Font Size: a A A

Location Privacy Protection Technology Research And Application

Posted on:2014-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:R F YuFull Text:PDF
GTID:2248330395982555Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Contemporary productivity develops rapidly and multidisciplinary chiastopic fusion, coupled with the growing demand for applications,"Intelligent" as the core of the Internet of Things technology came into being. Along with the birth of new things, there are always new problems. How to protect users’privacy in the IOT world attracts much attention. Each of cloud computing and the Internet of Things has a lot of advantages, organic integration of the two will have a higher effectiveness. If IOT combined with cloud computing, about the privacy protection of IOT, we should take the security issue of cloud computing as well.Privacy information attack includes two aspects, on the one hand is the stealing of private information, and on the other hand is the tampering with private information. From the view of privacy protection, location privacy protection can be divided into two categories:to prevent location privacy information from being disclosed and being tampered with. Currently, most of the privacy protections in LBS protect location privacy by reducing the accuracy of location information. The drawback of these methods is the quality of LBS will decline as well. In this paper, we come up with a new LBS privacy protection which can hide users’ identity. By blurring users’identity attributes to make the users in a same set indistinguishable, so that the connection between a query and its owner has been shielded, then the privacy information can be protected without reducing the accuracy of location information. Take consistency attack into account, we control the similarity of query context and location information among a query set to ensure that an attacker can not speculate users’ privacy information from the similar information. The second challenge about LBS privacy is: prevent privacy information from being tampered illegally. In this paper, we adopt Hash-based Message Authentication Code and study a reliability verification module for LBS which can verify the integrity of query and result. On the basis of previous studies, we also designed a location privacy protection server model. The privacy protection method used in this model is the new LBS privacy protection which can hide users’identity, according to the characteristics of privacy protection, virtual query generation module is used to improve the success rate of protection; according to the characteristics of identity generalization, we design a query results parsing process. The model also adds query validation module to prevent private information being leaked to ensure that the service results users get are not tampered.
Keywords/Search Tags:Internet of Things, Location Based Services, Privacy Protection
PDF Full Text Request
Related items