CN108566373B - Location information publishing system for protecting user privacy - Google Patents

Location information publishing system for protecting user privacy Download PDF

Info

Publication number
CN108566373B
CN108566373B CN201810183549.7A CN201810183549A CN108566373B CN 108566373 B CN108566373 B CN 108566373B CN 201810183549 A CN201810183549 A CN 201810183549A CN 108566373 B CN108566373 B CN 108566373B
Authority
CN
China
Prior art keywords
privacy
user
clustering
location information
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810183549.7A
Other languages
Chinese (zh)
Other versions
CN108566373A (en
Inventor
张千里
王继龙
李星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201810183549.7A priority Critical patent/CN108566373B/en
Publication of CN108566373A publication Critical patent/CN108566373A/en
Priority to PCT/CN2018/112217 priority patent/WO2019169878A1/en
Application granted granted Critical
Publication of CN108566373B publication Critical patent/CN108566373B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a position information release system for protecting user privacy, which comprises: the position information obtaining module is used for obtaining user position information, and specifically comprises: the client is used for processing the position information of the user by a privacy processing method to obtain the clustering position code after privacy processing; the server is used for receiving the clustering position codes which are sent by the client and subjected to privacy removal processing, and recovering the clustering position codes subjected to privacy removal processing by a recovery method corresponding to the privacy removal processing method so as to obtain the position information of the user; the position information issuing module is used for issuing information with different user positions and different accuracies respectively according to different authorization authorities through a hierarchical position privacy protection method. The system presents the position information by clustering codes after privacy removal processing, and obtains the position information with different accuracy degrees according to the authorization authority, thereby realizing the position information release on the basis of protecting the position information privacy.

