Font Size: a A A

Research On Optimization Algorithm And Application Of Location Privacy Protection

Posted on:2018-02-10Degree:MasterType:Thesis
Country:ChinaCandidate:K ZhouFull Text:PDF
GTID:2348330536988531Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Privacy disclosure of Location-based services severely restricts its development.However,the promotion of LBS applications is constantly calling for privacy protection,which forces us to seek a balance between privacy and service.Based on this,this paper focuses on the protection of LBS privacy,from the existing privacy protection technology and the security,efficiency and quality of service and other aspects of the proposed algorithms to make up for the existing shortcomings of privacy protection technology.The research of this paper has the significance of theoretical exploration,and the solution proposed from the perspective of technology and management has practical application value in the field of location privacy protection.(1)Based on the homomorphic encryption location privacy protection scheme,a privacy protection algorithm with user's personal preference and personality habit is proposed.Two kinds of query privacy protection models are proposed under the kanonymous condition: Markov forecasting model,k-anonymous Model;from the internal and external attacks under the security of the program proved that the security of the program from the performance analysis proved to be resistant to continuous inquiries,camouflage users,trajectory detection attacks.(2)This paper designs a trajectory privacy protection scheme for continuous query in LBS,analyzes the trajectory privacy disclosure problem of continuous query in Silent Cascade scheme,constructs a security model with indistinguishable message as security requirement,and uses the Bilinear mapping method is constructing a trajectory privacy protection scheme of continuous query.The proposed scheme indicates that it can provide the safety and resist the continuous query attack.(3)An optimized scheme of trajectory privacy protection based on false location is proposed.Based on the client-trusted server-server architecture,the location and the anonymous area are used as the privacy target to protect the user's location privacy by generating the proxy location and adding the false location.Combining the road map information and the phase the false location between the anonymous regions must meet the requirements of accessibility,and the security analysis of the scheme is completed.The analysis show that the scheme can resist the continuous query attack under the high quality query service.(4)This paper displays the simulation experiment of the false protection scheme based on the false location.This paper introduces the frame structure and design idea of the simulation scheme in the specific application environment.Thomas Brinkhoff,a network-based mobile node generator,simulates the scheme.
Keywords/Search Tags:Location privacy-preserving, k – anonymity, Provably Secure, Markov chain
PDF Full Text Request
Related items