Font Size: a A A

Anonymous Method Research Based On The Trajectory Privacy

Posted on:2014-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:H QuFull Text:PDF
GTID:2268330401465509Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Mobile information technology and location services applications continues toevolve, The attention of the major IT companies and academic research institutions onthe issue of location privacy protection also increased rapidly. Trajectory privacy is anemerging field, researchers have proposed many algorithm and system architecture toadapt to the protection of the trajectory privacy. Trajectory privacy algorithms are mostonly protection against the trajectory of the continuous movement to the position, thesemethods are to a certain extent protect the privacy of track information, but do notachieve trajectory semantic information protection, which trajectory privacy hot anddifficult.In this thesis proposes a new trajectory privacy protection method based onsemantic anonymous proxy (SAP) by observing the problem of trajectory privacy, thesemantic anonymous is into the protection of privacy trajectory, k-anonymity based onthe background map is proposed to overcome k-anonymous method would leak tracksemantic information. Then the center server is not credible, abolish the use ofanonymous center server, location-based services using the method based on semanticproxy requests. From the track formed on the root causes of anonymity, the system alsotakes into account the track speed attack prevention. The main content of this thesis:1. Trajectory semantics anonymous background map model is proposed bystudying semantic anonymous. The method by processing on the map of the originaldata, each position type setting the vertices density and privacy threshold, privacythreshold within the vertex density configured privacy location area. Location servicerequest to meet the requirements of semantic k-anonymous achieve trajectory semanticsanonymous.2. Vulnerable to the characteristics of speed related attacks for traces anonymous,propose a suitable track anonymous mechanism. Attacks as a starting point, combinedwith anonymous proxy requests and background map to achieve the trajectory privacy.The time anonymous way to prevent users from trajectory privacy due to the speedrelated attacks. 3. Proposed based on distributed architecture SAP-tree by researching trajectoryanonymous center server disadvantage. The system is able to achieve location-basedservices and semantic trajectory anonymous and consider the system’s load balancing.Validation of the proposed method through simulation experiments, compare withthe main track anonymous method and efficiency analysis, reflect the good value.
Keywords/Search Tags:Semantic trajectory, trajectory privacy, location services, anonymous proxy
PDF Full Text Request
Related items