Description

Location information publishing system for protecting user privacy
Technical Field
The invention relates to the technical field of computer networks, in particular to a position information publishing system for protecting user privacy.
Background
Geographic locations are usually presented in longitude and latitude, such data are usually inconvenient to store and present due to existence of binary or even more metadata such as altitude, and are inconvenient to use due to complex data structures in internet use, usually by wrapping and presenting with complex data structures on top of HTTP (HyperText Transfer protocol). In the implementation of HTML5, the Geolocation API obtains location information represented by longitude and latitude by using information such as GPS (Global positioning System), IP (Internet Protocol, Protocol for interconnection between networks), RFID (Radio Frequency Identification), WiFi (WIreless-WIreless network), bluetooth MAC address, GSM (Global System for Mobile communication)/CDMA (Code Division Multiple Access) card ID (Identification number), and then returns the location information to the browser.
However, as users' awareness of location privacy protection is gradually increased, users tend not to expose their own precise location information, but only to submit ambiguous location information sufficient for network applications to continue to develop, and users do not allow distribution of location information for privacy protection, but rather limit the development of location-related applications.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, an object of the present invention is to provide a location information distribution system for protecting user privacy, which can effectively implement location information distribution based on protecting location information privacy.
To achieve the above object, an embodiment of an aspect of the present invention provides a location information publishing system for protecting user privacy, including: a location information obtaining module, configured to obtain location information of a user, where the location information obtaining module specifically includes: the client is used for processing the position information of the user through a privacy processing method to obtain the clustering position code after privacy processing; the server is used for receiving the clustering position code after the privacy removal processing sent by the client, and recovering the clustering position code after the privacy removal processing through a recovery method corresponding to the privacy removal processing method so as to obtain the position information of the user; and the position information issuing module is used for respectively issuing information with different user positions and different accuracies according to different authorization authorities by a hierarchical position privacy protection method.
According to the position information publishing system for protecting the user privacy, which is disclosed by the embodiment of the invention, the application with different authorizations is ensured through the established hierarchical protection mechanism of the user position privacy, the position information with different accuracies can be obtained by using different parameters, and the position information can be presented by clustering codes after privacy removal processing, so that the network application can obtain the position information with different accuracies according to the authorization authority of the network application, and the position information publishing based on the position information privacy protection is effectively realized.
In addition, the location information distribution system for protecting the privacy of the user according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, the client accesses the server through WWW, the server queries the location information of the user through a call interface, and the client sends the clustering-capable location code for privacy elimination.
Further, in an embodiment of the present invention, the client embeds the clustering-capable location code with privacy removal processing into the last 64 bits of the IPv6 unicast address, and recovers the clustering-capable location code with privacy removal processing according to a parameter preset by a user, so as to obtain the location information of the user.
Further, in one embodiment of the present invention, the clustering position encoding algorithm satisfies:
Hm(F(p,n))=F(p,m),
where F (P, n) is a code value S from the position space P to a length unit of nCAn encoding algorithm for space, hm (c), is a mapping of the position code in length units n truncated by m length units.
Further, in an embodiment of the present invention, the privacy elimination processing method includes:
a=a1a2…an;F(a)=a1’a2’…an’,
wherein the content of the first and second substances,
Figure BDA0001589610050000021
Figure BDA0001589610050000022
represents an exclusive-or operation, i is 1,2, … n, fiIs a number from {0,1}iA mapping to {0,1}, i ═ 1,2 … n-1; f. of0Is constant and defines the privacy-removing function F as a function of {0,1}nTo {0,1}nTo (3) is performed.
Further, in an embodiment of the present invention, a method for recovering the clustering position codes after privacy removal corresponding to the privacy removal processing method is as follows:
Figure BDA0001589610050000023
Figure BDA0001589610050000024
representing an exclusive or operation.
Figure BDA0001589610050000025
Figure BDA0001589610050000026
Representing an exclusive or operation.
Further, in an embodiment of the present invention, before the publishing of the user location information, the location information publishing module is further configured to obtain the location information of the user through privacy removal processing of multiple access rights, so as to obtain a clusterable location code after the privacy removal processing before publishing.
Further, in an embodiment of the present invention, the location information publishing module is further configured to recover the clusterable location code after the privacy removal processing before publishing, to obtain location information of a user, and publish the location information of the user.
