CN108900521A - A kind of mobile network geographical location method for secret protection based on secure network coding - Google Patents

A kind of mobile network geographical location method for secret protection based on secure network coding Download PDF

Info

Publication number
CN108900521A
CN108900521A CN201810758827.7A CN201810758827A CN108900521A CN 108900521 A CN108900521 A CN 108900521A CN 201810758827 A CN201810758827 A CN 201810758827A CN 108900521 A CN108900521 A CN 108900521A
Authority
CN
China
Prior art keywords
data
user
node
serial number
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810758827.7A
Other languages
Chinese (zh)
Inventor
孙中伟
王磊
陈鑫
刘郁
徐力杰
刘峥
徐佳
徐小龙
王俊昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201810758827.7A priority Critical patent/CN108900521A/en
Publication of CN108900521A publication Critical patent/CN108900521A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Abstract

The present invention provides a kind of geographical location method for secret protection based on secure network coding, specifically includes and generates information forwarding tree according to the close relationship between social network user;Give user's Allotment Serial Number;Data are encoded in user node;After server receives sufficient amount of data, data are decoded using the Gauss Jordan elimination;Service response returns.Present invention combination secure network encodes the characteristics of all-or-nothing, when intercepting partial data in network, can not decode any useful data, effectively increase the safety of data in a network;It is directly interacted using agency (forwarding root vertex user) with location server, remaining user does not have to directly interact with server, reduces the possibility that server learns each user's more specific location information;Root node is sent to the multiple latitude and longitude informations of server, and server can not confirm the latitude and longitude information of root node, and similarly, the father node in forwarding tree can not also be accurately obtained request and the response message of child node.

