiring relevance constraint condition: user's current queries range P respective queries cover range P*Centered on point ForQuery context or in level be r band of position D*In;
(3) obtain candidate query range set: obtain it is all meet in step (2) or position enquiring relevance constraint condition, The set for covering range accuracy, covering range high efficiency and covering the query context of wide securityI.e. so that:
Wherein, PR (P, P#) it is safety coefficient of the user location privacy in server end;μ is to cover wide security threshold value;EF (P,P#) it is location-based service efficiency caused by location privacy protection;ρ is to cover range high efficiency threshold value;
(4) it obtains inquiry and covers range: the candidate query range set that step (3) are obtained, preferentially, efficiently according to safety Property preferential or harmonious preferential search strategy, search user's current queries range P respective queries cover range P*
As the search strategy search user current queries range P respective queries cover range P preferential according to safety*When, user works as Preceding query context P respective queries cover range P*User location privacy exists in the candidate query range set obtained for step (3) The highest candidate query range of the safety coefficient of server end, it may be assumed that
As the search strategy search user current queries range P respective queries cover range P preferential according to high efficiency*When, user works as Preceding query context P respective queries cover range P*Location privacy protection institute in the candidate query range set obtained for step (3) Caused by the highest candidate query range of location-based service efficiency, it may be assumed that
When according to harmonious preferential search strategy search user's current queries range P respective queries cover range P*When, user works as Preceding query context P respective queries cover range P*User location privacy exists in the candidate query range set obtained for step (3) The safety coefficient of server end and the maximum candidate query range of the product of location-based service efficiency, it may be assumed that
5. the location-based service method for secret protection covered as claimed in claim 4 based on range, which is characterized in that the inquiry The building method for covering range further comprises the steps of:
(5) query context is covered in stochastic transformation: for the cover query context P obtained in step (4)*=(P*@L,P*@R), it will Cover query context radius be extended at random 1.0~1.2 times and as after expansion cover query context radius, obtain with Cover query context after machine expanded scope, the cover query context as user query range P construction.
6. a kind of location-based service intimacy protection system covered based on range, which is characterized in that including setting in user terminal and Location privacy protection server between location server;The location privacy protection server be trusted client, for pair In given user query scale sequence Scale sequence is covered in construction inquiryInquiry cover scale sequence is submitted into location server, and obtains location server Query result is returned, the query result is screened as the query result within the scope of user query, and return to user.
Scale sequence is covered in the inquiryMeet the following conditions simultaneously:
Condition 1, the inquiring position sequence of user query scale sequenceThe inquiring position sequence of scale sequence is covered with inquiry Meet the constraint of position enquiring relevance, it may be assumed that
For the inquiring position sequence of user query scale sequenceModel is covered in its corresponding inquiry Enclose the inquiring position sequence of sequenceWhereinCorresponding Lk, one of constraint below:
Constraint 1, ifThere are LaAnd LbFor same position,Corresponding person isWithThenWithFor same position It sets, it may be assumed that
Or
Constraint 2, ifThere are LaAnd LbBelong to the band of position that level is rItsCorresponding person isWithThenWithBelong to the band of position that level is rThat is:
Wherein, the band of position, that is, position units set possesses a level for any position region D, is denoted as r;Region Level it is higher, the position that it includes is also more.
Condition 2, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and cover range accuracy, i.e., arbitrarilyMeet
Condition 3, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and covers range high efficiency;
Condition 4, for the arbitary inquiry P of user query scale sequencek, the inquiry covers corresponding subsequence in scale sequence Meet and covers wide security.
7. the location-based service intimacy protection system covered as claimed in claim 6 based on range, which is characterized in that the condition 3 is i.e. anyMeetWherein ρ is to cover range high efficiency threshold value;
WhereinFor location-based service efficiency caused by location privacy protection, calculate as follows:
Wherein: Pk@R is the arbitary inquiry P of user query scale sequencekQuery context circular scope radius,For Corresponding subsequence in scale sequence is covered in inquiryQuery context circular scope radius.
