CN108848075A - A kind of road network environment position anonymous methods based on user distribution equilibrium degree - Google Patents
A kind of road network environment position anonymous methods based on user distribution equilibrium degree Download PDFInfo
- Publication number
- CN108848075A CN108848075A CN201810551551.5A CN201810551551A CN108848075A CN 108848075 A CN108848075 A CN 108848075A CN 201810551551 A CN201810551551 A CN 201810551551A CN 108848075 A CN108848075 A CN 108848075A
- Authority
- CN
- China
- Prior art keywords
- anonymous
- road network
- region
- mobile subscriber
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 235000014594 pastries Nutrition 0.000 claims description 6
- 239000004744 fabric Substances 0.000 claims description 4
- 238000005303 weighing Methods 0.000 claims 1
- 230000001419 dependent effect Effects 0.000 abstract description 4
- 238000007796 conventional method Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000007474 system interaction Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000010304 firing Methods 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001235 sensitizing effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to a kind of road network environment position anonymous methods based on user distribution equilibrium degree, using client-server architecture, third party's anonymous server that traditional k- anonymity model is dependent on is got rid of, avoids the object of attack as attacker to greatest extent, breaks through the system bottleneck in conventional method;User's road network dispatch equilibrium degree concept is proposed simultaneously; user's road network dispatch equilibrium degree is fully considered in anonymous region forming process; avoid occurring the excessive situation of road network occupation rate difference in anonymous region between k mobile subscriber; increase the uncertainty that attacker screens selection to user; so during the anonymity of position; fully consider mobile subscriber's road network dispatch situation in anonymous region; anonymous success rate is improved under the premise of effective guarantee user location privacy; security risk is avoided, realizes the protection to user location privacy to greatest extent.
Description
Technical field
The present invention relates to a kind of road network environment position anonymous methods based on user distribution equilibrium degree, belongs to location privacy and hides
Name technical field.
Background technique
In recent years, the fast development of wireless communication technique and global-positioning technology promotes the rise based on location-based service.
In position requests service process, inquiry promoter inevitably needs to share to self-position to provide including LBS service
Third party including side exchanges position enquiring service for the location privacy of inquiry.Malicious attacker is by obtaining user's
Location information in conjunction with existing background knowledge, can largely deduce the true identity of inquiry, behavior pattern,
The sensitive informations such as health status, religious belief, personal preference, to cause privacy leakage.Therefore, take certain method to inquiry
The position coordinates of person (mobile subscriber) carry out anonymous processing, obtain its actual position by attacker, be in location-based service urgently
Problem to be solved.The user of launch position anonymous request is referred to as anonymous.
The anonymous k- anonymity algorithm mostly used greatly under Euclidean space in traditional position.Anonymous is sent to location-based service
Device, server end are not only used comprising anonymous in the region with meeting the position that the area of space of privacy constraint replaces anonymous
Family itself, still can only be with the probability of 1/k even if attacker intercepts and captures this area of space comprising other at least k-1 mobile subscribers
The position of anonymous is deduced, the position of anonymous is claimed to meet position k- anonymity at this time.Anonymous and other k-1 shifting
The anonymous collection of family composition is employed, the region where mobile subscriber is concentrated in anonymity is known as position anonymity region.But k- anonymity algorithm is not
Have and considers to be in mobile subscriber's reality in road network environment, especially position anonymity region locating for k-1 other mobile subscribers
Road network environment and the road network dispatch equilibrium degree of this k mobile subscriber.In traditional position k- anonymity, when searching out k shifting
When employing requirement of the satisfaction anonymous collection in family to number of users, anonymous region can generate in this way according to this anonymity collection generation
Anonymous region is likely to still within the scope of sensitizing range.For example, anonymous issues location service request in " hospital ", according to
Traditional k- anonymity algorithm, the other k-1 mobile subscribers searched out, which are equally possible, is still within this " hospital ", when k
When position where mobile subscriber generates anonymous region, the anonymity region is probably also in hospital area, to anonymous
For, even if sending anonymous region by k- anonymity requests location-based service to location server, it is also possible to stick one's chin out in " doctor
This privacy of institute ".In addition, k mobile subscriber's road network dispatch harmony can bring very big influence to anonymous result in anonymous region,
Those are located at the mobile subscriber in the higher road network region of density, and road network occupation rate is often very big, these mobile subscribers would generally become
The primary object of attack of attacker, and be located at density compared with the mobile subscriber of path web area, often road network occupation rate very little, usually
It can be excluded except firing area first by attacker, so that the mobile subscriber for needing to be distinguished by attacker in anonymous region
Quantity is less than k, is unsatisfactory for k- anonymity requirement, needs the number of mobile users distinguished by attacker can in anonymous region under extreme case
Energy very little, even 1, so that the position of anonymous is easier to reveal.