Description

A kind of mobile network geographical location method for secret protection based on secure network coding
Technical field:
The invention belongs to field of communication service, specifically design a kind of mobile network geographical location based on secure network coding Method for secret protection.
Background technique:
The development of mobile Internet, so that the service (Location-based service, LBS) based on geographical location becomes It obtains more and more important.The technology is widely used to social activity, navigation, the fields such as cuisines.However, it is more and more facts proved that, LBS also brings great threat to the personal secrets of user while bringing convenient.Therefore, Recent study people Member always searches for one kind can but enjoy LBS convenient method under the premise of minimum exposure personal information.
Researcher both domestic and external proposes many solutions for this problem, based on different secret protection technological system structures Certainly scheme, currently, the mobile LBS service privacy information protection technology of mainstream can be greatly classified into three kinds:Geographical location information Hiding algorithm, identity hide protection algorism and Encryption Algorithm.From the perspective of from another angle, for the provider of LBS, if energy The location-based service of itself is improved from architectural framework, is also beneficial to promote the technical advantage of itself.
Secure network coding techniques is an important branch of network code, and researcher mentions in research classic network coding It is found when rising handling capacity:When carrying out linear hybrid operation with network code, the safety of data can be increased, so as to keep out Listener-in's eavesdrops, this thought can be applied in intimacy protection system.
The present invention establishes an experiment porch in true network, which includes the hand of 10 android systems Machine and a server, and the performance of scheme is had evaluated on the experiment porch, it mainly include complexity, safety and network are compiled Three aspects of code efficiency, are found, the practical computing cost of network-encoding operation bring is can to receive completely by experimental evaluation 's.
Summary of the invention:
The purpose of the present invention is to provide a kind of mobile network geographical location secret protection sides based on secure network coding Method, to ensure the personal secrets of user.
In order to achieve the above object, the present invention provides the mobile network geographical location privacies that kind is encoded based on secure network Guard method, it is characterised in that:The method includes following operative steps:
S1 generates information forwarding tree, the mutual higher use of cohesion by means of the close relationship between social network user Information conversion link is formed between family;
S2, first root node (being assumed to be i) randomly choose a number into N from 1, as the serial number of oneself, then to it Subtree (being assumed to be j) is randomly assigned countijA serial number, wherein countijValue be this subtree in user number;
The latitude and longitude information of itself and descendant nodes is carried out hybrid manipulation using secure network encoding scheme by S3, user, Then coded data piece being successively sent to its Parent node User, the solicited message of final all users is collected in root node, then By root node, user is sent to server;
S4, after server gets all coded data pieces, after decoding all latitude and longitude informations, to Map Services quotient Initiate inverse geographical location decoding request;After server gets all position responses of Map Services quotient, to all location informations into Row coding mixes and returns to root node user.
S5 is sent to it after root node user decodes the location information of oneself, then after other positions data are re-encoded Children User, user j is executed and its father node (root node) similarly operates;Recursive call process steps S5, until all Node all parse oneself location information.
The technical solution that the present invention further limits is:
Preferably, in above-mentioned technical proposal, in step S1, weight of the cohesion as side, weight is bigger, represents two use Family relationship is more intimate.Therefrom the maximum node of selectance (spend identical node if it exists and then therefrom randomly choose a node) is made For root node.
Preferably, in above-mentioned technical proposal, in step S2, if the subtree one of root node shares n node, then from remaining N serial number is randomly selected in N-1 serial number distributes to it, father node needs to record which serial number has given which children tree nodes, Root node can only know that the serial number of the children tree nodes is one in this n serial number in this way, and not knowing is which.
Preferably, in above-mentioned technical proposal, in step S3, when a node does not have descendant nodes, if a node point Serial number i, its data are just denoted as qi, with a non-zero random number aiCoded data q ' is generated multiplied by LBS request datai.? Coded data is previously written code coefficient, and code coefficient is:
gi=(0 0 ... ai ... 0)
In above formula, giFor a row vector, in addition to i-th of column component is aiOutside, remaining component is all 0.
Code coefficient combination after transmission file be:
q″i=(1 00 ... ai ... 0 q′i)
The total m descendant nodes of one node add data, with (a m+ after it receives whole m datas 1) × (m+1) random matrix carries out linear combination to this m+1 data, then m+1 number newly-generated after linear combination According to being sent to its father node.
Preferably, it in above-mentioned technical proposal, in step S4, after server decodes data, can be obtained according to decoding result To the serial number of these demand files, but server is not aware which user is this serial number belong to.Then, using with it is preceding Face same procedure is handled service response file, is not had documentary forwarding and linear hybrid layer by layer specifically, is directly being taken Business device end is encoded.
Each service response file after coding is:
Ci'=(N mi1 mi2 ... miN ri′)
Wherein, C is the file generated after encoding, and M is the random matrix of N × N, mijFor an element of Metzler matrix, riFor qi Service response file, ri' it is respectively riCoded data, data are issued root node user in forwarding tree after having mixed.
Preferably, available according to decoding result after user decodes data in step S5 in above-mentioned technical proposal The serial number of these answer files.The answer file decoded is:
According to the serial number information of these father node storages layer by layer, service response file riIt can accurately reach and initiate the request User i.
It is an advantage of the invention that:The location information that user is not only concealed to server end makes not knowing each user Be located at where, while increasing the safety of transmission again to a certain extent, the data after network code are multiple and different The linear mixing of position data, because increasing the difficulty that listener-in obtains data.
Detailed description of the invention:
Fig. 1 is the forwarding spanning tree based on cohesion model;
Fig. 2 is the invention safety evaluation;
Fig. 3 is that the invention network data redundancy and server efficiency are assessed;
Fig. 4 is the network code efficiency in the common smart machine of the invention.
Specific embodiment:
To become apparent from technical solution of the present invention, the present invention is described in further detail with reference to the accompanying drawing.This Invention specific implementation details are as follows:
