Font Size: a A A

Design And Implementation On Mobile Internet Location Aware Of Privacy Protection

Posted on:2017-05-15Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ZhouFull Text:PDF
GTID:2308330491451725Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, with the high speed development of mobile Internet and portable devices, a large number of location based service begin to appear. Location service brought great convenience to people’s life, but the mobile user’s personal privacy has also been a great threat. This is because when people enjoy the advantages of location service, you need to provide accurate location information to LBS server, which facilitates the il egal attacks. So in order to use location based services better, protecting the position of the user has a strong practical significance.This paper is based on the practical application of LBS location privacy protection, according to the existing location privacy protection model to analyze the pros and cons of the system structure of different LBS privacy, and emphatically describes mobile construction method of distributed P2 P architecture, then a non-trusted user’s P2 P encrypted location privacy protection algorithms has been put forward. The scheme is built on all the roles are not credible, via separate location privacy and user’s privacy to protect privacy information of users. This scheme adopts the combination of symmetric and asymmetric encryption method to protect privacy from the neighbors user cracking, k users send fragments separately through P2 P method to ensure the query in LBS servers, and subdivision technology to reduce the consumption of network resources. The program not only can provide a precise location for precise results, but also safeguarded against different kinds of malicious attacks, including malicious neighbor nodes, malicious LBS servers, the two conspired to attack, continuous queries and regional density attack, which protect privacy of the user’s information effectively.In order to verify the feasibility and effectiveness of the scheme, this paper designed and implemented the scheme, including the mobile client implemented in Android platform, LBS servers developped with Java language, and used the XMPP protocol for communication between the two. In order to simulate P2 P environment, the paper use Thomas, and NS-2, to do simulation experiment. Then from anonymous success rate, network resource consumption and safety three aspects to analyze the experimental data, the results show that the scheme designed in this paper can achieve the desired goal and have certain feasibility.
Keywords/Search Tags:location aware, mobile P2P, privacy protection, encryption, neighbours, LBS server, cooperation, slice
PDF Full Text Request
Related items