Therefore, traditional k- anonymity model has the following disadvantages:
(1) third party's anonymous server is unreliable, and easily becomes the emphasis object of attack of attacker, to become system
Bottleneck.
(2) selection of other k-1 mobile subscribers has randomness and uncertainty in k- anonymity forming process.As a result make
The road network occupation rate difference for obtaining k mobile subscriber in anonymous region is very big, and road network dispatch is difficult equilibrium.Locating Regional Road Network density
Biggish mobile subscriber is easier to become the object of attack of attacker, and those mobile subscribers for being dispersed in road network remote location are past
It is directly excluded except target of attack by attacker toward meeting, thus the effect mobile subscriber for making anonymous region domestic demand that attacker be wanted to distinguish
Number is less than k, is not able to satisfy the requirement of effective k anonymity, effective mobile subscriber's quantity even 1 in anonymous region under extreme case,
In the presence of very big security risk.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of road network environment positions based on user distribution equilibrium degree to hide
Name method gets rid of third party's anonymous server that traditional k- anonymity model is dependent on, simultaneously using client-server architecture
It proposes user's road network dispatch equilibrium degree concept, user's road network dispatch equilibrium degree is fully considered in anonymous region forming process.
In order to solve the above-mentioned technical problem the present invention uses following technical scheme:The present invention devises a kind of based on user point
The road network environment position anonymous methods of cloth equilibrium degree initializes, needle first for obtaining anonymous region corresponding to anonymous
Bitmap is distributed to mobile subscriber corresponding to λ side length target area, grid dividing is carried out, obtains each grid;Then it executes such as
Lower step:
Step A. client is requested according to the position enquiring of received anonymous, and the satellite positioning for obtaining anonymous is sat
Mark, and the λ side length in combining target region obtain the grid that mobile subscriber locating for anonymous is distributed in bitmap, then by client
Grid locating for anonymous and side length of element are sent to location server, and enter step B by end;
Step B. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until drawing
Until dividing obtained minimum unit lattice side length to be less than side length of element, corresponding each unit lattice in the grid are obtained, and obtain the list
Quad-tree structure corresponding to first lattice structure, subsequently into step C;
Quad-tree structure is returned to client by location server by step C., and client is according to the satellite of anonymous
Position coordinate, obtains the cell locating for anonymous in user distribution bitmap in grid, as corresponding to anonymous to true
Region is recognized, subsequently into step D;
Step D. by client judge region to be confirmed whether and meanwhile meet preset user's road network dispatch equilibrium degree threshold value
£ and pre-set user location privacy anonymity degree threshold value k determines the region to be confirmed if meeting to hide corresponding to anonymous
Name region, feeds back to anonymous, and method execution terminates;Otherwise E is entered step;Wherein, pre-set user location privacy anonymity degree
For the lower limit of number of mobile users in default anonymous region;
Centered on region to be confirmed, each unit lattice adjacent thereto around are incorporated to to true by client by step E.
Recognize in region, updates region to be confirmed, then return step D.
As a preferred technical solution of the present invention, in the step A, client is according to the satellite positioning of anonymous
Coordinate, and the λ side length in combining target region, as follows:
ID=([x/ λ], [y/ λ])
Obtain the grid that mobile subscriber locating for anonymous is distributed in bitmap, wherein ID indicates that mobile subscriber is distributed bitmap
The uniquely tagged number of middle grid, x indicate the longitude in anonymous satellite positioning coordinate, and y indicates anonymous satellite positioning
Latitude value in coordinate.
As a preferred technical solution of the present invention, the step B includes the following steps:
Step B1. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until drawing
Until dividing obtained minimum unit lattice side length to be less than side length of element, corresponding each unit lattice in the grid are obtained;
Step B2. creates quaternary tree t, using grid locating for anonymous as the root node of quaternary tree t;
Step B3. counts mobile subscriber's quantity and mobile subscriber in cell corresponding to quaternary tree bottom leaf node
Region road network dispatch situation, and be stored in corresponding unit lattice, and then obtain cell knot in grid locating for anonymous
Quad-tree structure corresponding to structure.