S1 generates information forwarding tree, the mutual higher use of cohesion by means of the close relationship between social network user Information conversion link is formed between family;
In this method, weight of the intimate angle value as side, for intimate angle value within the scope of 0-100, numerical value is bigger, represents two Customer relationship is more intimate.Assuming that there is the social networks of Fig. 1, each node indicates user, and the weight on side indicates cohesion, uses warp The Kruskal algorithm of allusion quotation generates maximum spanning tree (selecting very big weight side that tree is added), in the process and records the degree of each node.
S2, first root node (being assumed to be i) randomly choose a number into N from 1, as the serial number of oneself, then to it Subtree (being assumed to be j) is randomly assigned countijA serial number, wherein countijValue be this subtree in user number.
The latitude and longitude information of itself and descendant nodes is carried out hybrid manipulation using secure network encoding scheme by S3, user, Then coded data piece being successively sent to its Parent node User, the solicited message of final all users is collected in root node, then By root node, user is sent to server.
When a node does not have descendant nodes, if as soon as the serial number i of node point, its data are denoted as qi, with one A non-zero random number aiCoded data q ' is generated multiplied by LBS request datai.Code coefficient, coding system are previously written in coded data Number is:
gi=(0 0 ... ai ... 0)
In above formula, giFor a row vector, in addition to i-th of column component is aiOutside, remaining component is all 0.
Code coefficient combination after transmission file be:
q″i=(1 00 ... ai ... 0 q′i)
The total m descendant nodes of one node add data, with (a m+ after it receives whole m datas 1) × (m+1) random matrix carries out linear combination to this m+1 data, then m+1 number newly-generated after linear combination According to being sent to its father node.
S4, after server gets all coded data pieces, after decoding all latitude and longitude informations, to Map Services quotient Initiate inverse geographical location decoding request;After server gets all position responses of Map Services quotient, to all location informations into Row coding mixes and returns to root node user.
After server decodes data, according to the serial number of these available demand files of decoding result, but server It is not aware which user is this serial number belong to.Then, using the progress with method as before to service response file Processing does not have documentary forwarding and linear hybrid layer by layer specifically, is directly encoded in server end.
Each service response file after coding is:
Ci'=(N mi1 mi2 ... miN ri′)
Wherein, C is the file generated after encoding, and M is the random matrix of N × N, mijFor an element of Metzler matrix, riFor qi Service response file, ri' it is respectively riCoded data, data are issued root node user in forwarding tree after having mixed.
S5 is sent to it after root node user decodes the location information of oneself, then after other positions data are re-encoded Children User j, user j are executed and its father node (root node) similarly operates.
After user decodes data, according to the serial number of these available answer files of decoding result.The response decoded File is:
According to the serial number information of these father node storages layer by layer, service response file riIt can accurately reach and initiate the request User i.
Based on this, the complexity, safety and the performance evaluation of network code efficiency of this method are carried out.
1, algorithm complexity is assessed
In table 1, the time complexity of entire algorithm is O (n3), space complexity is O (n2).It can be seen that the time of algorithm is multiple Miscellaneous degree and space complexity are lower, and therefore, entire scheme is theoretically feasible.
Table 1:The analysis of complexity of algorithm
2, safety evaluation
Data transmission scheme based on network code needs the record in the data segment of transmission to obtain used in the data Global coding vector.As a listener-in, the method that he eavesdrops is exactly the data received by eavesdropping accumulation, then using upper The method in face goes decoding to attempt to obtain significant data, once its position for obtaining anyone, then it is assumed that it eavesdrops successfully.
In Fig. 3, traditional scheme is directly communicated with server, does not carry out any protection, and listener-in often intercepts One link just successfully obtains the position of a user, therefore the number of positions obtained is linear with the data block number intercepted Relationship.And after using secure network encoding scheme, listener-in needs to carry out parsing operation to the data stolen, to the maximum extent Decode valuable information.It is shown on experiment porch in Fig. 3, according to the topological structure building network that Fig. 1 is generated, in network While operation, it is assumed that listener-in can randomly obtain a part of data therein, then listener-in to the data of acquisition into Row decoding operate.It is can be found that by experiment after carrying out linear hybrid to data using network code, listener-in obtains significant The quantity of location information to be obviously less than traditional scheme.
3, network code efficiency
After this programme, network-encoding operation can be introduced during transmission, this can additionally increase some calculating and hold Pin.And this method is to run in a mobile device, and the computing capability of mobile terminal will be much smaller than server, therefore, network The computing cost of coding becomes very crucial, if expense is big, the performance gain that can weaken, or even will appear more harm than good. We have carried out actual assessment to the performance of network code on the common mobile intelligent terminal of several moneys.
In Fig. 4, we have calculated separately two groups with every money mobile phone, and the network write based on JAVA is respectively adopted in calculating process Encoding operation library and operation library based on basis C++, each data in every group are that 10 tests are averaged.Due to JAVA is explanatory language, and code efficiency is lower.After being encoded using C++, performance is significantly improved.From Fig. 4, Wo Menfa Existing, when offspring data packet number is fewer, the efficiency of encoding and decoding is higher, and as K becomes larger, the handling capacity of coding is gradually decreased, this Be because the dimension of encoding and decoding gets higher after, the complexity of coding increases.In general, for the intelligent movable equipment of mainstream and Speech, the negative expense of network code bring is very small.The request data quantity of LBS service is usually smaller, therefore its generation Time delay almost can be ignored, and it can bring being obviously improved for safety.
The present invention not only conceals the location information of user to server end, makes not knowing which each user is located at In, while increasing the safety of transmission again to a certain extent, the data after network code are multiple and different position datas Linear mixing, because increasing the difficulty that listener-in obtains data.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the technical principles of the invention, several improvement and deformations can also be made, these improvement and deformations Also it should be regarded as protection scope of the present invention.

