首页 | 本学科首页   官方微博 | 高级检索  
     检索      

匿名区域层级扩张的位置隐私保护方法
引用本文:张磊,马春光,印桂生.匿名区域层级扩张的位置隐私保护方法[J].系统工程与电子技术,2021,43(2):561-566.
作者姓名:张磊  马春光  印桂生
作者单位:1. 哈尔滨工程大学计算机科学与技术学院, 黑龙江 哈尔滨 1500012. 佳木斯大学信息电子技术学院, 黑龙江 佳木斯 1540073. 山东科技大学计算机科学与工程学院, 山东 青岛 266590
基金项目:国家自然科学基金重点项目(61932005);NSFC-通用技术基础研究联合基金(U1936112);中国博士后基金(2019M661260);黑龙江省自然科学基金优秀青年项目(YQ2019F018);黑龙江省自然科学基金(LH2019F011)资助课题。
摘    要:针对传统中心点匿名区域扩张方法中用户位置可预测的问题,提出一种匿名区域按照匿名用户离散距离层级扩张的位置隐私保护方法.首先,将位置区域按照匿名用户离散间距进行划分,并利用希尔伯特曲线按照间距递进的原则建立具有不同离散间距层级的N-阶位置区域四叉树.其次,基于该四叉树用户可选择不同离散程度的匿名区域,防止由于匿名用户密度...

关 键 词:位置隐私保护  希尔伯特曲线  N-阶层级  区域四叉树
收稿时间:2019-11-12

Location privacy protection method of anonymous region hierarchy expansion
ZHANG Lei,MA Chunguang,YIN Guisheng.Location privacy protection method of anonymous region hierarchy expansion[J].System Engineering and Electronics,2021,43(2):561-566.
Authors:ZHANG Lei  MA Chunguang  YIN Guisheng
Institution:1. College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China2. College of Information and Electronic Technology, Jiamusi University, Jiamusi 154007, China3. College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China
Abstract:Aiming at the problem that the user’s location can be predicted in the traditional central point anonymous region expansion method,a location privacy protection method based on the hierarchy expansion of anonymous regions according to the anonymous user’s discrete distance is proposed.Firstly,the location region is divided according to the discrete distance of anonymous users,and then the N-order location region quad tree with different levels of discrete distance is established by using Hilbert curve according to the principle of interval progression.Secondly,based on the quad tree,users can choose anonymity regions with different discrete degrees to prevent privacy leakage due to the density of anonymous users.At the same time,since the user is not located in the anonymous center,it can effectively deal with attack methods such as user distance differential attack and central area selection attack.Finally,the theoretical basis of the algorithm is given through the security analysis.The comparision between experimental verification and similar algorithms show that the proposed algorithm is superior to other similar algorithms.
Keywords:location privacy protection  Hilbert curve  N-hierarchy  region quad tree
本文献已被 维普 等数据库收录!
点击此处可从《系统工程与电子技术》浏览原始摘要信息
点击此处可从《系统工程与电子技术》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号