Further, in an embodiment of the present invention, a former part of the clusterable location code before release is not subjected to privacy elimination, and a remaining part of the clusterable location code is subjected to privacy elimination through a password preset on the server by the user.
Further, in an embodiment of the present invention, the system further includes: and the authority management module is used for respectively granting the visitor viewing authority according to different authorities of different visitors so as to acquire the position information of the user according to the viewing authority.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic diagram of a location information distribution system for protecting user privacy according to one embodiment of the present invention;
FIG. 2 is a method of generating a clusterable position code according to one embodiment of the invention;
FIG. 3 is a flow diagram of a privacy-removed location information publication in accordance with one embodiment of the present invention;
FIG. 4 is a schematic diagram of an algorithm for embedding a position code c into IPv6 for 64 bits according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an algorithm for embedding a position code c into IPv6 for 64 bits according to an embodiment of the present invention;
FIG. 6 is an algorithm for embedding a position code c into 64 bits after IPv6 according to one embodiment of the present invention;
FIG. 7 is a flow diagram of a multi-level privacy removal process using a client password on a server, according to one embodiment of the invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
A location information distribution system proposed to protect user privacy according to an embodiment of the present invention is described below with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a location information distribution system for protecting user privacy according to an embodiment of the present invention.
As shown in fig. 1, the location information distribution system 10 that protects the privacy of the user includes: a location information acquisition module 100 and a location information distribution module 200.
The location information obtaining module 100 is configured to obtain location information of a user, where the location information obtaining module 100 specifically includes: a client and a server. The client is used for processing the position information of the user through a privacy processing method to obtain the clustering position code after privacy processing; the server is used for receiving the clustering position codes which are sent by the client and subjected to privacy removal processing, and recovering the clustering position codes subjected to privacy removal processing through a recovery method corresponding to the privacy removal processing method so as to obtain the position information of the user. The location information issuing module 200 is configured to issue information of different user locations with different accuracies according to different authorization authorities by using a hierarchical location privacy protection method. The system 10 of the embodiment of the invention enables the network application to obtain the position information with different accuracy degrees according to the authorization authority of the network application by presenting the position information in the clustering code after privacy removal processing, thereby realizing the position information release on the basis of protecting the position information privacy.
It can be understood that the embodiment of the present invention relates to a network access device that knows its own geographical location, and encodes its own geographical location, and the encoding satisfies that the location range marked by the longer prefix is included in the location range described by the shorter prefix. The code can be subjected to multi-level privacy removal processing, and can be shared with a server and other internet access devices.
That is to say, the embodiments of the present invention can realize the position information expression with different position accuracies by using the position codes that can be clustered, and for the same position, the more the number of bits used, the higher the position accuracy, and the position code with the higher position accuracy includes the position code with the lower position accuracy. By using the privacy removing algorithm based on cryptography, users with different authorization information can be ensured, and the position information with different precisions can be obtained aiming at the same position code after privacy, so that the position privacy safety of the users is protected.
In one embodiment of the invention, the client provides the clustering position code after privacy removal processing to the server, and the server decodes the position code after privacy removal processing to obtain the position information of the client. The client can be various internet access devices such as a mobile phone and a computer.
Specifically, the client provides the self clustering position code after privacy removal processing to the server, and the server can restore the position code after privacy removal processing to the original position code according to the parameter known in advance and then decode the position code to obtain the position information of the client. Other users cannot obtain accurate position information or even position information without the parameters known in advance.
Further, in one embodiment of the present invention, the clustering position encoding algorithm satisfies:
Hm(F(p,n))=F(p,m),
where F (P, n) is a code value S from the position space P to a length unit of nCAn encoding algorithm for space, hm (c), is a mapping of the position code in length units n truncated by m length units.
Specifically, the clusterable position code satisfies the condition that F (P, n) is a code value S from the position space P to a length unit of nCIn a spatial coding algorithm, Hm (c) is a mapping obtained by truncating a position code with a length of n by m length units, and the clustering-capable position coding algorithm satisfies Hm (F (p, n)) ═ F (p, m).