As a preferred technical solution of the present invention:In the step B, each unit lattice respectively include C.id, in
Five attributes of Western-style pastry o, Lc, mount, C.roads, wherein C.id indicates unique identifier corresponding to cell, middle Western-style pastry o
Indicating that the center point coordinate of cell, Lc indicate the side length of cell, mount indicates the quantity of mobile subscriber in cell,
C.roads indicates the road network dispatch situation in storage corresponding unit lattice.
As a preferred technical solution of the present invention, in the step D, D1 to step D3 as follows, judge to
Whether confirmation region meets pre-set user road network dispatch equilibrium degree threshold value £:
Step D1. is directed to each mobile subscriber in region to be confirmed respectively, obtains road network resource occupied by mobile subscriber
Corresponding road network length Li, and total road network length L is combined, obtain LiWith the ratio of L, as road network resource shared by the mobile subscriber
Ratio, and then the ratio of the shared road network resource respectively of each mobile subscriber in region to be confirmed is obtained, subsequently into step D2;
Wherein, i ∈ { 1 ..., I }, I indicate the sum of mobile subscriber in region to be confirmed, and i indicates in region to be confirmed mobile to use for i-th
Family;
Step D2. obtains each ratio according to the ratio of the shared road network resource of mobile subscriber each in region to be confirmed difference
Corresponding standard deviation, as user's road network dispatch equilibrium degree corresponding to region to be confirmed, subsequently into step D3;
Step D3. judges user's road network dispatch equilibrium degree corresponding to region to be confirmed, if is less than pre-set user road network
Distributing equilibrium degree threshold value £ is to indicate that region to be confirmed meets pre-set user road network dispatch equilibrium degree threshold value £;Otherwise it indicates
Region to be confirmed is unsatisfactory for pre-set user road network dispatch equilibrium degree threshold value £.
A kind of road network environment position anonymous methods based on user distribution equilibrium degree of the present invention uses the above technical side
Case compared with prior art, has the following technical effects:The road network environment position based on user distribution equilibrium degree that the present invention designs
Anonymous methods is set, using client-server architecture, gets rid of third party's anonymous server that traditional k- anonymity model is dependent on,
The object of attack as attacker is avoided to greatest extent, breaks through the system bottleneck in conventional method;User's road network point is proposed simultaneously
Cloth equilibrium degree concept fully considers user's road network dispatch equilibrium degree in anonymous region forming process, avoids in anonymous region k
Occur the excessive situation of road network occupation rate difference between mobile subscriber, increase the uncertainty that attacker screens selection to user,
So during the anonymity of position, mobile subscriber's road network dispatch situation in anonymous region is fully considered, in effective guarantee user position
Anonymous success rate is improved under the premise of setting privacy, avoids security risk, realizes the guarantor to user location privacy to greatest extent
Shield.
Detailed description of the invention
Fig. 1 is that the system interaction of the road network environment position anonymous methods based on user distribution equilibrium degree designed by the present invention shows
It is intended to;
Fig. 2 is location server mobile subscriber of the present invention branch bitmap;
Fig. 3 is the anonymous region road network dispatch schematic diagram of the present invention;
Fig. 4 is grid quad-tree partition schematic diagram of the present invention.
Specific embodiment
Specific embodiments of the present invention will be described in further detail with reference to the accompanying drawings of the specification.
The present invention devises a kind of road network environment position anonymous methods based on user distribution equilibrium degree, for obtaining anonymity
Anonymous region corresponding to user in specific actual application, initializes, for corresponding to λ side length target area first
Mobile subscriber be distributed bitmap, carry out grid dividing, obtain each grid, as shown in Figure 2;It is then based on and as shown in Figure 1 is
System interaction schematic diagram, executes following steps.
Step A. client is requested according to the position enquiring of received anonymous, and the satellite positioning for obtaining anonymous is sat
Mark, and the λ side length in combining target region, as follows:
ID=([x/ λ], [y/ λ])
The grid that mobile subscriber locating for anonymous is distributed in bitmap is obtained, it then will be locating for anonymous as client
Grid and side length of element are sent to location server, and enter step B.Wherein, ID indicates that mobile subscriber is distributed in bitmap
The uniquely tagged number of grid, x indicate the longitude in anonymous satellite positioning coordinate, and y indicates that anonymous satellite positioning is sat
Latitude value in mark.
