Font Size: a A A

Research On Location Privacy Protection Technology In Mobile Social Networks

Posted on:2017-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:T T ZhangFull Text:PDF
GTID:2348330518970804Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of mobile Internet, Users in mobile social network are increasing year by year, more and more users are accustomed to enjoy location-based services. Traditional social networking has been closely combined with the mobile Internet,forming a mobile, social, location-based services integration of mobile social environment.Location based social applications bring more fun and convenience to people's lives and work, however, it brings new privacy issues. Therefore, the research on location privacy protection method attracted widespread attention. The research of location privacy protection technology, from the traditional access control technology to the location anonymity and other technologies, especially the trajectory privacy protection is the focus of the research. The development of mobile social network brings the privacy protection problem, existing privacy protection method can not apply to it, the research of mobile social network trajectory privacy protection technology is the current hot.This thesis studies the trajectory privacy protection technology, and protect the user's privacy in the mobile social network in the typical location service application scenarios.For problems, such as lack of data location precision, while the existing location privacy protection technology apply in mobile social networks, combined with location service location data characteristics, this thesis proposes the BMPT trajectory privacy protection method ,based on improved method combined the generalization method and k-anonymity,Using the MPTA algorithm to carry on the trajectory k-anonymity to achieve the goal of privacy protection. which can obtain a better balance in data availability and privacy protection degree. In this method, trajectory is transformed into trajectory sequence by using the character of the semantic position, and the k-anonymity of the trajectory sequence is used to achieve the purpose of privacy protection. After the anonymity it not only meet the needs of privacy protection, but also meet the location service for data accuracy requirements, and effectively improve the quality of service.According to the difference of user's privacy requirement, On the basis of the BMPT trajectory privacy protection method, the IC-K individual privacy protection model is proposed. The model first to trajectory clustering processing; use the combination of user privacy requirements of the individual similarity measure method,will the user's trajectory according to different metrics for clustering the trajectories in the same cluster similar; the trajectory of each cluster were trajectory k-anonymity to achieve a better balance of user demand for personalized privacy protection and quality of service.Finally, the validity and applicability of the proposed BMPT trajectory privacy preserving method and the IC-K individual privacy protection model are verified by simulation experiments. Mainly aimed at the realization of the trajectory k-anonymity MPTA algorithm for comparison and verification. Through the analysis of the experimental results, the MPTA algorithm has a smaller location loss in the trajectory k-anonymity, which has better privacy protection effect and higher service quality.
Keywords/Search Tags:MPTA, BMPT, IC-K, Trajectory K-anonymity, Personalized similarity measure
PDF Full Text Request
Related items