Font Size: a A A

Research On Trajectory Privacy Preserving Technique For Anonymity-Based Scheme

Posted on:2017-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2308330488464026Subject:Computer technology
Abstract/Summary:PDF Full Text Request
For many industries and due to the rapid development of the sensor and the mobile tracking technology, the location-based services (LBS) opened the imagination and became an indispensable part of people’s life. LBS require users to provide their real position coordinates information, but the privacy data will be a big threat. Under the frequently updated coordinates, the privacy sensitive data that in the user’s trajectory will be leaked. Therefore, this paper will discuss the security topic of trajectory information in user’s LBS.For trajectory privacy protection, domestic and abroad institutions put forward many methods and system structure, and under the background of the particular field, each method has a well anonymous result. The maximum speed attack and the continuous query attack are the current popular attacks; based on this two mainly attacks and the shortcomings of the current privacy protection, this paper will have a improvement and optimization. The content of this topic research is summarized as the following:(1) The application of the field of trajectory privacy protection technology and research status are analyzed and summarized in this paper. Focus on the privacy protection technology based on the false track, and analysis of the random methods and the rotation method for generating false track, summarize the two method’s principle and the defects.(2) Based on the real-time and efficiency which they cannot conduct well, this paper puts forward the improvement method——the protection of multipath trajectory privacy (MPT). In this method, we use synchronous way to generate false track, in order to achieve real-time trajectory privacy protection. We define the scope of the false trajectory generation, which not only ensure the generated false trajectory in the operating mode similar to the real trajectory, but also ensure the generated false trajectory is similar to the real trajectory. Through simulation experiments, it can effectively enhance the anonymity of protection of trajectory privacy, improve the quality of service.(3) In this paper, the system designed based on the popular middle anonymous server architecture. We mainly designed for intermediate anonymous server, and our proposed algorithm is applied to the anonymous processing module to achieve user privacy data anonymous.
Keywords/Search Tags:Location based service(LBS), trajectory privacy, privacy protection, false track
PDF Full Text Request
Related items