Step B. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until drawing
Until dividing obtained minimum unit lattice side length to be less than side length of element, corresponding each unit lattice in the grid are obtained, and obtain the list
Quad-tree structure corresponding to first lattice structure, as shown in figure 4, subsequently into step C.
It is as follows that above-mentioned steps B embodies user's road network dispatch equilibrium degree concept that the present invention designs:
(user's road network dispatch equilibrium degree) anonymous zone intra domain user road network dispatch is considered as meeting distributing equilibrium degree, when
And if only if to any mobile subscriber in anonymous region, the road network resources balance occupied.Assuming that any mobile subscriber is occupied
Road network resource ratio be pi, user's road network dispatch equilibrium degree indicates with standard deviation, then mobile subscriber's road network dispatch is balanced
Degree is expressed as:£ is pre-set user road network dispatch equilibrium degree threshold value, £ be level off to 0 positive number, the smaller user of £ point
Cloth harmony is better.
As shown in Figure 3, it is assumed that in the anonymous highway subnet of thick segment mark generated in corresponding trusted third party while, ash
Color roundlet represents k mobile subscriber in anonymous region.In above-mentioned attack condition, by highway in anonymity region locating for mobile subscriber
Net is divided into 3 parts, respectively s1(n1m1),s2(m1n2,n2n5,n2m3), s3(m2n3).Each section section collection all represents this
The road network resource that mobile subscriber is occupied.If the length of each highway section collection is respectively Li, total length L, then mobile subscriber pi
The ratio that the road network resource occupied accounts for road network total resources isIt can by the road section length in Fig. 3
To find out, mobile subscriber p2Occupied road network resource is bigger than the sum of road network resource that other two mobile subscribers are occupied, p3
The road network resource occupied is minimum, and locating road network environment is most remote.Attacker's road network according to shared by mobile subscriber in anonymous region
The size of resource can exclude the p for being in road network remote location first3Really to inquire the possibility for issuing user, to make anonymity
Effective mobile subscriber's quantity is less than given k value in region, brings the risk of location privacy leakage.
Above-mentioned steps B, in specific practical application, as shown in figure 4, specifically comprising the following steps:
Step B1. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until drawing
Until dividing obtained minimum unit lattice side length to be less than side length of element, corresponding each unit lattice, each unit lattice in the grid are obtained
Respectively include five C.id, middle Western-style pastry o, Lc, mount, C.roads attributes, wherein C.id is indicated corresponding to cell only
One identifier, middle Western-style pastry o indicate that the center point coordinate of cell, Lc indicate the side length of cell, and mount indicates to move in cell
The quantity at family is employed, C.roads indicates the road network dispatch situation in storage corresponding unit lattice.
Step B2. creates quaternary tree t, using grid locating for anonymous as the root node of quaternary tree t.
Step B3. counts mobile subscriber's quantity and mobile subscriber in cell corresponding to quaternary tree bottom leaf node
Region road network dispatch situation, and be stored in corresponding unit lattice, and then obtain cell knot in grid locating for anonymous
Quad-tree structure corresponding to structure.
Quad-tree structure is returned to client by location server by step C., and client is according to the satellite of anonymous
Position coordinate, obtains the cell locating for anonymous in user distribution bitmap in grid, as corresponding to anonymous to true
Region is recognized, subsequently into step D.
Step D. by client judge region to be confirmed whether and meanwhile meet preset user's road network dispatch equilibrium degree threshold value
£ and pre-set user location privacy anonymity degree threshold value k determines the region to be confirmed if meeting to hide corresponding to anonymous
Name region, feeds back to anonymous, and method execution terminates;Otherwise E is entered step;Wherein, pre-set user location privacy anonymity degree
For the lower limit of number of mobile users in default anonymous region.
It is specific to execute following steps D1 to step D3 in above-mentioned steps D practical application, judge whether region to be confirmed meets
Pre-set user road network dispatch equilibrium degree threshold value £.
