Font Size: a A A

Research On The Privacy Protection Method Based On Location Service

Posted on:2019-08-28Degree:MasterType:Thesis
Country:ChinaCandidate:J H DuFull Text:PDF
GTID:2428330593950308Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet and the progress of science and technology,the location-based services have been widely integrated into the human life environment,facilitating People's Daily life.Nowadays,common LBS services such as navigation,search and real-time location sharing have been widely used in various sectors of society.People enjoying the LBS service provides convenient,also suffering from the risk of personal privacy,light Shadowed or harassment of life trivial problems,for example,or touch the social bottom line such as robbery crime and serious problems such as law,to ensure the safety of user information of the visible LBS and can provide the user service of recognition is a very has the research value of the subject.Based on the user in the real use of LBS service problems,depending on the scenario put forward two kinds of different protection scheme,used in the user location privacy protection in real life,the main work is as follows:1? in-depth study on the basic theory,system architecture and the privacy attack and scene of location-based service privacy protection technology.2? at present most of the existing location privacy protection technology of rules set to compare curing stiff,so this paper proposes a controllable method of privacy protection in the track users privacy protection,by adopting the method of k-means the original data set all of the data clustering,while eliminating the path length,and the user free to walk on the effect of anonymous set generated.The selection of k-anonymous set is accelerated and the anonymity of k-anonymous set is guaranteed.3? for K-anonymous,space,location privacy protection methods such as fuzzy anonymous attack and continuous queries against more vulnerable to reasoning,this paper puts forward a continuous query more attack resistance based on the location privacy of corvino figure nearest neighbor query algorithm,and puts forward a system model,on the two aspects of location privacy and query privacy guarantees the user information security.4? based on above two methods,respectively with that of the same type,same target comparison between several different location privacy protection methods,the experimental results show that the efficiency of the two methods,this paper security than in other contrast method is improved,and the methods of optimization are given direction.
Keywords/Search Tags:location-based services, Privacy protection, Location K-anonymous, Private information retrieval, The mobile communication
PDF Full Text Request
Related items