Claims (7)

1. a kind of geographical location method for secret protection based on secure network coding, it is characterised in that include the following steps:
S1 forms the information forwarding tree between multiple users:Including being calculated between them according to the number contacted between good friend Intimate angle value, and between users generate information conversion link;
S2, root node i randomly choose a number as the serial number of oneself into N from 1, are then randomly assigned to its subtree j countijA serial number, wherein countijValue be this subtree in user number;
The latitude and longitude information of itself and its descendant nodes is used secure network coding staff by S3, each user in addition to root node Case carries out hybrid manipulation, and coded data piece is successively then sent to its Parent node User, the solicited message of final all users Collect in root node, then server is sent to by root node user;
S4 after server gets all coded data pieces, after decoding all latitude and longitude informations, is initiated to Map Services quotient Inverse geographical location decoding request;After server gets all position responses of Map Services quotient, all location informations are compiled Code mixes and returns to root node user;
S5 is sent to its sub- section after root node user decodes the location information of oneself, then after other positions data are re-encoded Point user j;Recursive call process steps S5, until all nodes all parse the location information of oneself.
2. the geographical location method for secret protection according to claim 1 based on secure network coding, it is characterised in that:
In step S1, weight of the intimate angle value as side, weight is bigger, and it is more intimate to represent two customer relationships;Therefrom selectance Maximum tree node spends identical node if it exists and then therefrom randomly chooses a node as root node.
3. the geographical location method for secret protection according to claim 1 based on secure network coding, it is characterised in that:
In step S2, if the subtree one of root node shares n node, then n serial number is randomly selected from remaining N-1 serial number Each children tree nodes are distributed to, father node records the serial number for having given children tree nodes.
4. the geographical location method for secret protection according to claim 1 based on secure network coding, it is characterised in that:Step It include when a node does not have descendant nodes, setting the serial number i of the node, its LBS request data is denoted as q in rapid S3i, With a non-zero random number aiCoded data q ' is generated multiplied by LBS request datai;It is previously written code coefficient in coded data, is compiled Code coefficient be:
gi=(0 0 ... ai … 0)
In above formula, giFor a row vector, in addition to i-th of column component is aiOutside, remaining component is all 0;
Code coefficient combination after transmission file be:
q″i=(1 00 ... ai … 0 q′i)
The total m descendant nodes of one node, after it receives whole m datas, add data, with one (m+1) × (m+1) random matrix carries out linear combination to this m+1 data, and then m+1 data newly-generated after linear combination are sent out Give its father node.
5. the geographical location method for secret protection according to claim 4 based on secure network coding, it is characterised in that institute Stating LBS request data includes latitude and longitude information and position requests content.
6. the geographical location method for secret protection according to claim 1 based on secure network coding, it is characterised in that:
In step S4, after server decodes data, according to the serial number of these available demand files of decoding result, but take Business device is not aware which user is this serial number belong to;
Then, using the handling to service response file with method as before, do not have specifically documentary forwarding layer by layer with Linear hybrid is directly encoded in server end;
Each service response file after coding is:
C′i=(N mi1 mi2 … miN r′i)
Wherein, C is the file generated after encoding, and M is the random matrix of N × N, mijFor an element of Metzler matrix, riFor qiService Answer file, r 'iRespectively riCoded data, data are issued root node user in forwarding tree after having mixed.
7. the geographical location method for secret protection according to claim 1 based on secure network coding, it is characterised in that:
In step S5, after user decodes data, according to the serial number of these available answer files of decoding result;It decodes Answer file is:
According to the serial number information of these father node storages layer by layer, service response file riThe use for initiating the request can accurately be reached Family i.
CN201810758827.7A 2018-07-11 2018-07-11 A kind of mobile network geographical location method for secret protection based on secure network coding Pending CN108900521A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810758827.7A CN108900521A (en) 2018-07-11 2018-07-11 A kind of mobile network geographical location method for secret protection based on secure network coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810758827.7A CN108900521A (en) 2018-07-11 2018-07-11 A kind of mobile network geographical location method for secret protection based on secure network coding

