CN108848075A - A kind of road network environment position anonymous methods based on user distribution equilibrium degree - Google Patents

A kind of road network environment position anonymous methods based on user distribution equilibrium degree Download PDF

Info

Publication number
CN108848075A
CN108848075A CN201810551551.5A CN201810551551A CN108848075A CN 108848075 A CN108848075 A CN 108848075A CN 201810551551 A CN201810551551 A CN 201810551551A CN 108848075 A CN108848075 A CN 108848075A
Authority
CN
China
Prior art keywords
anonymous
road network
region
mobile subscriber
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810551551.5A
Other languages
Chinese (zh)
Other versions
CN108848075B (en
Inventor
倪巍伟
宋世渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201810551551.5A priority Critical patent/CN108848075B/en
Publication of CN108848075A publication Critical patent/CN108848075A/en
Application granted granted Critical
Publication of CN108848075B publication Critical patent/CN108848075B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to a kind of road network environment position anonymous methods based on user distribution equilibrium degree, using client-server architecture, third party's anonymous server that traditional k- anonymity model is dependent on is got rid of, avoids the object of attack as attacker to greatest extent, breaks through the system bottleneck in conventional method;User's road network dispatch equilibrium degree concept is proposed simultaneously; user's road network dispatch equilibrium degree is fully considered in anonymous region forming process; avoid occurring the excessive situation of road network occupation rate difference in anonymous region between k mobile subscriber; increase the uncertainty that attacker screens selection to user; so during the anonymity of position; fully consider mobile subscriber's road network dispatch situation in anonymous region; anonymous success rate is improved under the premise of effective guarantee user location privacy; security risk is avoided, realizes the protection to user location privacy to greatest extent.