8. the location-based service intimacy protection system covered as claimed in claim 6 based on range, which is characterized in that the condition 4 is i.e. anyMeetWherein μ is to cover wide security threshold value;
WhereinIt is user location privacy in the safety coefficient of server end, calculates as follows:
Wherein: Pk@L is the arbitary inquiry P of user query scale sequencekQuery context central point,It is covered for inquiry Corresponding subsequence in scale sequenceQuery context central point, For user query scale sequence Arbitary inquiry PkQuery context central point and inquiry cover scale sequence in corresponding subsequenceQuery context center The distance between point, α is distance threshold;Pk@R is the arbitary inquiry P of user query scale sequencekQuery context round model The radius enclosed,Corresponding subsequence in scale sequence is covered for inquiryQuery context circular scope radius.
9. the location-based service intimacy protection system covered based on range as described in claim 6 to 8 any one, feature are existed In the location-based service intimacy protection system covered based on range, comprising:
Data acquisition module, for obtaining user's current queries range P, user's history query context sequenceAnd user's history query context sequenceScale sequence is covered in corresponding inquiry
Position enquiring relevance constraints module, the data for being obtained according to data acquisition module generate inquiry relevance and constrain item Part: user's current queries range P respective queries cover range P*Centered on point beQuery context or in level be r Band of position D*In;It is preferred that including the first submodule and second submodule;First submodule is used to work as its query context Central point PkWhen@L is identical as the central point P@L of user's current queries range, then looking into the historical query scale sequence Ask PkThe inquiry in scale sequence is covered in corresponding inquiryBy its inquiring positionAs user's current queries range P Respective queries cover range P*Inquiring position, it may be assumed thatThe second submodule is for traversing the band of position Level r=1,2 ..., rm, the band of position D for being r for arbitrary levels, when it includes simultaneously present scope P and historical query Range Pk, then user's current queries range P respective queries cover range P*Fall in the historical query range PkHistory cover model It enclosesThe level at place is the band of position D of r*In;
Candidate query range set obtains module, accurate for obtaining all satisfaction inquiry relevance constraint conditions, cover range Property, cover range high efficiency and cover wide security query context setI.e. so that:
Wherein, PR (P, P#) it is safety coefficient of the user location privacy in server end;μ is to cover wide security threshold value;EF (P,P#) it is location-based service efficiency caused by location privacy protection;ρ is to cover range high efficiency threshold value;
Inquiry covers range and obtains module, is used for from candidate query range set, according to the search strategy that user selects, search User's current queries range P respective queries cover range P*;It include: safety first search submodule, for according to safety Preferential search strategy search user's current queries range P respective queries cover range P*: it will be used in candidate query range set Family location privacy server end the highest candidate query range of safety coefficient as user's current queries range P respective queries Cover range P*;High efficiency first search submodule, for searching for user's current queries according to the preferential search strategy of high efficiency Range P respective queries cover range P*: the highest candidate query range of location-based service efficiency in candidate query range set is made Range P is covered for user's current queries range P respective queries*;Harmonious first search submodule, for according to harmonious preferential Search strategy search user's current queries range P respective queries cover range P*: by user position in candidate query range set Privacy is set currently to look into the safety coefficient of server end and the highest candidate query range of the product of location-based service efficiency as user It askes range P respective queries and covers range P*
10. the location-based service intimacy protection system covered as claimed in claim 9 based on range, which is characterized in that the base In the location-based service intimacy protection system that range is covered, further includes: stochastic transformation module obtains mould for covering range to inquiry The cover query context P that block obtains*=(P*@L,P*@R), the radius for covering query context is extended to 1.0~1.2 times simultaneously at random As the radius of the cover query context after expansion, cover query context after obtaining random expanded scope, as user query The cover query context of range P construction.
CN201810212081.XA 2018-03-15 2018-03-15 A kind of location-based service method for secret protection and system based on range cover Expired - Fee Related CN108449335B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810212081.XA CN108449335B (en) 2018-03-15 2018-03-15 A kind of location-based service method for secret protection and system based on range cover