The most important feature of the clustering-based position coding algorithm is that the position range marked by the longer prefix is included in the position range described by the shorter prefix. Obviously, simply connecting latitude and longitude does not satisfy this: assume a binary representation of longitude as a1a2…anBinary representation of latitude as b1b2…bnThen 4 bits are coded as a1a2b1b2And 2n bits are coded as a1a2…anb1b2…bnIts first 4 bits are not a1a2b1b2
For example, as shown in fig. 2, the following is a position code having such a feature:
the longitude and latitude are converted into binary representation with fixed length of n bits, and the binary representations of the longitude and the latitude are crossed to form a position code. The method for converting longitude into n-bit binary is that 1 bit is used for representing symbols, 8 bits are used for representing data on the left side of a decimal point, and the remaining n-9 bits are used for representing data on the right side of the decimal point; the latitude is converted by using 1 bit to represent the symbol, 7 bits to represent the data on the left side of the decimal point, and the remaining n-8 bits to represent the data on the right side of the decimal point. And carrying out cross combination on binary representations of the longitude and the latitude with equal length to form the final position code.
Further, in one embodiment of the invention, the client accesses the server via the WWW, the server queries the client for location information by calling the interface, and the client returns a clustered location code that is subject to privacy elimination. As shown in fig. 3, the specific steps are:
s101: the client accesses a certain WWW server.
S102: the server asks the client for the location information through a call interface such as Javascript or HTML 5.
S103: and the client obtains the clustering position code of the current position information according to the longitude and the latitude.
S104: the client performs privacy removal on the clustering position code and returns the clustering position code to the server.
S105: the server restores the clustering position code after privacy removal processing to the original clustering position code.
S106: the server extracts the location information from this clusterable location code.
Further, in an embodiment of the present invention, the client embeds the clustering-capable location code with privacy-removing processing into the last 64 bits of the IPv6 unicast address, and recovers the clustering-capable location code with privacy-removing processing according to the parameters preset by the user, so as to obtain the location information of the user.
For example, the client embeds the clustering position code subjected to privacy removal processing into the last 64 bits of the IPv6 unicast address, so that the server can recover the clustering position code according to the parameters known in advance, and the position information of the client is obtained. Other systems on the internet cannot obtain accurate location information, or even location information, without these pre-known parameters.
In addition, as shown in fig. 4, one possible embedding manner is as follows:
the 7 th bit of the last 64 bits (also called interface identification of IPv6 address) of the IPv6 address is set as 1, one bit (such as the 25 th bit) of the 25 th to 39 th bits in the last 64 bits is set as 0, and the rest is used for storing the position code subjected to privacy removal processing. Since the EUI64 specification in the 64-bit generation scheme after the IPv6 address requires that the 7 th bit be 1 and the 4 th-5 th bytes be 0xFFFE, the above generation scheme can identify that the interface identifier contains location information.
Further, as shown in fig. 5, another possible embedding manner is as follows:
the 7 th bit of the last 64 bits (also called interface identification of IPv6 address) of the IPv6 address is set as 1, the 40 th bit of the last 64 bits is set as 1, and the rest is used for storing the position code subjected to privacy removal processing. Since the EUI64 specification in the 64-bit generation scheme after the IPv6 address requires that the 7 th bit be 1 and the 4 th-5 th bytes be 0xFFFE, the above generation scheme can identify that the interface identifier contains location information.
Further, as shown in fig. 6 (where 0x0001 is used for example only, and any value other than 0 xffffe may be selected in the implementation), another possible embedding manner is as follows:
the 7 th bit of the last 64 bits (also called interface identification of IPv6 address) of the IPv6 address is set as 1, the 25 th to 40 th bits of the last 64 bits are set as a non) 0xFFFE other values, and the rest is used for storing the position code subjected to privacy removal processing. This not only distinguishes itself from the EUI64 specification, but also reserves space for other possible extensions.
An important advantage of distributing location information by e.g. upper location coding is that it facilitates the use of hierarchical location privacy measures, so that location information of different precisions can be provided for different authorizations, using only the same coding value.
Further, in an embodiment of the present invention, the privacy elimination processing method includes:
a=a1a2…an;F(a)=a1’a2’…an’,
wherein the content of the first and second substances,
Figure BDA0001589610050000061
Figure BDA0001589610050000062
represents an exclusive-or operation, i is 1,2, … n, fiIs a number from {0,1}iA mapping to {0,1}, i ═ 1,2 … n-1; f. of0Is constant and defines the privacy-removing function F as a function of {0,1}nTo {0,1}nTo (3) is performed.
It can be understood that the embodiment of the present invention relates to a privacy protection measure for the above clusterable location code, and the clusterable location code is subjected to a privacy removal process in order to protect the location privacy of the user. Let fiIs a number from {0,1}iA mapping to {0,1}, i ═ 1,2 … n-1; f. of0Is constant and defines the privacy-removing function F as a function of {0,1}nTo {0,1}nIs defined as follows:
for a ═ a1a2…an;F(a)=a1’a2’…an', wherein
Figure BDA0001589610050000063
Figure BDA0001589610050000064
Represents an exclusive or operation, i ═ 1,2, … n.
The algorithm of this de-privacy process is a prefix preserving de-privacy algorithm, that is, for any two position codes, if their first k bits before de-privacy are the same, then the first k bits after de-privacy are also the same.
Further, in an embodiment of the present invention, a method for recovering the clustering position codes after privacy removal corresponding to the privacy removal processing method is as follows:
Figure BDA0001589610050000065
Figure BDA0001589610050000066
representing an exclusive or operation.
Figure BDA0001589610050000067
Figure BDA0001589610050000068
Representing an exclusive or operation.
It can be understood that the present invention relates to a recovery method for the clustered position codes after privacy removal as above, and the position codes after the privacy removal algorithm processing for the retained prefix can be recovered by adopting the following method: for the position coding a ═ a1a2…anA privacy removal process by prefix retention is1’a2’…an', then if f is knowniI-0, 1, … n-1, the original position code can be recovered by the following procedure.
Figure BDA0001589610050000069
Figure BDA00015896100500000610
Representing an exclusive or operation.
Figure BDA00015896100500000611
Figure BDA00015896100500000612
Representing an exclusive or operation.
For example, a-a is encoded for each input's clusterable n-bit position1a2…anOne algorithm to implement this privacy-removing process is as follows:
s201: first, form a 2nThe bit string S is set to 1 for i and 1 for P (a, 0).
S202: if the ith bit of a is aiIs 1, then P (a, i) ═ P (a, i-1)<<1) +1, otherwise (P (a, i-1)<<1)+2。
S203: let B (S, i) = ((S [ i > >3] & (0x80> > (i &0x07))) | 0). Where > > is a few bits shifted to the right, < < < is a few bits shifted to the left, & denotes a bitwise AND.
S204:
Figure BDA0001589610050000071
Figure BDA0001589610050000072
Representing an exclusive or operation.
S205: let i ═ i +1, repeat S202 to S205 until the privacy removal processing of the entire position code is completed.
Clustering n-bit position coding a ═ a for each input1a2…anOne algorithm to implement this privacy-removing process is as follows:
s301: first, form a 2nThe bit string S is set to 1 for i and 1 for P (a, 0).
S302: if the ith bit of a is aiIs 1, then P (a, i) ═ P (a, i-1) + (1)<<(n-i)), otherwise ((P (a, i-1)<<1)+1)。
S303: let B (S, i) = ((S [ i > >3] & (0x80> > (i &0x07))) | 0). Where > > is a few bits shifted to the right, < < < is a few bits shifted to the left, & denotes a bitwise AND.
S304:
Figure BDA0001589610050000073
Figure BDA0001589610050000074
Representing an exclusive or operation.
S305: let i be i +1, repeat S302 to S305 until the privacy removal processing of the entire position code is completed.
A' subjected to privacy removal processing of S201 to S205 for each input1’a2’…an' A is recovered1a2…anThe algorithm of (1) is as follows:
s401: first, form a 2nThe bit string S is set to 1 for i and 1 for P (a, 0).
S402:
Figure BDA0001589610050000075
Figure BDA0001589610050000076
Representing an exclusive or operation.
S403: if the ith bit of a is aiIs 1, then P (a, i) ═ P (a, i-1)<<1) +1, otherwise (P (a, i-1)<<1)+2。
S404: let B (S, i) = ((S [ i > >3] & (0x80> > (i &0x07))) | 0). Where > > is a few bits shifted to the right, < < < is a few bits shifted to the left, & denotes a bitwise AND.
S405: let i ═ i +1, repeat S402 to S405 until the recovery of the entire position code is completed.
A' subjected to the privacy-removing process of S301 to S305 for each input1’a2’…an' A is recovered1a2…anThe algorithm of (1) is as follows:
s501: first, form a 2nThe bit string S is set to 1 for i and 1 for P (a, 0).
S502:
Figure BDA0001589610050000077
Figure BDA0001589610050000078
Representing an exclusive or operation.
S503: if the ith bit of a is aiIs 1, then P (a, i) ═ P (a, i-1) + (1)<<(n-i)), otherwise ((P (a, i-1)<<1)+1)。
S504: let B (S, i) = ((S [ i > >3] & (0x80> > (i &0x07))) | 0). Where > > is a few bits shifted to the right, < < < is a few bits shifted to the left, & denotes a bitwise AND.
S505: let i be i +1, repeat S502 to S505 until the privacy removal processing of the entire position code is completed.
Further, in an embodiment of the present invention, before the publishing of the user location information, the location information publishing module 200 is further configured to obtain the location information of the user through privacy removal processing of multiple access rights to obtain a clusterable location code after the privacy removal processing before publishing.
Specifically, the embodiment of the present invention relates to a multi-level privacy protection measure for clustering coding as above, in order to protect the location privacy of the user, before release, privacy removing processing with multiple access rights is performed, where E is a block encryption algorithm, K is an encryption key, and Ψ ═ U is an encryption algorithmm i=1(Ei,Ki,ni). Where U represents the union and satisfies the block cipher algorithm EiN with a number of bits per block of greater than 2iPower bit, a-a that can encode the position where clustering is possible1a2…anFront sigmam i=1niThe bits are processed for privacy removal. The method comprises the following specific steps:
s601: let i equal 1, N0=0。
S602: n before extractioni-1=∑i-1 j=1njClustered position coding of bits, using EiAlgorithm, KiEncrypting the secret key to obtain a character string Si
S603: using the steps S201 to S205 or the steps S301 to S305, with a parameter SiTo the N of ai-1+1 to Ni-1+niThe bits are processed for privacy removal.
S604:Ni=ni+Ni-1Then, let i be i +1, and repeat S602 to S604 until the privacy-removal processing of the position code is completed.
Further, in an embodiment of the present invention, the location information publishing module 200 is further configured to recover the clusterable location code after privacy removal before publishing, to obtain the location information of the user, and publish the location information of the user.