Description

A kind of road network environment position anonymous methods based on user distribution equilibrium degree
Technical field
The present invention relates to a kind of road network environment position anonymous methods based on user distribution equilibrium degree, belongs to location privacy and hides Name technical field.
Background technique
In recent years, the fast development of wireless communication technique and global-positioning technology promotes the rise based on location-based service. In position requests service process, inquiry promoter inevitably needs to share to self-position to provide including LBS service Third party including side exchanges position enquiring service for the location privacy of inquiry.Malicious attacker is by obtaining user's Location information in conjunction with existing background knowledge, can largely deduce the true identity of inquiry, behavior pattern, The sensitive informations such as health status, religious belief, personal preference, to cause privacy leakage.Therefore, take certain method to inquiry The position coordinates of person (mobile subscriber) carry out anonymous processing, obtain its actual position by attacker, be in location-based service urgently Problem to be solved.The user of launch position anonymous request is referred to as anonymous.
The anonymous k- anonymity algorithm mostly used greatly under Euclidean space in traditional position.Anonymous is sent to location-based service Device, server end are not only used comprising anonymous in the region with meeting the position that the area of space of privacy constraint replaces anonymous Family itself, still can only be with the probability of 1/k even if attacker intercepts and captures this area of space comprising other at least k-1 mobile subscribers The position of anonymous is deduced, the position of anonymous is claimed to meet position k- anonymity at this time.Anonymous and other k-1 shifting The anonymous collection of family composition is employed, the region where mobile subscriber is concentrated in anonymity is known as position anonymity region.But k- anonymity algorithm is not Have and considers to be in mobile subscriber's reality in road network environment, especially position anonymity region locating for k-1 other mobile subscribers Road network environment and the road network dispatch equilibrium degree of this k mobile subscriber.In traditional position k- anonymity, when searching out k shifting When employing requirement of the satisfaction anonymous collection in family to number of users, anonymous region can generate in this way according to this anonymity collection generation Anonymous region is likely to still within the scope of sensitizing range.For example, anonymous issues location service request in " hospital ", according to Traditional k- anonymity algorithm, the other k-1 mobile subscribers searched out, which are equally possible, is still within this " hospital ", when k When position where mobile subscriber generates anonymous region, the anonymity region is probably also in hospital area, to anonymous For, even if sending anonymous region by k- anonymity requests location-based service to location server, it is also possible to stick one's chin out in " doctor This privacy of institute ".In addition, k mobile subscriber's road network dispatch harmony can bring very big influence to anonymous result in anonymous region, Those are located at the mobile subscriber in the higher road network region of density, and road network occupation rate is often very big, these mobile subscribers would generally become The primary object of attack of attacker, and be located at density compared with the mobile subscriber of path web area, often road network occupation rate very little, usually It can be excluded except firing area first by attacker, so that the mobile subscriber for needing to be distinguished by attacker in anonymous region Quantity is less than k, is unsatisfactory for k- anonymity requirement, needs the number of mobile users distinguished by attacker can in anonymous region under extreme case Energy very little, even 1, so that the position of anonymous is easier to reveal.
Therefore, traditional k- anonymity model has the following disadvantages:
(1) third party's anonymous server is unreliable, and easily becomes the emphasis object of attack of attacker, to become system Bottleneck.
(2) selection of other k-1 mobile subscribers has randomness and uncertainty in k- anonymity forming process.As a result make The road network occupation rate difference for obtaining k mobile subscriber in anonymous region is very big, and road network dispatch is difficult equilibrium.Locating Regional Road Network density Biggish mobile subscriber is easier to become the object of attack of attacker, and those mobile subscribers for being dispersed in road network remote location are past It is directly excluded except target of attack by attacker toward meeting, thus the effect mobile subscriber for making anonymous region domestic demand that attacker be wanted to distinguish Number is less than k, is not able to satisfy the requirement of effective k anonymity, effective mobile subscriber's quantity even 1 in anonymous region under extreme case, In the presence of very big security risk.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of road network environment positions based on user distribution equilibrium degree to hide Name method gets rid of third party's anonymous server that traditional k- anonymity model is dependent on, simultaneously using client-server architecture It proposes user's road network dispatch equilibrium degree concept, user's road network dispatch equilibrium degree is fully considered in anonymous region forming process.
