Font Size: a A A

Reasearch On Trajectory Privacy In Location-based Service

Posted on:2015-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:J B WangFull Text:PDF
GTID:2268330428464485Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the development of wireless communication and the wireless location technology.Location–based service (LBS) has been widely used in our daily life. When we make a location-based query, we should sent the current location together with the query context to the LBS server,that may cause the leakage of our location and query context. So, the technology of location privacyhas drawn much attention from the academia, and many methods were proposed to protect theuser’s location privacy. Much of those methods are only aim at protecting of the user’s currentlocation, but in reality, users are always in the state of a continuous movement, and may makequeries in every location along with their movements, which we called moving trajectories. So it isimportant to protect those trajectories from being discerning by others in the condition ofcontinuous movement. Aim to protect the trajectory privacy, we did some research and discussbased on the system architecture of location privacy:(1)we deeply introduced the location-based service and the security problem in location-based service.(2)According to the sensitive location in the trajectories, proposed a method to protect thetrajectory privacy by restraining the publication of sensitive position and choosing a non-sensitiveposition with the highest probability that the user might stay in to replace the sensitive position soas to protect the sensitive location and the user’s trajectories. This method can prevent the sensitivelocation-based attack effectively.(3)Proposed a method that based on dummies to protect the trajectory privacy. According tothe parameters given by users, generates some fake locations and dummies to protect thetrajectories by reducing the identification probability. And the experiment shows that the method iseffective compared with the method of generate dummies randomly.
Keywords/Search Tags:Location-based service(LBS), privacy protecting, continuous queries, sensitivelocation, restrain-based, trajectory privacy, probability statistics
PDF Full Text Request
Related items