Step D1. is directed to each mobile subscriber in region to be confirmed respectively, obtains road network resource occupied by mobile subscriber
Corresponding road network length Li, and total road network length L is combined, obtain LiWith the ratio of L, as road network resource shared by the mobile subscriber
Ratio, and then the ratio of the shared road network resource respectively of each mobile subscriber in region to be confirmed is obtained, subsequently into step D2;
Wherein, i ∈ { 1 ..., I }, I indicate the sum of mobile subscriber in region to be confirmed, and i indicates in region to be confirmed mobile to use for i-th
Family.
Step D2. obtains each ratio according to the ratio of the shared road network resource of mobile subscriber each in region to be confirmed difference
Corresponding standard deviation, as user's road network dispatch equilibrium degree corresponding to region to be confirmed, subsequently into step D3.
Step D3. judges user's road network dispatch equilibrium degree corresponding to region to be confirmed, if is less than pre-set user road network
Distributing equilibrium degree threshold value £ is to indicate that region to be confirmed meets pre-set user road network dispatch equilibrium degree threshold value £;Otherwise it indicates
Region to be confirmed is unsatisfactory for pre-set user road network dispatch equilibrium degree threshold value £.
Centered on region to be confirmed, each unit lattice adjacent thereto around are incorporated to to true by client by step E.
Recognize in region, updates region to be confirmed, then return step D.
Road network environment position anonymous methods designed by above-mentioned technical proposal based on user distribution equilibrium degree, using client
End-server architecture gets rid of third party's anonymous server that traditional k- anonymity model is dependent on, and avoids becoming attack to greatest extent
The object of attack of person breaks through the system bottleneck in conventional method;User's road network dispatch equilibrium degree concept is proposed simultaneously, in anonymous zone
User's road network dispatch equilibrium degree is fully considered in the forming process of domain, avoids road network occur between k mobile subscriber in anonymous region
The excessive situation of occupation rate difference increases the uncertainty that attacker screens selection to user, so during the anonymity of position,
It fully considers mobile subscriber's road network dispatch situation in anonymous region, improves and hide under the premise of effective guarantee user location privacy
Name success rate, avoids security risk, realizes the protection to user location privacy to greatest extent.
Embodiments of the present invention are explained in detail above in conjunction with attached drawing, but the present invention is not limited to above-mentioned implementations
Mode within the knowledge of a person skilled in the art can also be without departing from the purpose of the present invention
It makes a variety of changes.
Claims (5)
1. a kind of road network environment position anonymous methods based on user distribution equilibrium degree, hides corresponding to anonymous for obtaining
Name region, it is characterised in that:It initializes first, is distributed bitmap for mobile subscriber corresponding to λ side length target area, carries out net
Lattice divide, and obtain each grid;Then following steps are executed:
Step A. client is requested according to the position enquiring of received anonymous, obtains the satellite positioning coordinate of anonymous,
And the λ side length in combining target region, the grid that mobile subscriber locating for anonymous is distributed in bitmap is obtained, it then will by client
Grid locating for anonymous and side length of element are sent to location server, and enter step B;
Step B. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until dividing institute
Minimum unit lattice side length is obtained less than until side length of element, obtains corresponding each unit lattice in the grid, and obtain the cell
Quad-tree structure corresponding to structure, subsequently into step C;
Quad-tree structure is returned to client by location server by step C., and client is sat according to the satellite positioning of anonymous
Mark obtains the cell in user distribution bitmap locating for anonymous in grid, as area to be confirmed corresponding to anonymous
Domain, subsequently into step D;
Step D. by client judge region to be confirmed whether and meanwhile meet preset user's road network dispatch equilibrium degree threshold value £ with
Pre-set user location privacy anonymity degree threshold value k determines the region to be confirmed for anonymous zone corresponding to anonymous if meeting
Domain, feeds back to anonymous, and method execution terminates;Otherwise E is entered step;Wherein, pre-set user location privacy anonymity degree is pre-
If the lower limit of number of mobile users in anonymous region;
Centered on region to be confirmed, each unit lattice adjacent thereto around are incorporated to area to be confirmed by client by step E.
In domain, region to be confirmed is updated, then return step D.
2. a kind of road network environment position anonymous methods based on user distribution equilibrium degree, feature exist according to claim 1
In:In the step A, client is according to the satellite positioning coordinate of anonymous, and the λ side length in combining target region, by as follows
Formula:
ID=([x/ λ], [y/ λ])
Obtain the grid that mobile subscriber locating for anonymous is distributed in bitmap, wherein ID indicates that mobile subscriber is distributed net in bitmap
The uniquely tagged number of lattice, x indicate the longitude in anonymous satellite positioning coordinate, and y indicates anonymous satellite positioning coordinate
In latitude value.