In order to solve the above-mentioned technical problem the present invention uses following technical scheme:The present invention devises a kind of based on user point The road network environment position anonymous methods of cloth equilibrium degree initializes, needle first for obtaining anonymous region corresponding to anonymous Bitmap is distributed to mobile subscriber corresponding to λ side length target area, grid dividing is carried out, obtains each grid;Then it executes such as Lower step:
Step A. client is requested according to the position enquiring of received anonymous, and the satellite positioning for obtaining anonymous is sat Mark, and the λ side length in combining target region obtain the grid that mobile subscriber locating for anonymous is distributed in bitmap, then by client Grid locating for anonymous and side length of element are sent to location server, and enter step B by end;
Step B. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until drawing Until dividing obtained minimum unit lattice side length to be less than side length of element, corresponding each unit lattice in the grid are obtained, and obtain the list Quad-tree structure corresponding to first lattice structure, subsequently into step C;
Quad-tree structure is returned to client by location server by step C., and client is according to the satellite of anonymous Position coordinate, obtains the cell locating for anonymous in user distribution bitmap in grid, as corresponding to anonymous to true Region is recognized, subsequently into step D;
Step D. by client judge region to be confirmed whether and meanwhile meet preset user's road network dispatch equilibrium degree threshold value £ and pre-set user location privacy anonymity degree threshold value k determines the region to be confirmed if meeting to hide corresponding to anonymous Name region, feeds back to anonymous, and method execution terminates;Otherwise E is entered step;Wherein, pre-set user location privacy anonymity degree For the lower limit of number of mobile users in default anonymous region;
Centered on region to be confirmed, each unit lattice adjacent thereto around are incorporated to to true by client by step E. Recognize in region, updates region to be confirmed, then return step D.
As a preferred technical solution of the present invention, in the step A, client is according to the satellite positioning of anonymous Coordinate, and the λ side length in combining target region, as follows:
ID=([x/ λ], [y/ λ])
Obtain the grid that mobile subscriber locating for anonymous is distributed in bitmap, wherein ID indicates that mobile subscriber is distributed bitmap The uniquely tagged number of middle grid, x indicate the longitude in anonymous satellite positioning coordinate, and y indicates anonymous satellite positioning Latitude value in coordinate.
As a preferred technical solution of the present invention, the step B includes the following steps:
Step B1. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until drawing Until dividing obtained minimum unit lattice side length to be less than side length of element, corresponding each unit lattice in the grid are obtained;
Step B2. creates quaternary tree t, using grid locating for anonymous as the root node of quaternary tree t;
Step B3. counts mobile subscriber's quantity and mobile subscriber in cell corresponding to quaternary tree bottom leaf node Region road network dispatch situation, and be stored in corresponding unit lattice, and then obtain cell knot in grid locating for anonymous Quad-tree structure corresponding to structure.
As a preferred technical solution of the present invention:In the step B, each unit lattice respectively include C.id, in Five attributes of Western-style pastry o, Lc, mount, C.roads, wherein C.id indicates unique identifier corresponding to cell, middle Western-style pastry o Indicating that the center point coordinate of cell, Lc indicate the side length of cell, mount indicates the quantity of mobile subscriber in cell, C.roads indicates the road network dispatch situation in storage corresponding unit lattice.
As a preferred technical solution of the present invention, in the step D, D1 to step D3 as follows, judge to Whether confirmation region meets pre-set user road network dispatch equilibrium degree threshold value £:
Step D1. is directed to each mobile subscriber in region to be confirmed respectively, obtains road network resource occupied by mobile subscriber Corresponding road network length Li, and total road network length L is combined, obtain LiWith the ratio of L, as road network resource shared by the mobile subscriber Ratio, and then the ratio of the shared road network resource respectively of each mobile subscriber in region to be confirmed is obtained, subsequently into step D2; Wherein, i ∈ { 1 ..., I }, I indicate the sum of mobile subscriber in region to be confirmed, and i indicates in region to be confirmed mobile to use for i-th Family;
Step D2. obtains each ratio according to the ratio of the shared road network resource of mobile subscriber each in region to be confirmed difference Corresponding standard deviation, as user's road network dispatch equilibrium degree corresponding to region to be confirmed, subsequently into step D3;
Step D3. judges user's road network dispatch equilibrium degree corresponding to region to be confirmed, if is less than pre-set user road network Distributing equilibrium degree threshold value £ is to indicate that region to be confirmed meets pre-set user road network dispatch equilibrium degree threshold value £;Otherwise it indicates Region to be confirmed is unsatisfactory for pre-set user road network dispatch equilibrium degree threshold value £.