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810212081.XA CN108449335B (en) 2018-03-15 2018-03-15 A kind of location-based service method for secret protection and system based on range cover

Publications (2)

Publication Number Publication Date
CN108449335A CN108449335A (en) 2018-08-24
CN108449335B true CN108449335B (en) 2019-03-08

Family

ID=63195277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810212081.XA Expired - Fee Related CN108449335B (en) 2018-03-15 2018-03-15 A kind of location-based service method for secret protection and system based on range cover

Country Status (1)

Country Link
CN (1) CN108449335B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414644B (en) * 2020-03-18 2023-01-17 支付宝(杭州)信息技术有限公司 Privacy protection query method based on block chain and block chain system
CN112084411B (en) * 2020-09-10 2021-04-20 绍兴文理学院 User privacy protection method for personalized information retrieval

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834861A (en) * 2010-04-16 2010-09-15 华中师范大学 Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4400200B2 (en) * 2003-12-10 2010-01-20 セイコーエプソン株式会社 Image display method, image display apparatus, and image display program
JP4671133B2 (en) * 2007-02-09 2011-04-13 富士フイルム株式会社 Image processing device
US20100287189A1 (en) * 2009-05-05 2010-11-11 Pioneer Hi-Bred International, Inc. Acceleration of tag placement using custom hardware
CN102665207A (en) * 2012-05-08 2012-09-12 杭州电子科技大学 Method used for continuously inquiring hiding user position based on mobile terminal in LBS (location based service)
US20150032711A1 (en) * 2013-07-06 2015-01-29 Victor Kunin Methods for identification of organisms, assigning reads to organisms, and identification of genes in metagenomic sequences
CN106803825B (en) * 2017-01-10 2019-12-10 西安电子科技大学 anonymous area construction method based on query range

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834861A (en) * 2010-04-16 2010-09-15 华中师范大学 Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service

Also Published As

Publication number Publication date
CN108449335A (en) 2018-08-24

Similar Documents

Publication Publication Date Title
Zhao et al. ILLIA: Enabling $ k $-anonymity-based privacy preserving against location injection attacks in continuous LBS queries
Dong et al. Novel privacy-preserving algorithm based on frequent path for trajectory data publishing
Liu et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services
Wang et al. Privacy preservation in location-based services
CN105491519B (en) Based on the method for secret protection under real-time query scene continuous in location-based service
Mouratidis et al. Shortest path computation with no information leakage
US10078743B1 (en) Cross identification of users in cyber space and physical world
CN103826237B (en) A kind of method for building up of the continuously location privacy protection model based on location-based service
Chen et al. Measuring query privacy in location-based services
CN106254314B (en) A kind of position enquiring information on services guard method and system
US10440092B2 (en) Alert generation based on proximate events identified by source data analytics
Ghinita Private queries and trajectory anonymization: a dual perspective on location privacy
Li et al. DALP: A demand‐aware location privacy protection scheme in continuous location‐based services
CN108449335B (en) A kind of location-based service method for secret protection and system based on range cover
CN104080081A (en) Space anonymization method suitable for mobile terminal position privacy protection
Kim et al. Hilbert‐order based spatial cloaking algorithm in road network
CN107770722A (en) The method for secret protection of location-based service based on the information constrained double stealthy regions in side
Zhang et al. Privacy quantification model based on the Bayes conditional risk in Location-based services
Nosouhi et al. A hybrid location privacy protection scheme in big data environment
Yan et al. Privacy protection in 5G positioning and location-based services based on SGX
Zhang et al. Protecting the moving user’s locations by combining differential privacy and k-anonymity under temporal correlations in wireless networks
Ju et al. Location privacy protection for smartphone users using quadtree entropy maps
Manju et al. Dispersed dummy selection approach for location‐based services to preempt user‐profiling
Wightman et al. MaPIR: Mapping-based private information retrieval for location privacy in LBISs
Lu et al. A novel method for location privacy protection in LBS applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190308

CF01 Termination of patent right due to non-payment of annual fee