首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对传统匿名方法存在查询结果不精确、通信开销大等不足,提出一种新的位置匿名方法,并为匿名模型提出了基于熵的隐私度量方法。相对于传统的匿名方法而言,该方法将匿名区域分裂为几个分散的子匿名区域,并用子匿名区域的中心位置代替子匿名内用户的真实位置向LBS服务器发起查询。该方法能使用户在保护自身隐私的同时相对地得出自己的精确查询结果。理论分析表明,该方法能将匿名器与LBS服务器之间的通信量降到最低,提高查询服务的质量。在用户稀少的场景下,方法的优越性更加明显。  相似文献   

2.
随着全球移动定位设备的普及和网络通信技术的发展,催生出基于位置服务的应用(LBS)。享受LBS带来的便利服务的同时,用户的位置轨迹隐私保护受到严峻考验。现有的位置隐私保护方法大多针对用户单次查询设计,不能适用于连续查询;且匿名效果不佳。提出了一种采用中心服务器结构的假轨迹匿名方案,通过持续选择匿名区域内长时间所在的移动用户生成假位置点,构成虚拟轨迹的方式来混淆攻击者的判断,从而达到保护用户轨迹隐私的目的。仿真实验结果表明方法有效可行。  相似文献   

3.
针对基于位置的服务带来的用户位置隐私暴露问题,提出了一种基于隐私偏好的二次匿名位置隐私保护方法,融合k-匿名技术和差分隐私技术确保用户位置隐私,设计隐私等级划分策略,支持用户个性化设置隐私保护级别。根据隐私级别确定k匿名集大小,通过基于位置熵的k匿名算法求解k-1个匿名点,使k匿名集的点具有最大概率相似性;在此基础上进一步求解获取位置服务的匿名位置,提出了基于差分隐私的匿名位置生成算法,在保护用户位置隐私的同时确保获取精确的位置服务。实验结果表明在用户隐私等级设置范围内,所提方法能有效兼顾位置隐私保护和LBS服务质量。  相似文献   

4.
针对当前位置隐私的安全与效率问题,提出一种k-匿名批量认证的位置隐私保护方案。方案在基于位置服务(location based service, LBS)请求用户身份匿名化处理的基础上,在相邻网格区域中生成2k个假位置,采用位置熵进一步选取最优的k-1个,合并真实用户位置形成k-匿名,增强用户隐私度;通过LBS批量认证k个用户匿名身份,提高运算效率,降低服务响应时间。安全性分析表明,提出的方案满足匿名性、不可伪造性、抗假冒攻击等安全特性。仿真结果表明,提出的方案不仅在隐私度方面具有一定的优越性,而且在效率上也有所提升。  相似文献   

5.
现有的匿名化方法多采用时空伪装技术,该技术计算负担重,LBS响应延迟时间长,导致LBS服务质量低.为此,提出了分解重构的匿名化方法,该方法首先对接收到的LBS查询集进行分组,形成满足匿名模型的等价类,然后对每个等价类根据不同的策略进行分解和重构,生成新的匿名查询集.此外,面向多种隐私需求,提出了一系列匿名模型,并进一步提出了基于分解重构技术的匿名模型的实现算法MBFAA.实验表明,提出的重构分解技术可以有效地实现各种匿名模型.  相似文献   

6.
时空K-匿名方法以数据可靠、实现方式简便灵活,适合基于移动计算环境的LBS的特点,成为近年来在LBS领域研究隐私安全的主流技术。挖掘连续查询的时空K-匿名数据集,抽取出潜在的、有用的序列规则,可为众多行业应用提供预测分析功能,但同时也会产生基于敏感序列规则推理攻击用户隐私的威胁。传统的基于敏感知识隐藏的抗攻击方法,不能适应LBS应用具有的长期、连续、在线服务的特点。文中提出一种感知敏感序列规则的在线时空K-匿名的抗攻击方法:基于中间件的第三方匿名服务器首先从挖掘并分析连续查询生成的匿名区域序列数据集得到隐私敏感的序列规则,然后在后续的LBS查询服务请求中,设定一系列"泛化"、"避让"准则,动态感知敏感序列规则在线生成时空K-匿名数据集,并更新成功匿名的匿名数据集到匿名区域序列数据库。最后,当更新次数达到设定阈值后,重复匿名集序列规则的挖掘、分析与动态隐藏,直至消除所有敏感序列规则。实验证明,提出的方法可以实现匿名集数据中敏感序列规则的动态隐藏,有效消除基于敏感匿名集序列规则对用户位置隐私的推理攻击,且具有速度快、代价小的优点。  相似文献   

7.
基于位置服务(LBS)和增强现实技术快速发展的同时,促进了基于位置服务的应用范围扩大,同时也带来了用户位置隐私泄露的隐患,针对这一问题,本文提出一种双重匿名方法保护用户位置隐私,该方法融合自适应k匿名技术和差分隐私技术,根据用户服务请求类型判断隐私等级自适应产生k值,然后通过差分隐私技术随机产生扰动,将扰动位置作为用户真实位置发送给服务提供商.实验结果表明该方法提高了相对匿名度,LBS服务质量也得到保障,从而有效地保护了用户的位置隐私.  相似文献   

8.
为解决现有的TTP-free协议不能高效抵抗多个不诚实用户与基于位置的服务(LBS)提供商合谋攻击的问题,该文提出一种基于安全多方求和(SMS)与可验证私密分享(VSS)的位置隐私保护协议。采用SMS计算位置匿名中心,采用VSS进行位置加密,实现位置隐私保护并验证合作用户数据正确性。实验分析显示该协议能有效应对外部攻击和内部攻击,并侦查不诚实的合作用户,为LBS提供高质量位置隐私保护。  相似文献   