A kind of road network environment position anonymous methods based on user distribution equilibrium degree of the present invention uses the above technical side Case compared with prior art, has the following technical effects:The road network environment position based on user distribution equilibrium degree that the present invention designs Anonymous methods is set, using client-server architecture, gets rid of third party's anonymous server that traditional k- anonymity model is dependent on, The object of attack as attacker is avoided to greatest extent, breaks through the system bottleneck in conventional method;User's road network point is proposed simultaneously Cloth equilibrium degree concept fully considers user's road network dispatch equilibrium degree in anonymous region forming process, avoids in anonymous region k Occur the excessive situation of road network occupation rate difference between mobile subscriber, increase the uncertainty that attacker screens selection to user, So during the anonymity of position, mobile subscriber's road network dispatch situation in anonymous region is fully considered, in effective guarantee user position Anonymous success rate is improved under the premise of setting privacy, avoids security risk, realizes the guarantor to user location privacy to greatest extent Shield.
Detailed description of the invention
Fig. 1 is that the system interaction of the road network environment position anonymous methods based on user distribution equilibrium degree designed by the present invention shows It is intended to;
Fig. 2 is location server mobile subscriber of the present invention branch bitmap;
Fig. 3 is the anonymous region road network dispatch schematic diagram of the present invention;
Fig. 4 is grid quad-tree partition schematic diagram of the present invention.
Specific embodiment
Specific embodiments of the present invention will be described in further detail with reference to the accompanying drawings of the specification.
The present invention devises a kind of road network environment position anonymous methods based on user distribution equilibrium degree, for obtaining anonymity Anonymous region corresponding to user in specific actual application, initializes, for corresponding to λ side length target area first Mobile subscriber be distributed bitmap, carry out grid dividing, obtain each grid, as shown in Figure 2;It is then based on and as shown in Figure 1 is System interaction schematic diagram, executes following steps.
Step A. client is requested according to the position enquiring of received anonymous, and the satellite positioning for obtaining anonymous is sat Mark, and the λ side length in combining target region, as follows:
ID=([x/ λ], [y/ λ])
The grid that mobile subscriber locating for anonymous is distributed in bitmap is obtained, it then will be locating for anonymous as client Grid and side length of element are sent to location server, and enter step B.Wherein, ID indicates that mobile subscriber is distributed in bitmap The uniquely tagged number of grid, x indicate the longitude in anonymous satellite positioning coordinate, and y indicates that anonymous satellite positioning is sat Latitude value in mark.
Step B. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until drawing Until dividing obtained minimum unit lattice side length to be less than side length of element, corresponding each unit lattice in the grid are obtained, and obtain the list Quad-tree structure corresponding to first lattice structure, as shown in figure 4, subsequently into step C.
It is as follows that above-mentioned steps B embodies user's road network dispatch equilibrium degree concept that the present invention designs:
(user's road network dispatch equilibrium degree) anonymous zone intra domain user road network dispatch is considered as meeting distributing equilibrium degree, when And if only if to any mobile subscriber in anonymous region, the road network resources balance occupied.Assuming that any mobile subscriber is occupied Road network resource ratio be pi, user's road network dispatch equilibrium degree indicates with standard deviation, then mobile subscriber's road network dispatch is balanced Degree is expressed as:£ is pre-set user road network dispatch equilibrium degree threshold value, £ be level off to 0 positive number, the smaller user of £ point Cloth harmony is better.
As shown in Figure 3, it is assumed that in the anonymous highway subnet of thick segment mark generated in corresponding trusted third party while, ash Color roundlet represents k mobile subscriber in anonymous region.In above-mentioned attack condition, by highway in anonymity region locating for mobile subscriber Net is divided into 3 parts, respectively s1(n1m1),s2(m1n2,n2n5,n2m3), s3(m2n3).Each section section collection all represents this The road network resource that mobile subscriber is occupied.If the length of each highway section collection is respectively Li, total length L, then mobile subscriber pi The ratio that the road network resource occupied accounts for road network total resources isIt can by the road section length in Fig. 3 To find out, mobile subscriber p2Occupied road network resource is bigger than the sum of road network resource that other two mobile subscribers are occupied, p3 The road network resource occupied is minimum, and locating road network environment is most remote.Attacker's road network according to shared by mobile subscriber in anonymous region The size of resource can exclude the p for being in road network remote location first3Really to inquire the possibility for issuing user, to make anonymity Effective mobile subscriber's quantity is less than given k value in region, brings the risk of location privacy leakage.