3. a kind of road network environment position anonymous methods based on user distribution equilibrium degree, feature exist according to claim 1
In the step B includes the following steps:
Step B1. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until dividing institute
Minimum unit lattice side length is obtained less than until side length of element, obtains corresponding each unit lattice in the grid;
Step B2. creates quaternary tree t, using grid locating for anonymous as the root node of quaternary tree t;
Step B3. counts mobile subscriber's quantity and mobile subscriber place in cell corresponding to quaternary tree bottom leaf node
Regional Road Network distribution situation, and be stored in corresponding unit lattice, and then obtain cell structure institute in grid locating for anonymous
Corresponding quad-tree structure.
4. according to claim 1 or a kind of 3 road network environment position anonymous methods based on user distribution equilibrium degree, feature
It is, in the step B, each unit lattice respectively include five C.id, middle Western-style pastry o, Lc, mount, C.roads attributes,
In, C.id indicates that unique identifier corresponding to cell, middle Western-style pastry o indicate that the center point coordinate of cell, Lc indicate unit
The side length of lattice, mount indicate the quantity of mobile subscriber in cell, and C.roads indicates the road network point in storage corresponding unit lattice
Cloth situation.
5. a kind of road network environment position anonymous methods based on user distribution equilibrium degree, feature exist according to claim 1
In in the step D, D1 to step D3, it is equal to judge whether region to be confirmed meets pre-set user road network dispatch as follows
Weighing apparatus degree threshold value £:
Step D1. is directed to each mobile subscriber in region to be confirmed respectively, and it is corresponding to obtain road network resource occupied by mobile subscriber
Road network length Li, and total road network length L is combined, obtain LiWith the ratio of L, ratio as road network resource shared by the mobile subscriber
Example, and then the ratio of each shared road network resource of mobile subscriber's difference in region to be confirmed is obtained, subsequently into step D2;Its
In, i ∈ { 1 ..., I }, I indicate the sum of mobile subscriber in region to be confirmed, and i indicates in region to be confirmed mobile to use for i-th
Family;
It is right to obtain each ratio institute according to the ratio of the shared road network resource of mobile subscriber each in region to be confirmed difference by step D2.
The standard deviation answered, as user's road network dispatch equilibrium degree corresponding to region to be confirmed, subsequently into step D3;
Step D3. judges user's road network dispatch equilibrium degree corresponding to region to be confirmed, if is less than pre-set user road network dispatch
Equilibrium degree threshold value £ is to indicate that region to be confirmed meets pre-set user road network dispatch equilibrium degree threshold value £;Otherwise it indicates to true
Recognize region and is unsatisfactory for pre-set user road network dispatch equilibrium degree threshold value £.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810551551.5A CN108848075B (en) | 2018-05-31 | 2018-05-31 | Road network environment position anonymizing method based on user distribution balance degree |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810551551.5A CN108848075B (en) | 2018-05-31 | 2018-05-31 | Road network environment position anonymizing method based on user distribution balance degree |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108848075A true CN108848075A (en) | 2018-11-20 |
CN108848075B CN108848075B (en) | 2020-10-09 |
Family
ID=64210485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810551551.5A Expired - Fee Related CN108848075B (en) | 2018-05-31 | 2018-05-31 | Road network environment position anonymizing method based on user distribution balance degree |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108848075B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102170432A (en) * | 2011-03-25 | 2011-08-31 | 东南大学 | User-controllable K neighbor query method for protecting location privacy |
US20110251897A1 (en) * | 2010-04-12 | 2011-10-13 | The Associated Press | Online Shopping Circulars |
CN102892073A (en) * | 2012-09-11 | 2013-01-23 | 北京航空航天大学 | Continuous query oriented location anonymizing method applicable to location service system |
CN104486726A (en) * | 2014-12-18 | 2015-04-01 | 东南大学 | Road network environment location generalization method for protecting prospective location privacy of user |
CN104618864A (en) * | 2015-01-26 | 2015-05-13 | 电子科技大学 | False location based privacy protection method in location service |
