Font Size: a A A

Research On Key Techniques In Trajectory Privacy Protection Of Location Based Service

Posted on:2016-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:X F WangFull Text:PDF
GTID:2298330467477142Subject:Information Science
Abstract/Summary:PDF Full Text Request
With the popularity of mobile devices, the trajectory of privacy protection has become an increasingly serious issue, A variety of trajectory protection methods were presented by scholars at home and abroad from the trajectory data protection and location-based services.The representative methods are method based on dummies, method based on suppression and method based on generalization. Secondly, in the other direction of the trajectory of privacy protection, privacy measurement mechanism also was built,such as ptrajectory privacy metric based on k-anonymity, ptrajectory privacy metric based on tracking, ptrajectory privacy metric based on pecific privacy trajectory systems. In addition, the study of privacy protection system has made some achievements. Scholars at home and abroad proposed Paws system,Mix Zone system, Confab system and PUSIM system etc. This paper studys on access control model, ptrajectory privacy metric and the privacy protection system and proposes a access control model based on location service satisfying with the personalized need of users. In addition,we also build a more comprehensive measure of privacy metric.In the end, we establish an intelligent privacy protection system.
Keywords/Search Tags:trajectory privacy, privacy metric, access control, privacy protectionsystem
PDF Full Text Request
Related items