Above-mentioned steps B, in specific practical application, as shown in figure 4, specifically comprising the following steps:
Step B1. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until drawing Until dividing obtained minimum unit lattice side length to be less than side length of element, corresponding each unit lattice, each unit lattice in the grid are obtained Respectively include five C.id, middle Western-style pastry o, Lc, mount, C.roads attributes, wherein C.id is indicated corresponding to cell only One identifier, middle Western-style pastry o indicate that the center point coordinate of cell, Lc indicate the side length of cell, and mount indicates to move in cell The quantity at family is employed, C.roads indicates the road network dispatch situation in storage corresponding unit lattice.
Step B2. creates quaternary tree t, using grid locating for anonymous as the root node of quaternary tree t.
Step B3. counts mobile subscriber's quantity and mobile subscriber in cell corresponding to quaternary tree bottom leaf node Region road network dispatch situation, and be stored in corresponding unit lattice, and then obtain cell knot in grid locating for anonymous Quad-tree structure corresponding to structure.
Quad-tree structure is returned to client by location server by step C., and client is according to the satellite of anonymous Position coordinate, obtains the cell locating for anonymous in user distribution bitmap in grid, as corresponding to anonymous to true Region is recognized, subsequently into step D.
Step D. by client judge region to be confirmed whether and meanwhile meet preset user's road network dispatch equilibrium degree threshold value £ and pre-set user location privacy anonymity degree threshold value k determines the region to be confirmed if meeting to hide corresponding to anonymous Name region, feeds back to anonymous, and method execution terminates;Otherwise E is entered step;Wherein, pre-set user location privacy anonymity degree For the lower limit of number of mobile users in default anonymous region.
It is specific to execute following steps D1 to step D3 in above-mentioned steps D practical application, judge whether region to be confirmed meets Pre-set user road network dispatch equilibrium degree threshold value £.
Step D1. is directed to each mobile subscriber in region to be confirmed respectively, obtains road network resource occupied by mobile subscriber Corresponding road network length Li, and total road network length L is combined, obtain LiWith the ratio of L, as road network resource shared by the mobile subscriber Ratio, and then the ratio of the shared road network resource respectively of each mobile subscriber in region to be confirmed is obtained, subsequently into step D2; Wherein, i ∈ { 1 ..., I }, I indicate the sum of mobile subscriber in region to be confirmed, and i indicates in region to be confirmed mobile to use for i-th Family.
Step D2. obtains each ratio according to the ratio of the shared road network resource of mobile subscriber each in region to be confirmed difference Corresponding standard deviation, as user's road network dispatch equilibrium degree corresponding to region to be confirmed, subsequently into step D3.
Step D3. judges user's road network dispatch equilibrium degree corresponding to region to be confirmed, if is less than pre-set user road network Distributing equilibrium degree threshold value £ is to indicate that region to be confirmed meets pre-set user road network dispatch equilibrium degree threshold value £;Otherwise it indicates Region to be confirmed is unsatisfactory for pre-set user road network dispatch equilibrium degree threshold value £.
Centered on region to be confirmed, each unit lattice adjacent thereto around are incorporated to to true by client by step E. Recognize in region, updates region to be confirmed, then return step D.
Road network environment position anonymous methods designed by above-mentioned technical proposal based on user distribution equilibrium degree, using client End-server architecture gets rid of third party's anonymous server that traditional k- anonymity model is dependent on, and avoids becoming attack to greatest extent The object of attack of person breaks through the system bottleneck in conventional method;User's road network dispatch equilibrium degree concept is proposed simultaneously, in anonymous zone User's road network dispatch equilibrium degree is fully considered in the forming process of domain, avoids road network occur between k mobile subscriber in anonymous region The excessive situation of occupation rate difference increases the uncertainty that attacker screens selection to user, so during the anonymity of position, It fully considers mobile subscriber's road network dispatch situation in anonymous region, improves and hide under the premise of effective guarantee user location privacy Name success rate, avoids security risk, realizes the protection to user location privacy to greatest extent.
Embodiments of the present invention are explained in detail above in conjunction with attached drawing, but the present invention is not limited to above-mentioned implementations Mode within the knowledge of a person skilled in the art can also be without departing from the purpose of the present invention It makes a variety of changes.

