Font Size: a A A

Research On Privacy Protection Technology For Mobile Applications

Posted on:2017-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:S Y HuangFull Text:PDF
GTID:2428330566953063Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Due to the continuous development of mobile Internet,more and more mobile applications penetrate into our lives,and it is inevitable that the mobile users can not avoid the problem of privacy leakage.The issue of user location privacy leak is worthy of attention.Many mobile applications obtain user location information as the premise to provide users with location-based services.People enjoy mobile applications to bring us the convenience of life at the same time,but also bear the risk of a certain degree of location privacy disclosure.An attacker can obtain the user's sensitive information such as user's identity,privacy and other sensitive information according to the user's location information.Therefore,based on the location of the privacy protection technology research is imperative,this article try to protect the mobile user location in the K nearest neighbor(K-nearest neighbor,KNN)query.The commonly used algorithm of location protection privacy are k-anonymous location privacy protection and Space Twist,but both of them have their advantages and disadvantages.Traditional K-anonymity algorithm is not reliable in third party anonymous servers,and the basic Space Twist algorithm may lead to excessive communication overhead.Taking the shortcomings of the above algorithm in the existing technology into account,this article makes the following work:a.This article proposes a new third party anonymous server framework based on the analysis of the features of the current framework,the new framework avoids risk of attacks of third-party servers and the disclosure of user information,but it also solves the problem of third party anonymous server computational bottleneck to a certain extent.It allocates a certain amount of calculation to the mobile device.b.On the basis of the new framework,this article combined the K-anonymity algorithm with Space Twist algorithm in the K nearest neighbor query.And focused on the generation algorithm of K-anonymous area puts forward anonymously area generation algorithm which has more ability to resist attacks.The communication overhead and error rate of Space Twist can be deeply improved.This article presents improvement program Space Twist with the granular search technique on the basis of Space Twist Algorithm,and Delaying Termination technique is added to offers more personalized protection.c.The experiments' results show that the ability of K-anonymous area generation improved algorithm is better than the traditional K-algorithm in resisting the attack of anonymous.In contrast to the performance of the Space Twist with the granular search technique and the basis Space Twist,the former has more advantages in communication overhead and error rate.Based on the study of the existing LBS protection technology,this article proposes the improved location privacy protection framework,and on the basis of this framework K-anonymous algorithm is proposed and Space Twist combination strategy.At the same time,according to the K-anonymous algorithm and the traditional Space Twist algorithm,an improved scheme is proposed,through the contrast can be concluded that the improved algorithm of K-anonymous has more advantages in the ability to resist attacks than the original algorithm,the improved Space Twist is more superior than original Space Twist algorithm in reduce communication overhead and less error rate.
Keywords/Search Tags:Location Privacy Protection, K nearest neighbors query, K-nonymous algorithm, SpaceTwist
PDF Full Text Request
Related items