Font Size: a A A

The Research Of Identifier-based Series Requiry Model In LBS

Posted on:2013-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z F XuFull Text:PDF
GTID:2248330377455359Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, along with the rapid development of mobile computing technology wireless devices, LBS privacy protection technology has been given a lot of attention. A lot of anonymity algorithm has been designed to protect the privacy of the mobile users. However, k-anonymity for location privacy and the1-diversity query mechanisms for privacy mechanisms are applicable only to a snapshot query (snapshot query), not suitable for continuous queries. If the existing static anonymous continuous query algorithm is directly applied, it will generate a lot of problems such as having a privacy disclosure, or an overwhelming work of anonymous servers.This thesis presents a query model based on the query identifier. We define a continuous query identifier for each task, LBS returns the result of query to the anonymous server according to the query identifier. The attackers collect the same query identifier anonymity set. The attackers can infer the private information with comparison, which leads to user privacy disclosure. To address this sort of problems, We set up many pairs of k-table in the anonymous server, whenever a user sends a query, the anonymous server query the table, randomly selecting a number as the query identifier from this table. Attackers can not collect every element of the anonymous set of a continuous query task with this way, so the user privacy can be well protected. The main contributions of this thesis are as follows:First, we classified the existing K anonymous algorithms, and discussed their application in database, then some typical algorithms for the analysis of advantages and disadvantages。K anonymity model for privacy protection may receive the attack carried out research and analysis, and to prevent these attacks provide a series of protective.In LBS, the k-anonymity Model can not be well protected private information. Continuous query is a phenomenon unique to LBS. We classified and researched some attack method for k-anonymity Model in LBS.Finally, this thesis presents a model based on continuous query identifier, using database principles k anonymity, proposed a greedy algorithm, and algorithms for sample analysis, and finally come to change the algorithm can effectively continuous queries play an effective role in protection against loss of privacy for LBS.
Keywords/Search Tags:Location-based Services, k-anonymity, 1-diversity, Continuous Query, Privacy, RelationDatabase, Location Privacy
PDF Full Text Request
Related items