Claims (5)

1. a kind of road network environment position anonymous methods based on user distribution equilibrium degree, hides corresponding to anonymous for obtaining Name region, it is characterised in that:It initializes first, is distributed bitmap for mobile subscriber corresponding to λ side length target area, carries out net Lattice divide, and obtain each grid;Then following steps are executed:
Step A. client is requested according to the position enquiring of received anonymous, obtains the satellite positioning coordinate of anonymous, And the λ side length in combining target region, the grid that mobile subscriber locating for anonymous is distributed in bitmap is obtained, it then will by client Grid locating for anonymous and side length of element are sent to location server, and enter step B;
Step B. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until dividing institute Minimum unit lattice side length is obtained less than until side length of element, obtains corresponding each unit lattice in the grid, and obtain the cell Quad-tree structure corresponding to structure, subsequently into step C;
Quad-tree structure is returned to client by location server by step C., and client is sat according to the satellite positioning of anonymous Mark obtains the cell in user distribution bitmap locating for anonymous in grid, as area to be confirmed corresponding to anonymous Domain, subsequently into step D;
Step D. by client judge region to be confirmed whether and meanwhile meet preset user's road network dispatch equilibrium degree threshold value £ with Pre-set user location privacy anonymity degree threshold value k determines the region to be confirmed for anonymous zone corresponding to anonymous if meeting Domain, feeds back to anonymous, and method execution terminates;Otherwise E is entered step;Wherein, pre-set user location privacy anonymity degree is pre- If the lower limit of number of mobile users in anonymous region;
Centered on region to be confirmed, each unit lattice adjacent thereto around are incorporated to area to be confirmed by client by step E. In domain, region to be confirmed is updated, then return step D.
2. a kind of road network environment position anonymous methods based on user distribution equilibrium degree, feature exist according to claim 1 In:In the step A, client is according to the satellite positioning coordinate of anonymous, and the λ side length in combining target region, by as follows Formula:
ID=([x/ λ], [y/ λ])
Obtain the grid that mobile subscriber locating for anonymous is distributed in bitmap, wherein ID indicates that mobile subscriber is distributed net in bitmap The uniquely tagged number of lattice, x indicate the longitude in anonymous satellite positioning coordinate, and y indicates anonymous satellite positioning coordinate In latitude value.
3. a kind of road network environment position anonymous methods based on user distribution equilibrium degree, feature exist according to claim 1 In the step B includes the following steps:
Step B1. location server carries out cross recursive unit lattice and divides for grid locating for anonymous, until dividing institute Minimum unit lattice side length is obtained less than until side length of element, obtains corresponding each unit lattice in the grid;
Step B2. creates quaternary tree t, using grid locating for anonymous as the root node of quaternary tree t;
Step B3. counts mobile subscriber's quantity and mobile subscriber place in cell corresponding to quaternary tree bottom leaf node Regional Road Network distribution situation, and be stored in corresponding unit lattice, and then obtain cell structure institute in grid locating for anonymous Corresponding quad-tree structure.
4. according to claim 1 or a kind of 3 road network environment position anonymous methods based on user distribution equilibrium degree, feature It is, in the step B, each unit lattice respectively include five C.id, middle Western-style pastry o, Lc, mount, C.roads attributes, In, C.id indicates that unique identifier corresponding to cell, middle Western-style pastry o indicate that the center point coordinate of cell, Lc indicate unit The side length of lattice, mount indicate the quantity of mobile subscriber in cell, and C.roads indicates the road network point in storage corresponding unit lattice Cloth situation.
5. a kind of road network environment position anonymous methods based on user distribution equilibrium degree, feature exist according to claim 1 In in the step D, D1 to step D3, it is equal to judge whether region to be confirmed meets pre-set user road network dispatch as follows Weighing apparatus degree threshold value £:
Step D1. is directed to each mobile subscriber in region to be confirmed respectively, and it is corresponding to obtain road network resource occupied by mobile subscriber Road network length Li, and total road network length L is combined, obtain LiWith the ratio of L, ratio as road network resource shared by the mobile subscriber Example, and then the ratio of each shared road network resource of mobile subscriber's difference in region to be confirmed is obtained, subsequently into step D2;Its In, i ∈ { 1 ..., I }, I indicate the sum of mobile subscriber in region to be confirmed, and i indicates in region to be confirmed mobile to use for i-th Family;
It is right to obtain each ratio institute according to the ratio of the shared road network resource of mobile subscriber each in region to be confirmed difference by step D2. The standard deviation answered, as user's road network dispatch equilibrium degree corresponding to region to be confirmed, subsequently into step D3;
Step D3. judges user's road network dispatch equilibrium degree corresponding to region to be confirmed, if is less than pre-set user road network dispatch Equilibrium degree threshold value £ is to indicate that region to be confirmed meets pre-set user road network dispatch equilibrium degree threshold value £;Otherwise it indicates to true Recognize region and is unsatisfactory for pre-set user road network dispatch equilibrium degree threshold value £.
CN201810551551.5A 2018-05-31 2018-05-31 Road network environment position anonymizing method based on user distribution balance degree Expired - Fee Related CN108848075B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810551551.5A CN108848075B (en) 2018-05-31 2018-05-31 Road network environment position anonymizing method based on user distribution balance degree