9.
针对位置信息滥用导致用户隐私泄漏问题,设计了位置隐私保护模型,该模型满足查询匿名性、轨迹不可追踪性.在该模型下,提出了基于决策树的匿名方法,该方法通过决策树判定规则来实现位置匿名,解决了位置k-匿名、位置l-多样性问题.理论分析和实验验证表明该方法的安全性和有效性.  相似文献   

10.
隐私的泄露问题不仅包含用户提交的位置和查询数据,更是包含了其中隐藏的用户身份、兴趣爱好、社会习惯、行为模式等。对位置服务隐私保护的技术进行综述,介绍了位置服务的应用场景、位置隐私的攻击方法。对现有的隐私保护体系结构和保护技术进行整理归纳。对未来的研究进行了展望,并提出一种基于缓存的时空扰动方法和LBS隐私保护度量假设方案。  相似文献   

11.
Language markedness is a common phenomenon in languages, and is reflected from hearing, vision and sense, i.e. the variation in the three aspects such as phonology, morphology and semantics. This paper focuses on the interpretation of markedness in language use following the three perspectives, i.e. pragmatic interpretation, psychological interpretation and cognitive interpretation, with an aim to define the function of markedness.  相似文献   

12.
何延凌 《科技信息》2008,(4):258-258
Language is a means of verbal communication. People use language to communicate with each other. In the society, no two speakers are exactly alike in the way of speaking. Some differences are due to age, gender, statue and personality. Above all, gender is one of the obvious reasons. The writer of this paper tries to describe the features of women's language from these perspectives: pronunciation, intonation, diction, subjects, grammar and discourse. From the discussion of the features of women's language, more attention should be paid to language use in social context. What's more, the linguistic phenomena in a speaking community can be understood more thoroughly.  相似文献   

13.
王慧 《科技信息》2008,(10):240-240
Wuthering Heights, Emily Bronte's only novel, was published in December of 1847 under the pseudonym Ellis Bell. The book did not gain immediate success, but it is now thought one of the finest novels in the English language. Catherine is the key character of this masterpiece, because everybody and everything center on her though she had a short life. We can understand this masterpiece better if we know Catherine well.  相似文献   

14.
The Williston Basin is a significant petroleum province, containing oil production zones that include the Middle Cambrian to Lower Ordovician, Upper Ordovician, Middle Devonian, Upper Devonian and Mississippian and within the Jurassic and Cretaceous. The oils of the Williston Basin exhibit a wide range of geochemical characteristics defined as "oil families", although the geochemical signature of the Cambrian Deadwood Formation and Lower Ordovician Winnipeg reservoired oils does not match any "oil family". Despite their close stratigraphic proximity, it is evident that the oils of the Lower Palaeozoic within the Williston Basin are distinct. This suggests the presence of a new "oil family" within the Williston Basin. Diagnostic geochemical signatures occur in the gasoline range chromatograms, within saturate fraction gas chromatograms and biomarker fingerprints. However, some of the established criteria and cross-plots that are currently used to segregate oils into distinct genetic families within the basin do not always meet with success, particularly when applied to the Lower Palaeozoic oils of the Deadwood and Winnipeg Formation.  相似文献   

15.
理论推导与室内实验相结合,建立了低渗透非均质砂岩油藏启动压力梯度确定方法。首先借助油藏流场与电场相似的原理,推导了非均质砂岩油藏启动压力梯度计算公式。其次基于稳定流实验方法,建立了非均质砂岩油藏启动压力梯度测试方法。结果表明:低渗透非均质砂岩油藏的启动压力梯度确定遵循两个等效原则。平面非均质油藏的启动压力梯度等于各级渗透率段的启动压力梯度关于长度的加权平均;纵向非均质油藏的启动压力梯度等于各渗透率层的启动压力梯度关于渗透率与渗流面积乘积的加权平均。研究成果可用于有效指导低渗透非均质砂岩油藏的合理井距确定,促进该类油藏的高效开发。  相似文献   

16.
As an American modern novelist who were famous in the literary world, Hemingway was not a person who always followed the trend but a sharp observer. At the same time, he was a tragedy maestro, he paid great attention on existence, fate and end-result. The dramatis personae's tragedy of his works was an extreme limit by all means tragedy on the meaning of fearless challenge that failed. The beauty of tragedy was not produced on the destruction of life, but now this kind of value was in the impact activity. They performed for the reader about the tragedy on challenging for the limit and the death.  相似文献   

17.
Location based services is promising due to its novel working style and contents.A software platform is proposed to provide application programs of typical location based services and support new applications developing efficiently. The analysis shows that this scheme is easy implemented, low cost and adapt to all kinds of mobile nework system.  相似文献   

18.
正The periodicity of the elements and the non-reactivity of the inner-shell electrons are two related principles of chemistry,rooted in the atomic shell structure.Within compounds,Group I elements,for example,invariably assume the+1 oxidation state,and their chemical properties differ completely from those of the p-block elements.These general rules govern our understanding of chemical structures and reactions.Using first principles calcula-  相似文献   

19.
We have developed an adiabatic connection to formulate the ground-state exchange-correlation energy in terms of pairing matrix linear fluctuations.This formulation of the exchange-correlation energy opens a new channel for density functional approximations based on the many-body perturbation theory.We illustrate the potential of such approaches with an approximation based on the particle-particle Random Phase Approximation(pp-RPA).This re-  相似文献   

20.
正The electronic and nuclear(structural/vibrational)response of 1D-3D nanoscale systems to electric fields gives rise to a host of optical,mechanical,spectral,etc.properties that are of high theoretical and applied interest.Due to the computational difficulty of treating such large systems it is convenient to model them as infinite and periodic(at least,in first approximation).The fundamental theoretical/computational problem in doing so is that  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号