Publications (1)

Publication Number Publication Date
CN108900521A true CN108900521A (en) 2018-11-27

Family

ID=64348629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810758827.7A Pending CN108900521A (en) 2018-07-11 2018-07-11 A kind of mobile network geographical location method for secret protection based on secure network coding

Country Status (1)

Country Link
CN (1) CN108900521A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636065A (en) * 2019-09-23 2019-12-31 哈尔滨工程大学 Location point privacy protection method based on location service

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009943A (en) * 2007-01-29 2007-08-01 中兴通讯股份有限公司 A switching method for the mobile positioning center in the continuous positioning and its device
CN101018393A (en) * 2006-02-10 2007-08-15 中兴通讯股份有限公司 A method for switching location information in the mobile positioning service system
CN106779641A (en) * 2016-12-29 2017-05-31 腾讯科技(深圳)有限公司 Information processing method and information processor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018393A (en) * 2006-02-10 2007-08-15 中兴通讯股份有限公司 A method for switching location information in the mobile positioning service system
CN101009943A (en) * 2007-01-29 2007-08-01 中兴通讯股份有限公司 A switching method for the mobile positioning center in the continuous positioning and its device
CN106779641A (en) * 2016-12-29 2017-05-31 腾讯科技(深圳)有限公司 Information processing method and information processor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王磊,孙中伟: "基于安全网络编码的移动网络地理位置隐私保护技术", 《南京理工大学学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636065A (en) * 2019-09-23 2019-12-31 哈尔滨工程大学 Location point privacy protection method based on location service
CN110636065B (en) * 2019-09-23 2021-12-07 哈尔滨工程大学 Location point privacy protection method based on location service

Similar Documents

Publication Publication Date Title
CN104954322B (en) A kind of binding processing method of account, apparatus and system
Jayasekara Role of Facebook as a disaster communication media
US10313482B2 (en) Method, device and system for providing services based on location information and terminal device thereon
CN104936141B (en) LBS method for protecting track privacy based on location tags
CN106254314B (en) A kind of position enquiring information on services guard method and system
CN104462285B (en) A kind of method for secret protection of Information Mobile Service inquiry system
CN104507048A (en) Location privacy protection method based on l-inquiry
CN107770722A (en) The method for secret protection of location-based service based on the information constrained double stealthy regions in side
CN104750718B (en) The searching method and equipment of a kind of data information
Attary et al. Hindcasting community-level damage to the interdependent buildings and electric power network after the 2011 Joplin, Missouri, Tornado
CN105162695B (en) A kind of novel neighbour's mobile social networking friend-making method for secret protection
CN105578412A (en) Position anonymization method based on position service and system
CN112039945A (en) Third-party application docking method and system based on fire-fighting Internet of things platform
Ashraf et al. IDP: A privacy provisioning framework for TIP attributes in trusted third party-based location-based services systems
CN108040321B (en) Position anonymization method for resisting replay attack in road network environment
CN108900521A (en) A kind of mobile network geographical location method for secret protection based on secure network coding
CN111182465A (en) Method and device for determining terminal affiliation
Lu et al. A novel method for location privacy protection in LBS applications
CN107733767B (en) Method, device and system for establishing social relationship network
Parmar et al. Dummy generation-based privacy preservation for location-based services
Wang et al. Network-coding-based energy-efficient data fusion and transmission for wireless sensor networks with heterogeneous receivers
Ruppel et al. Geocookie: A space-efficient representation of geographic location sets
Picco-Schwendener et al. Being smart with data: Automatic classification of users of a free municipal Wi-Fi network (MWN) using a two-tiered classification tree
CN104318084A (en) Mobile phone virus transmitting ability analysis method based on influence maximization algorithm
Costa et al. Rayzit: An anonymous and dynamic crowd messaging architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181127