Specifically, the embodiment of the present invention relates to a method for recovering clustering codes after multi-level privacy protection processing, where E is a block encryption algorithm, K is an encryption key, and Ψ is Um i=1(Ei,Ki,ni). Where U represents the union and satisfies the block cipher algorithm EiN with a number of bits per block of greater than 2iTo the power of bits, the clustering position code a' after multiple privacy protection processing can be performed1’a2’…anFront sigma ofm i=1niThe bits are recovered. The method comprises the following specific steps:
s701: let i equal 1, N0=0。
S702: n before extractioni-1=∑i-1 j=1njBit-restored clusterable position coding a, using EiAlgorithm, KiEncrypting the secret key to obtain a character string Si
S703: using the steps S401 to S405 or the steps S501 to S505, with the parameter SiN th of recovery ai-1+1 to Ni-1+niA bit.
S704:Ni=ni+Ni-1Then, let i ═ i +1, S702 to S704 are repeated until the privacy-removal processing of the position code is completed.
It should be noted that the encryption algorithm may be an AES algorithm, and the encryption algorithm may be 128, 192, or 256 bits. In addition, the encryption algorithm may also be that no encryption is performed, which is equivalent to that no privacy removal processing is performed.
Further, in an embodiment of the present invention, a former part of the clusterable location code before release is not subjected to privacy elimination, and the remaining part is subjected to privacy elimination through a password preset on the server by the user.
Further, in an embodiment of the present invention, system 10 in an embodiment of the present invention further includes: and a right management module. The authority management module is used for respectively granting the visitor viewing authority according to different authorities of different visitors so as to acquire the position information of the user according to the viewing authority.
In particular, the embodiment of the invention relates to a method for providing position information of hierarchical authority to a server by a client in an internet. When the server needs to know the position of the client, the client reports a clustering position code subjected to privacy removal processing to the server, the former part of the clustering position code is not subjected to privacy removal processing, the latter part of the clustering position code uses the password of the user on the server, and the privacy removal processing is carried out by using an agreed privacy removal algorithm, so that other users on the network can only know the approximate range of the user, and the server can know the accurate position of the user according to the password of the user. The client replies the clustering position code after privacy processing to the server or embeds the clustering position code into an IPv6 unicast address, so that the position information is published on the basis of privacy protection. As shown in fig. 7, the specific steps are as follows:
s801: the client obtains the own position information.
S802: the location information is clustered location encoded.
S803: and performing no privacy removal processing on the first m bits of the position codes capable of being clustered.
S804: and carrying out privacy removal processing on the rest bits of the clustering position codes, wherein the secret key is an authentication password of the client on the server, and the encryption algorithm is an agreed algorithm.
S805: s804 is repeated until the remaining bits of the clusterable position code have been processed for privacy removal.
S806: the result is handed to the server or embedded in the last 64 bits of IPv 6.
According to the position information publishing system for protecting the user privacy, which is provided by the embodiment of the invention, the applications with different authorizations are ensured through the established hierarchical protection mechanism of the user position privacy, the position information with different precisions can be obtained by using different parameters, and the position information can be presented by clustering codes after privacy removal processing, so that the network application can obtain the position information with different precision degrees according to the authorization authority of the network application, thereby effectively realizing the publishing of the position information on the basis of protecting the position information privacy.
In the description of the present invention, it is to be understood that the terms "central," "longitudinal," "lateral," "length," "width," "thickness," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," "clockwise," "counterclockwise," "axial," "radial," "circumferential," and the like are used in the orientations and positional relationships indicated in the drawings for convenience in describing the invention and to simplify the description, and are not intended to indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and are therefore not to be considered limiting of the invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the present invention, unless otherwise expressly stated or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; they may be directly connected or indirectly connected through intervening media, or they may be connected internally or in any other suitable relationship, unless expressly stated otherwise. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In the present invention, unless otherwise expressly stated or limited, the first feature "on" or "under" the second feature may be directly contacting the first and second features or indirectly contacting the first and second features through an intermediate. Also, a first feature "on," "over," and "above" a second feature may be directly or diagonally above the second feature, or may simply indicate that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature may be directly under or obliquely under the first feature, or may simply mean that the first feature is at a lesser elevation than the second feature.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (7)

