RJXB软件学报Journal of Software1000-9825软件学报编辑部中国北京rjxb-29-7-185210.13328/j.cnki.jos.005355TP309面向隐私保护的新型技术与密码算法专题SPECIAL TOPIC ON PRIVACY PRESERVING ORIENTED NEW TECHNOLOGIES AND CRYPTOGRAPHIC ALGORITHMS基于用户分布感知的移动P2P快速位置匿名算法Distribution-Perceptive-Based Spatial Cloaking Algorithm for Location Privacy in Mobile Peer-to-Peer Enviroments许明艳XUMing-Yan
1国家数字交换系统工程技术研究中心, 河南 郑州 450002China National Digital Switching System Engineering and Technological R & D Center, Zhengzhou 450002, China移动互联网安全技术国家工程实验室, 北京 100876National Engineering Laboratory for Mobile Network Security, Beijing 100876, China许明艳, E-mail:xumingyan886@126.com
The mobile peer-to-peer environment is easier to implement in location privacy preserving research. The mobile users cooperate through P2P multi-hop routing to blur their accurate locations into a spatial cloaking region, but most existing spatial cloaking algorithm cannot work well because of the high communication overhead, time consumption and the lower success rate. This paper proposes an algorithm that can recommend user's privacy requirements by collecting users' weighed density information in their neighborhood, and therefore help mobile users to find enough collaborative users quickly. The approach shows great anonymization success rate by 92% through extensive simulation experiments for a range of P2P environment scenarios. It achieves lower communication cost and less than 500ms of searching time at the same time.
位置隐私移动P2P网络k-匿名用户分布感知隐私参数推荐location privacymobile peer-to-peer networkk-anonymityuser-distribution-perceptiverecommendation of privacy parameters国家自然科学基金61521003Research on the Fundamental Theories for Cyber-Space Mimic Defense国家自然科学基金(61521003);Research on the Fundamental Theories for Cyber-Space Mimic DefenseNational Natural Science Foundation61521003Research on the Fundamental Theories for Cyber-Space Mimic DefenseNational Natural Science Foundation (61521003); Research on the Fundamental Theories for Cyber-Space Mimic Defense
随着智能终端计算能力的不断提高和各种定位技术的发展, 基于位置的服务(location based service, 简称LBS)已成为热点移动应用.LBS与用户提出请求的位置有关, 为了获得优质的位置服务, 人们必须将自己精确的位置提交给应用服务器, 同时提出查询请求.位置信息作为重要的个人隐私, 暴露给网络及不信任的第三方, 有可能导致严重的隐私泄露问题.如何在为用户提供LBS服务的同时保护位置及个人隐私安全是当前的一个研究热点.
针对以上需求, 本文提出了一种基于用户分布感知的移动P2P快速位置匿名算法(a distribution-perceptive- based spatial cloaking algorithm for location privacy in mobile P2P enviorments, 简称DPB).DPB算法由用户邻域分布感知、匿名参数推荐以及匿名区快速查找这3部分组成.
Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of the 1st Int'l Conf. on Mobile Systems, Applications and Services. New York: ACM Press, 2003. 31-42.
Gedik B, Liu L. Location privacy in mobile systems: A personalized anonymization model. In: Proc. of the 25th IEEE Int'l Conf. on Distributed Computing Systems. IEEE, 2005. 620-629.
Bu GG, Liu L. A customizable k-anonymity model for protecting location privacy. In: Proc. of the ICDCS. 2004. 620-629.
Mokbel MF, Chow CY, Aref WG. The new Casper: Query processing for location services without compromising privacy. In: Proc. of the 32nd Int'l Conf. on Very Large Data Bases. VLDB Endowment, 2006. 763-774.
Duckham M, Kulik L. A formal model of obfuscation and negotiation for location privacy. In: Pervasive Computing. Berlin, Heidelberg: Springer-Verlag, 2005. 152-170.
Chow CY, Mokbel MF, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proc. of the 14th Annual ACM Int'l Symp. on Advances in Geographic Information Systems. ACM, 2006. 171-178.
Che Y, Yang Q, Hong X. A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks. In: Proc. of the 2012 IEEE Wireless Communications and Networking Conf. (WCNC). IEEE, 2012. 2098-2102.
ChowCYMokbelMFLiuXSpatial cloaking for anonymous location-based services in mobile peer-to-peer environments201115235138010.1007/s10707-009-0099-y
Chow CY, Mokbel MF, Liu X. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica, 2011, 15(2):351-380.
Mokbel MF, Chow CY. Challenges in preserving location privacy in peer-to-peer environments. In: Proc. of the 7th Int'l Conf. on Web-Age Information Management Workshops, WAIM 2006. IEEE, 2006. 1.
HuangYHuoZMengXCoPrivacy:A collaborative location privacy-preserving method without cloaking2011341019761985
Huang Y, Huo Z, Meng X. CoPrivacy:A collaborative location privacy-preserving method without cloaking. Chinese Journal of Computers, 2011, 34(10):1976-1985(in Chinese with English abstract).
Yang N, Cao Y, Liu Q, et al. A novel personalized TTP-free location privacy preserving method. Int'l Journal of Security and Its Applications, 2014, 8(2):387-398.
SolanasAMartinez-BallesteAA TTP-free protocol for location privacy in location-based services20083161181119110.1016/j.comcom.2008.01.007
Solanas A, Martinez-Balleste A. A TTP-free protocol for location privacy in location-based services. Computer Communications, 2008, 31(6):1181-1191.
HashemTKulikL"Don't trust anyone":Privacy protection for location-based services201171445910.1016/j.pmcj.2010.04.006
Hashem T, Kulik L. "Don't trust anyone":Privacy protection for location-based services. Pervasive and Mobile Computing, 2011, 7(1):44-59.
Gao S, Ma J, Yao Q, et al. Towards cooperation location privacy-preserving group nearest neighbor queries in LBS. Journal on Communication, 2015, 3: 142-150(in Chinese with English abstract).
GhaffariMGhadiriNManshaeiMHP4QS:A peer to peer privacy preserving query service for location-based mobile applications2016PP991
Ghaffari M, Ghadiri N, Manshaei MH, et al. P4QS:A peer to peer privacy preserving query service for location-based mobile applications. IEEE Trans. on Vehicular Technology, 2016, PP(99):1.
DargahiTAmbrosinMContiMABAKA:A novel attribute-based k-anonymous collaborative solution for LBSs20168511310.1016/j.comcom.2016.03.002
Dargahi T, Ambrosin M, Conti M, et al. ABAKA:A novel attribute-based k-anonymous collaborative solution for LBSs. Computer Communications, 2016, 85:1-13.
Pingley A, Yu W, Zhang N, et al. CAP: A context-aware privacy protection system for location-based services. In: Proc. of the IEEE Int'l Conf. on Distributed Computing Systems. 2009. 49-57.
AhamedSIHaqueMMHasanCSA novel location privacy framework without trusted third party based on location anonymity prediction2012121243410.1145/2188379
Ahamed SI, Haque MM, Hasan CS. A novel location privacy framework without trusted third party based on location anonymity prediction. ACM SIGAPP Applied Computing Review, 2012, 12(1):24-34.
BrinkhoffTA framework for generating network-based moving objects20026215318010.1023/A:1015231126594
Brinkhoff T. A framework for generating network-based moving objects. GeoInformatica, 2002, 6(2):153-180.