Font Size: a A A

Research On Location Privacy Preserving Technique For Anonymity-based Scheme

Posted on:2016-09-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y CuiFull Text:PDF
GTID:2308330461971801Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In our daily lives, multiple services of mobile phone terminals are realized with the aid of real-time location information of the users. This paper mainly studies the security issues of users’location information in the process of services. With the background of location-based services and research object of potential security threats posed by location information disclosure in the process of service request, query, returning results and information transmission, this research focuses on issues including how to solve new problems under different attack circumstances and how to improve the efficiency of location privacy protection relying on the typical location privacy protection technologies in hand. The paper specially emphasizes two typical anonymity schemes, i.e. k-anonymity scheme and Mix-zone anonymity scheme. It analyzes anonymity domain transformation technology and continuous query attacks based on k-anonymity and Mix-zone respectively, aiming to refine and improve the existing technologies and safeguard users’ location privacy security. The research is primarily carried out from the following three aspects.1. It analyzes the research background of location privacy protection and understands the research significance from practical application. The paper summarizes the characteristics of location-based services, reviews current research status and achievements of domestic and international scholars in this field. The author introduces several typical location privacy attack models and meanwhile highlights pseudonym technology, k-anonymity and Mix-zone anonymity. Finally, the paper makes a comprehensive comparison of the privacy protection capabilities among several location privacy protection methods under different attack models and then comes to a natural conclusion.2. Starting with the basic model of k-anonymity, the paper makes an analysis of the current anonymity domain transformation algorithm. Focusing on the problem of compromised service query efficiency from candidate query collection due to transformation of anonymity domain, the paper also proposes an effective anonymity domain transformation algorithm which can greatly enhance service query efficiency.3. Based on Mix-zone Anonymity scheme, the paper analyzes continuous query attacks and the existing schemes to resist these attacks. With regard to the characteristics of Mix-zone anonymity, the paper, combined with k-anonymity technology and integrating delay-tolerant and periodical jumping ideology, puts forward an integrated anonymity domain jumping algorithm. Experimental results verify that this algorithm can play a significant role in resisting Mix-zone continuous query attacks.
Keywords/Search Tags:Location-based Services(LBS), Location Privacy, Privacy Preserving, k- Anonymity, Mix-zone
PDF Full Text Request
Related items