Font Size: a A A

LBS Track Hidden Strategy Research Based On The Virtual Path Planning

Posted on:2013-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:L ChenFull Text:PDF
GTID:2248330395962419Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Location based services (LBS) is a mobile communication application service which provide services to users according to user’s location information. While providing great convenience, current LBS also bring new threats to users such as location privacy leakage. While enjoying service, the user must provide query message with accurate location information, if the attackers get the user’s location information, they may monitor, track users. Else if they analysis user’s location and movement trajectory information in-depth, they may infer user’s behavior patterns, hobbies, health even political inclination or other personal private information. Therefore, user’s position information hiding is an important challenge to LBS commercialization. Existing user location privacy hiding program most only consider the case of single query, if extended to continuous query, privacy protection will be ineffective, and the anonymous server executes all anonymous work, while handling large volumes of data will cause a bottleneck, and the credibility of anonymous server is also worth considering. In this paper, we propose a track hidden strategy based on mobile terminal, the strategy focus on solving trajectory protection problem in the continuous query. Strategy protects user’s location and movement trajectory though constructing false query mixed with true query when user send query to server. The strategy doesn’t need the support of third-party anonymous server, and the user can decide when starts the protection mechanism by his own. This paper studies as follows:(1) General introduction of the privacy leakage problem in LBS system. First this paper introduces the threads and ways of location privacy leakage, then from the anonymous system structure and location privacy anonymous technology, analyzes the deficiencies and shortcomings of the existing location privacy protection method.(2) Detailed introduction of trajectory privacy protection strategy based on mobile terminal in continuous query. First this part of paper describes the specific problem and system hypothesis, introduces the attacker path tracking model, then describes trajectory privacy protection strategy based on virtual path planning in detail, including the basic idea of the scheme, technical details and realization method, at last verifies the performance of the scheme. (3) Through the experiment, this paper validates the performance of the proposed track hidden strategy. According to the strategy requires, realizing this algorithm in the mobile terminal, choosing experimental scene for performance test. In the end, checking the rationality of the section speed both in synchronous and asynchronous delivery mode, comparing rationality of the same section speed before and after using track hidden strategy. The experiment proved the feasibility of this scheme.
Keywords/Search Tags:location based services, continuous query, location anonymization, virtual path programming
PDF Full Text Request
Related items