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810551551.5A CN108848075B (en) 2018-05-31 2018-05-31 Road network environment position anonymizing method based on user distribution balance degree

Publications (2)

Publication Number Publication Date
CN108848075A true CN108848075A (en) 2018-11-20
CN108848075B CN108848075B (en) 2020-10-09

Family

ID=64210485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810551551.5A Expired - Fee Related CN108848075B (en) 2018-05-31 2018-05-31 Road network environment position anonymizing method based on user distribution balance degree

Country Status (1)

Country Link
CN (1) CN108848075B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102170432A (en) * 2011-03-25 2011-08-31 东南大学 User-controllable K neighbor query method for protecting location privacy
US20110251897A1 (en) * 2010-04-12 2011-10-13 The Associated Press Online Shopping Circulars
CN102892073A (en) * 2012-09-11 2013-01-23 北京航空航天大学 Continuous query oriented location anonymizing method applicable to location service system
CN104486726A (en) * 2014-12-18 2015-04-01 东南大学 Road network environment location generalization method for protecting prospective location privacy of user
CN104618864A (en) * 2015-01-26 2015-05-13 电子科技大学 False location based privacy protection method in location service
CN105069371A (en) * 2015-07-28 2015-11-18 武汉大学 Geospatial data based user privacy protection method and system
CN107204988A (en) * 2017-06-28 2017-09-26 华南理工大学 A kind of location privacy protection method under the structure based on P2P
CN107682817A (en) * 2017-09-06 2018-02-09 西安交通大学 A kind of maintenance constant across road network position anonymous methods of statistical nature
CN107770722A (en) * 2017-10-13 2018-03-06 中南大学 The method for secret protection of location-based service based on the information constrained double stealthy regions in side

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110251897A1 (en) * 2010-04-12 2011-10-13 The Associated Press Online Shopping Circulars
CN102170432A (en) * 2011-03-25 2011-08-31 东南大学 User-controllable K neighbor query method for protecting location privacy
CN102892073A (en) * 2012-09-11 2013-01-23 北京航空航天大学 Continuous query oriented location anonymizing method applicable to location service system
CN104486726A (en) * 2014-12-18 2015-04-01 东南大学 Road network environment location generalization method for protecting prospective location privacy of user
CN104618864A (en) * 2015-01-26 2015-05-13 电子科技大学 False location based privacy protection method in location service
CN105069371A (en) * 2015-07-28 2015-11-18 武汉大学 Geospatial data based user privacy protection method and system
CN107204988A (en) * 2017-06-28 2017-09-26 华南理工大学 A kind of location privacy protection method under the structure based on P2P
CN107682817A (en) * 2017-09-06 2018-02-09 西安交通大学 A kind of maintenance constant across road network position anonymous methods of statistical nature
CN107770722A (en) * 2017-10-13 2018-03-06 中南大学 The method for secret protection of location-based service based on the information constrained double stealthy regions in side

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
倪巍伟: "保护位置隐私近邻查询中隐私偏好问题研究", 《软件学报》 *

Also Published As

Publication number Publication date
CN108848075B (en) 2020-10-09

Similar Documents

Publication Publication Date Title
Kazemi et al. A privacy-aware framework for participatory sensing
CN105246072B (en) User location method for secret protection and system under a kind of road network environment
US8655960B2 (en) Location-aware instant messaging
To et al. A framework for protecting worker location privacy in spatial crowdsourcing
US7072956B2 (en) Methods and systems for context-aware policy determination and enforcement
US20220247814A1 (en) Edge computing for internet of things security with blockchain authentication
JP2021527349A (en) Data anonymization for service subscriber privacy
CN107204988B (en) Position privacy protection method based on P2P structure
CN111107171B (en) Security defense method and device for DNS (Domain name Server), communication equipment and medium
US10979307B2 (en) Synchronized distributed processing in a communications network
AU2014315668A1 (en) Techniques for server-controlled tiling of location-based information
US9800617B2 (en) Systems and methods for managing lost devices of multiple types with multiple policies using melded profiles associated with groups
CN110611667B (en) Dynamic position privacy protection method and device in edge computing environment
CN105307111A (en) Position privacy protection method based on incremental neighbour inquiry
CN112055958A (en) Enabling wireless security measures based on wireless access point attributes
CN104080081A (en) Space anonymization method suitable for mobile terminal position privacy protection
CN106803825B (en) anonymous area construction method based on query range
CN111786970B (en) Cache-based cooperative location obfuscation anonymous privacy protection method and system
CN105578412B (en) A kind of position anonymous methods and system based on location-based service
CN109886046A (en) A kind of location privacy protection method and system
Bonné et al. Your mobile phone is a traitor!--raising awareness on ubiquitous privacy issues with SASQUATCH
CN108848075A (en) A kind of road network environment position anonymous methods based on user distribution equilibrium degree
KR102021269B1 (en) method for sharing location information of terminal of location information sharer
CN110290149A (en) A kind of location privacy protection method based on C/S multi-level buffer
US20210157631A1 (en) Automated queue shutdown for efficient resource management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201009