1. A location information distribution system that protects user privacy, comprising:
a location information obtaining module, configured to obtain location information of a user, where the location information obtaining module specifically includes:
the client is used for clustering and coding the position information of the user by using a clustering position coding algorithm and then carrying out privacy removal processing on the obtained coded information, wherein the clustering position coding algorithm meets the following requirements: hm (F (P, n)) ═ F (P, m), where F (P, n) is a coded value S from the position space P to a length unit of length nCA coding algorithm of the space, hm (c) is a mapping of the position code with length unit n to m length units before truncation; the clustering position coding algorithm is characterized in that the position range marked by the longer prefix is included in the position range described by the shorter prefix, and specifically comprises the following steps: converting the longitude and the latitude into binary representation with fixed length of n bits, and then crossing the binary representation of the longitude and the latitude to form a clustering position code; the privacy removing processing method for the obtained coding information comprises the following steps: a ═ a1a2…an;F(a)=a1’a2’…an', wherein,
Figure FDA0002446228330000011
Figure FDA0002446228330000012
represents an exclusive-or operation, i is 1,2, … n, fiIs a number from {0,1}iA mapping to {0,1}, i ═ 1,2 … n-1; f. of0Is constant and defines the privacy-removing function F as a function of {0,1}nTo {0,1}nA represents bit position coding; wherein a-a is encoded for each input's clusterable n-bit position1a2…anSpecifically, the privacy-removing processing includes: first, form a 2nA bit string S, where i is 1 and P (a,0) is 1; if the ith bit of a is aiIs 1, then P (a, i) ═ P (a, i-1)<<1) +1, otherwise (P (a, i-1)<<1) + 2; or, if the ith bit of a is aiIs 1, P (a, i) ═ P (a, i-1) + (1)<<(n-i)), otherwise ((P (a, i-1)<<1) + 1); let B (S, i) ═ S [ i ]>>3]&(0x80>>(i&0x07)))!=0),>>In order to shift east a few bits to the right,<<in order to shift a number of bits to the left,&represents a bitwise and; a isi’=ai+ ○ B (S, P (i-1)), ○ + represents exclusive-or operation, and i is made to be i +1 until the privacy-removing processing of the whole position code is completed;
the server is used for receiving the clustering position code after the privacy removal processing sent by the client, and recovering the clustering position code after the privacy removal processing through a recovery method corresponding to the privacy removal processing method so as to obtain the position information of the user; and
the position information publishing module is used for obtaining the position information of the user through privacy removal processing of a plurality of access authorities so as to obtain the clustering position code after the privacy removal processing before publishing, wherein the privacy removal processing specifically comprises: let E be a block cipher algorithm, K be a cipher key, Ψ ═ Um i=1(Ei,Ki,ni) Where U represents the union and satisfies the block cipher algorithm EiN with a number of bits per block of greater than 2iPower bit, a ═ a for coding the position of clustering1a2…anFront sigmam i=1niThe bits are processed for privacy removal, and the privacy removal processing comprises the following steps: let i equal 1, N00; n before extractioni-1=∑i-1 j=1njClustered position coding of bits, using EiAlgorithm, KiEncrypting the secret key to obtain a character string Si(ii) a By the parameter SiTo the N of ai-1+1 to Ni-1+niThe bit carries out privacy removing treatment by using a privacy removing treatment method; n is a radical ofi=ni+Ni-1And then, i is made to be i +1 until the privacy removal processing of the position code is completed.
2. The location information distribution system for protecting user privacy as claimed in claim 1, wherein said client accesses said server through WWW, said server queries said user's location information through a call interface, and said client transmits said clustering location code for privacy elimination.
3. The system of claim 1, wherein the client obtains the location information of the user by embedding the clustering-capable location code with privacy elimination processing into the last 64 bits of the IPv6 unicast address and recovering the clustering-capable location code with privacy elimination processing according to parameters preset by the user.
4. The location information publishing system for protecting user privacy according to claim 1, wherein the method for recovering the clustering location code after privacy removal corresponding to the privacy removal processing method is:
Figure FDA0002446228330000021
Figure FDA0002446228330000022
5. the system according to claim 1, wherein the location information publishing module is further configured to recover the clustered location code after privacy removal before publishing to obtain the location information of the user and publish the location information of the user.
6. The system of claim 1, wherein a former portion of the clusterable location code is not processed for privacy protection before distribution, and a remaining portion is processed for privacy protection by a password preset on the server by the user.
7. A location information distribution system for protecting user privacy according to any one of claims 1 to 6, further comprising:
and the authority management module is used for respectively granting the visitor viewing authority according to different authorities of different visitors so as to acquire the position information of the user according to the viewing authority.
CN201810183549.7A 2018-03-06 2018-03-06 Location information publishing system for protecting user privacy Active CN108566373B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810183549.7A CN108566373B (en) 2018-03-06 2018-03-06 Location information publishing system for protecting user privacy
PCT/CN2018/112217 WO2019169878A1 (en) 2018-03-06 2018-10-26 User privacy-protective position information publishing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810183549.7A CN108566373B (en) 2018-03-06 2018-03-06 Location information publishing system for protecting user privacy

