Font Size: a A A

Research And Prototype Implementation Of Location Privacy Protection For The LBS Of Mobile Terminal

Posted on:2016-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:Z LuoFull Text:PDF
GTID:2298330467992593Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Mobile Internet and the increasingly popularity of mobile terminals, location based services (LBS) has become essential to people’s lives. LBS is the trend of social information and consists of different technologies including satellite navigation, GIS, wireless communications networks and some other techniques. This new service provides users with a rich mobile service experience and also become a new economic growth point of emerging industries. LBS will obtain users’location information, which belongs to the users’personal privacy. So, when users use LBS, protecting their location information privacy without affecting the quality of service has great practical significance.Based on the summary of existing research on the location privacy protection, this paper proposed a new scheme of location privacy protection. This scheme addresses two aspects of location privacy protection in the LBS: Firstly, this paper optimized the existing personalized k-anonymity algorithm. The optimized algorithm can significantly improve the efficiency and the success rate of anonymity. The optimized algorithm also has the mechanism to deal with the service requests which are timeout, so all service requests can get answered. Secondly, due to users need to exchange their location information in real time, this thesis designed and implemented a secure real-time push system on the Android platform. The system ensures that information can be exchanged between users safely and real-time.First of all, this paper made a brief introducation of the theory of anonymity algorithm and relevant background of the technique of real-time pushing mechnism, and then introduced the overall design of the scheme in detail; Next, a detailed description of the design and implementation of the various parts of the scheme was given, which included the optimization of personalized k anonymity algorithm, the client-side and server-side of the real-time push system, Then, simulation experiments and functional tests were conducted for the two aspects of the scheme, and the result showed that the whole scheme achieves the desired objectives. Finally, a summary and the future work of this paper were made, and all my work and achievements were concluded.
Keywords/Search Tags:LBS, location privacy protection, k-anonymity algorithm, pushtechnology
PDF Full Text Request
Related items