CN105069371A (en) * | 2015-07-28 | 2015-11-18 | 武汉大学 | Geospatial data based user privacy protection method and system |
CN107204988A (en) * | 2017-06-28 | 2017-09-26 | 华南理工大学 | A kind of location privacy protection method under the structure based on P2P |
CN107682817A (en) * | 2017-09-06 | 2018-02-09 | 西安交通大学 | A kind of maintenance constant across road network position anonymous methods of statistical nature |
CN107770722A (en) * | 2017-10-13 | 2018-03-06 | 中南大学 | The method for secret protection of location-based service based on the information constrained double stealthy regions in side |
-
2018
- 2018-05-31 CN CN201810551551.5A patent/CN108848075B/en not_active Expired - Fee Related
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110251897A1 (en) * | 2010-04-12 | 2011-10-13 | The Associated Press | Online Shopping Circulars |
CN102170432A (en) * | 2011-03-25 | 2011-08-31 | 东南大学 | User-controllable K neighbor query method for protecting location privacy |
CN102892073A (en) * | 2012-09-11 | 2013-01-23 | 北京航空航天大学 | Continuous query oriented location anonymizing method applicable to location service system |
CN104486726A (en) * | 2014-12-18 | 2015-04-01 | 东南大学 | Road network environment location generalization method for protecting prospective location privacy of user |
CN104618864A (en) * | 2015-01-26 | 2015-05-13 | 电子科技大学 | False location based privacy protection method in location service |
CN105069371A (en) * | 2015-07-28 | 2015-11-18 | 武汉大学 | Geospatial data based user privacy protection method and system |
CN107204988A (en) * | 2017-06-28 | 2017-09-26 | 华南理工大学 | A kind of location privacy protection method under the structure based on P2P |
CN107682817A (en) * | 2017-09-06 | 2018-02-09 | 西安交通大学 | A kind of maintenance constant across road network position anonymous methods of statistical nature |
CN107770722A (en) * | 2017-10-13 | 2018-03-06 | 中南大学 | The method for secret protection of location-based service based on the information constrained double stealthy regions in side |
Non-Patent Citations (1)
Title |
---|
倪巍伟: "保护位置隐私近邻查询中隐私偏好问题研究", 《软件学报》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108848075B (en) | 2020-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kazemi et al. | A privacy-aware framework for participatory sensing | |
CN105246072B (en) | User location method for secret protection and system under a kind of road network environment | |
US8655960B2 (en) | Location-aware instant messaging | |
To et al. | A framework for protecting worker location privacy in spatial crowdsourcing | |
US7072956B2 (en) | Methods and systems for context-aware policy determination and enforcement | |
US20220247814A1 (en) | Edge computing for internet of things security with blockchain authentication | |
JP2021527349A (en) | Data anonymization for service subscriber privacy | |
CN107204988B (en) | Position privacy protection method based on P2P structure | |
CN111107171B (en) | Security defense method and device for DNS (Domain name Server), communication equipment and medium | |
US10979307B2 (en) | Synchronized distributed processing in a communications network | |
AU2014315668A1 (en) | Techniques for server-controlled tiling of location-based information | |
US9800617B2 (en) | Systems and methods for managing lost devices of multiple types with multiple policies using melded profiles associated with groups | |
CN110611667B (en) | Dynamic position privacy protection method and device in edge computing environment | |
CN105307111A (en) | Position privacy protection method based on incremental neighbour inquiry | |
CN112055958A (en) | Enabling wireless security measures based on wireless access point attributes | |
CN104080081A (en) | Space anonymization method suitable for mobile terminal position privacy protection | |
CN106803825B (en) | anonymous area construction method based on query range | |
CN111786970B (en) | Cache-based cooperative location obfuscation anonymous privacy protection method and system | |
CN105578412B (en) | A kind of position anonymous methods and system based on location-based service | |
CN109886046A (en) | A kind of location privacy protection method and system | |
Bonné et al. | Your mobile phone is a traitor!--raising awareness on ubiquitous privacy issues with SASQUATCH | |
CN108848075A (en) | A kind of road network environment position anonymous methods based on user distribution equilibrium degree | |
KR102021269B1 (en) | method for sharing location information of terminal of location information sharer | |
CN110290149A (en) | A kind of location privacy protection method based on C/S multi-level buffer | |
US20210157631A1 (en) | Automated queue shutdown for efficient resource management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201009 |