Publications (2)

Publication Number Publication Date
CN108566373A CN108566373A (en) 2018-09-21
CN108566373B true CN108566373B (en) 2020-06-12

Family

ID=63531354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810183549.7A Active CN108566373B (en) 2018-03-06 2018-03-06 Location information publishing system for protecting user privacy

Country Status (2)

Country Link
CN (1) CN108566373B (en)
WO (1) WO2019169878A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566373B (en) * 2018-03-06 2020-06-12 清华大学 Location information publishing system for protecting user privacy
CN111050021A (en) * 2019-12-17 2020-04-21 中国科学技术大学 Image privacy protection method based on two-dimensional code and reversible visual watermark
CN114051739A (en) * 2021-09-29 2022-02-15 北京小米移动软件有限公司 Method and device for reporting and receiving position related information
CN115622764A (en) * 2022-10-09 2023-01-17 深圳市君思科技有限公司 Method for discovering and classifying private data in web network flow

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104298740A (en) * 2014-10-09 2015-01-21 清华大学 Geographic position coding method
CN104581625A (en) * 2014-11-12 2015-04-29 华中科技大学 Position privacy protection method and system based on particle size control
CN105554704A (en) * 2015-12-21 2016-05-04 西安电子科技大学 Fake-locus-based location privacy protection method for use in recommendation system
CN105681362A (en) * 2016-04-01 2016-06-15 公安部第三研究所 Client and server communication method capable of protecting geographic position privacy
CN105791516A (en) * 2014-12-22 2016-07-20 华为技术有限公司 Terminal position information protection method and intelligent terminal
CN106649532A (en) * 2016-10-31 2017-05-10 电子科技大学 Data desensitization method for address information
CN107204984A (en) * 2017-06-22 2017-09-26 石家庄铁道大学 A kind of location privacy protection method and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7006835B2 (en) * 2001-01-11 2006-02-28 Sanyo Electric Co., Ltd. Method of and system for providing position information
CN103124405A (en) * 2007-01-26 2013-05-29 交互数字技术公司 Method and apparatus for securing location information and access control using the location information
CN102026090B (en) * 2010-07-09 2014-07-16 北京哈工大计算机网络与信息安全技术研究中心 Node positioning method in IOT (Internet of things) and node
CN103678334A (en) * 2012-09-03 2014-03-26 人人游戏网络科技发展(上海)有限公司 Method and equipment for calculating digital digests of geographic information
CN104684073A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 User position positioning method and user position positioning device
CN104780501A (en) * 2014-01-13 2015-07-15 腾讯科技(深圳)有限公司 Location privacy protection method and device
CN106453049B (en) * 2016-10-11 2019-06-11 福建师范大学 A kind of neighbour's detection method of protective position privacy
CN108566373B (en) * 2018-03-06 2020-06-12 清华大学 Location information publishing system for protecting user privacy

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104298740A (en) * 2014-10-09 2015-01-21 清华大学 Geographic position coding method
CN104581625A (en) * 2014-11-12 2015-04-29 华中科技大学 Position privacy protection method and system based on particle size control
CN105791516A (en) * 2014-12-22 2016-07-20 华为技术有限公司 Terminal position information protection method and intelligent terminal
CN105554704A (en) * 2015-12-21 2016-05-04 西安电子科技大学 Fake-locus-based location privacy protection method for use in recommendation system
CN105681362A (en) * 2016-04-01 2016-06-15 公安部第三研究所 Client and server communication method capable of protecting geographic position privacy
CN106649532A (en) * 2016-10-31 2017-05-10 电子科技大学 Data desensitization method for address information
CN107204984A (en) * 2017-06-22 2017-09-26 石家庄铁道大学 A kind of location privacy protection method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"保持前缀地址随机化的混合算法";张千里等;《清华大学学报(自然科学版)》;20061030;全文 *

Also Published As

Publication number Publication date
WO2019169878A1 (en) 2019-09-12
CN108566373A (en) 2018-09-21

Similar Documents

Publication Publication Date Title
CN108566373B (en) Location information publishing system for protecting user privacy
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
US8254570B2 (en) Method and system for encryption of data
US20090063861A1 (en) Information security transmission system
CN106953729B (en) Satellite communication encryption system and method based on quantum key
CN111465006B (en) Beidou short message encryption and decryption method based on ancestor algorithm and communication system
CN101153910B (en) Method and system for safe transmission of GPS locating information and GPS receiver
CN109861743B (en) Data safety transmission method based on Beidou short message positioning information transmission protocol
CN104079532A (en) Online reading method and system, client and server
US11968300B2 (en) Data extraction system, data extraction method, registration apparatus, and program
WO2016195590A1 (en) A method and system for secure sms communications
CN105631347A (en) File storage method and client device
KR102028151B1 (en) Encryption method and system using authorization key of device
CN108226956B (en) Differential data protection processing method and system
CN111277605B (en) Data sharing method and device, computer equipment and storage medium
CN107196935B (en) Positioning information transmission method and system
CN104363089B (en) A kind of method that fuzzy vault is realized based on geographical location information
US10939163B2 (en) Method for watermarking encrypted digital content, method and device for retrieving a unique identifier from watermarked content and content distribution network
CN114201573B (en) System and method for generating and querying an index associated with a target communication
US10694320B2 (en) Methods and apparatus to enable device based geo-location messages
GB2446420A (en) Error correction of passwords using Galois Field elements
CN109120740B (en) Server, system and method for generating IPv6 address
CN116980232B (en) Data processing method, device, computer equipment and readable storage medium
CN109962776B (en) Encryption method and decryption method
CN114500042A (en) Pipeline coordinate data transmission method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant