[1]杜剛,張磊,馬春光,等.基于屬性基隱私信息檢索的位置隱私保護方法[J].哈爾濱工程大學學報,2021,42(5):680-686.[doi:10.11990/jheu.201912032]
 DU Gang,ZHANG Lei,MA Chunguang,et al.Location privacy protection method based on attribute-based privacy information retrieval[J].Journal of Harbin Engineering University,2021,42(5):680-686.[doi:10.11990/jheu.201912032]
點擊復制

基于屬性基隱私信息檢索的位置隱私保護方法(/HTML)
分享到:

《哈爾濱工程大學學報》[ISSN:1006-6977/CN:61-1281/TN]

卷:
42
期數:
2021年5期
頁碼:
680-686
欄目:
出版日期:
2021-05-05

文章信息/Info

Title:
Location privacy protection method based on attribute-based privacy information retrieval
作者:
杜剛1 張磊12 馬春光3 張國印1
1. 哈爾濱工程大學 計算機科學與技術學院, 黑龍江 哈爾濱 150001;
2. 佳木斯大學 信息電子技術學院, 黑龍江 佳木斯 154007;
3. 山東科技大學 計算機科學與工程學院, 山東 青島 266590
Author(s):
DU Gang1 ZHANG Lei12 MA Chunguang3 ZHANG Guoyin1
1. College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China;
2. College of Information and Electronic Technology, Jiamusi University, Jiamusi 154007, China;
3. College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China
關鍵詞:
基于位置服務隱私保護索引隱私信息檢索屬性基加密算法秘密計算零信息泄露屬性隱藏形式化證明
分類號:
TP309.2
DOI:
10.11990/jheu.201912032
文獻標志碼:
A
摘要:
針對基于位置服務隱私保護中以索引為主的隱私信息檢索策略在處理時間和用戶屬性保護方面的不足,提出了一種屬性基隱私信息檢索的位置隱私保護方法。該方法基于屬性基加密算法結合位置服務的本質特征,通過用戶與位置服務器之間的兩方秘密計算,完成了零信息泄露的位置服務查詢與反饋。最后,給出了形式化的安全性分析和性能評估,從理論上證明了所提出方法的有效性與可用性。同時,通過與同類算法在隱私保護能力和算法效率方面比較實驗,進一步驗證了所提出的方法的優越性。

參考文獻/References:

[1] 張學軍, 桂小林, 伍忠東. 位置服務隱私保護研究綜述[J]. 軟件學報, 2015, 26(9):2373-2395, DOI:10.13328/j.cnki.jos.004857.ZHANG Xuejun, GUI Xiaolin, WU Zhongdong. Privacy preservation for location-based services:a survey[J]. Journal of software, 2015, 26(9):2373-2395, DOI:10.13328/j.cnki.jos.004857.
[2] 張磊, 馬春光, 楊松濤, 等. 抗軌跡差異識別攻擊的相似軌跡實時生成方法[J]. 哈爾濱工程大學學報, 2017, 38(7):1173-1178, DOI:10.11990/jheu.201605070. ZHANG Lei, MA Chunguang, YANG Songtao, et al. Real-time similar trajectory generation algorithm for resisting trajectory difference identification attack[J]. Journal of Harbin Engineering University, 2017, 38(7):1173-1178, DOI:10.11990/jheu.201605070.
[3] ZHANG Lei, YANG Songtao, LI Jing, et al. A particle swarm optimization clustering-based attribute generalization privacy protection scheme[J]. Journal of circuits, systems and computers, 2018, 27(11):1850179, DOI:10.1142/S0218126618501797.
[4] ZHANG Lei, HE Lili, LIU Desheng, et al. An attribute generalization mix-zone without privacy leakage[J]. IEEE access, 2019, 7:57088-57099, DOI:10.1109/ACCESS.2019.2898996.
[5] ZHANG Lei, MA Chunguang, YANG Songtao, et al. Probability indistinguishable:a query and location correlation attack resistance scheme[J]. Wireless personal communications, 2017, 97(4):6167-6187, DOI:10.1007/s11277-017-4833-8.
[6] 張磊, 馬春光, 楊松濤, 等. 面向路網環境速度預測攻擊的隱私保護[J]. 西安交通大學學報, 2017, 51(2):27-32, 110, DOI:10.7652/xjtuxb201702005. ZHANG Lei, MA Chunguang, YANG Songtao, et al. A privacy preserving method from attacks of velocity prediction in road network[J]. Journal of Xi’an Jiaotong University, 2017, 51(2):27-32, 110, DOI:10.7652/xjtuxb 201702005.
[7] LI Zengpeng, WANG Ding. Achieving one-round password-based authenticated key exchange over lattices[J]. IEEE transactions on services computing, 2019, 12(8):1-14, DOI:10.1109/TSC.2019.2939836.
[8] 于金霞, 楊超超, 楊麗偉, 等. 理想格上支持訪問樹的屬性基加密方案[J]. 重慶郵電大學學報(自然科學版), 2019, 31(01):113-119.YU Jinxia,YANG Chaochao,YANG Liwei,et al. Attribute-based encryption scheme supporting tree access structure on ideal lattices[J]. Journal of Chongqing University of Posts and Telecommunications(natural science edition), 2019, 31(01):113-119.
[9] LI Weihao, NIU Ben, CAO Jin, et al. A personalized range-sensitive privacy-preserving scheme in LBSs[J]. Concurrency and computation:practice and experience, 2020, 32(5):e5462, DOI:10.1002/cpe.5462.
[10] KHOSHGOZARAN A, SHAHABI C, SHIRANI-MEHR H. Location privacy:going beyond K-anonymity, cloaking and anonymizers[J]. Knowledge and information systems, 2011, 26(3):435-465, DOI:10.1007/s10115-010-0286-z.
[11] 田華, 何翼. 基于二分關聯圖的大數據隱私保護方法[J]. 重慶郵電大學學報(自然科學版), 2020, 32(04):673-680. TIAN Hua,HE Yi. Group big data privacy protection based on binary association graph[J]. Journal of Chongqing University of Posts and Telecommunications(natural science edition), 2020, 32(04):673-680.
[12] WIGHTMAN P M, ZURBARAN M, RODRIGUEZ M, et al. MaPIR:mapping-based private information retrieval for location privacy in LBISs[C]//Proceedings of 2013 38th Annual IEEE Conference on Local Computer Networks-Workshops. Sydney, NSW, Australia, 2013:964-971, DOI:10.1109/LCNW.2013.6758539.
[13] 楊松濤, 馬春光. 隨機匿名的位置隱私保護方法[J]. 哈爾濱工程大學學報, 2015, 36(3):374-378. YANG Songtao, MA Chunguang. Random anonymity method for location privacy protection[J]. Journal of Harbin Engineering University, 2015, 36(3):374-378.
[14] LAI Jianchang, MU Yi, GUO Fuchun, et al. Privacy-enhanced attribute-based private information retrieval[J]. Information sciences, 2018, 454-455:275-291, DOI:10.1016/j.ins.2018.04.084.
[15] HU Haibo, XU Jianliang, XU Xizhong, et al. Private search on key-value stores with hierarchical indexes[C]//Proceedings of 2014 IEEE 30th International Conference on Data Engineering. Chicago, IL, USA, 2014:628-639, DOI:10.1109/ICDE.2014.6816687.
[16] YI Xun, PAULET R, BERTINO E, et al. Practical approximate k nearest neighbor queries with location and query privacy[J]. IEEE transactions on knowledge and data engineering, 2016, 28(6):1546-1559, DOI:10.1109/TKDE.2016.2520473.
[17] 張磊, 馬春光, 楊松濤, 等. 基于屬性基加密的用戶協作連續查詢隱私保護策略[J]. 通信學報, 2017, 38(9):76-85, DOI:10.11959/j.issn.1000-436x.2017184. ZHANG Lei, MA Chunguang, YANG Songtao, et al. CP-ABE based users collaborative privacy protection scheme for continuous query[J]. Journal on communications, 2017, 38(9):76-85, DOI:10.11959/j.issn.1000-436x.2017184.
[18] RYSCHKA S, MURAWSKI M, BICK M. Location-based services[J]. Business & information systems engineering, 2016, 58(3):233-237, DOI:10.1007/s12599-016-0430-8.

相似文獻/References:

[1]仲紅,孫彥飛,燕飛飛,等.保護私有信息幾何對象的相對位置計算[J].哈爾濱工程大學學報,2011,(04):458.[doi:doi:10.3969/j.issn.1006-7043.2011.04.011]
 ZHONG Hong,SUN Yanfei,YAN Feifei,et al.Privacy preserving relative position calculation protocols for spatial geometric objects[J].Journal of Harbin Engineering University,2011,(5):458.[doi:doi:10.3969/j.issn.1006-7043.2011.04.011]
[2]楊高明,楊靜,張健沛.半監督聚類的匿名數據發布[J].哈爾濱工程大學學報,2011,(11):1489.[doi:doi:10.3969/j.issn.1006-7043.2011.11.017]
 YANG Gaoming,YANG Jing,ZHANG Jianpei.Semi-supervised clustering-based anonymous data publishing[J].Journal of Harbin Engineering University,2011,(5):1489.[doi:doi:10.3969/j.issn.1006-7043.2011.11.017]
[3]魏占禎,楊亞濤,陳志偉.RSA乘法同態的數據庫密文檢索實現[J].哈爾濱工程大學學報,2013,(05):641.[doi:10.3969/j.issn.10067043.201206052]
[4]張冰,楊靜,張健沛,等.面向聚類分析的鄰域拓撲勢熵數據擾動方法[J].哈爾濱工程大學學報,2014,(09):1149.[doi:10.3969/j.issn.1006-7043.201311034]
 ZHANG Bing,YANG Jing,ZHANG Jianpei,et al.A neighborhood topological potential entropy data perturbation method for clustering analysis[J].Journal of Harbin Engineering University,2014,(5):1149.[doi:10.3969/j.issn.1006-7043.201311034]
[5]劉振華,李賓,白翠翠.可驗證的凸二次規劃安全外包協議[J].哈爾濱工程大學學報,2016,37(09):1307.[doi:10.11990/jheu.201507003]
 LIU Zhenhua,LI Bin,BAI Cuicui.Verifiable and secure outsourcing protocol for convex quadratic programming[J].Journal of Harbin Engineering University,2016,37(5):1307.[doi:10.11990/jheu.201507003]
[6]徐東,李賢,張子迎,等.面向聚類挖掘的個性化隱私保護算法[J].哈爾濱工程大學學報,2018,39(11):1779.[doi:10.11990/jheu.201707097]
 XU Dong,LI Xian,ZHANG Ziying,et al.Research on a personalized privacy protection method for cluster mining[J].Journal of Harbin Engineering University,2018,39(5):1779.[doi:10.11990/jheu.201707097]
[7]楊高明,龔晨,方賢進,等.面向頻繁序列的局部差分隱私保護研究[J].哈爾濱工程大學學報,2019,40(11):1903.[doi:10.11990/jheu.201812051]
 YANG Gaoming,GONG Chen,FANG Xianjin,et al.Local differential privacy protection for frequent sequence mining[J].Journal of Harbin Engineering University,2019,40(5):1903.[doi:10.11990/jheu.201812051]
[8]楊松濤,馬春光.隨機匿名的位置隱私保護方法[J].哈爾濱工程大學學報,2015,(03):374.[doi:10.3969/j.issn.1006-7043.201311024]
 YANG Songtao,MA Chunguang.Random anonymity method for location privacy protection[J].Journal of Harbin Engineering University,2015,(5):374.[doi:10.3969/j.issn.1006-7043.201311024]
[9]張磊,馬春光,楊松濤,等.抗軌跡差異識別攻擊的相似軌跡實時生成方法[J].哈爾濱工程大學學報,2017,38(07):1173.[doi:10.11990/jheu.201605070]
 ZHANG Lei,MA Chunguang,YANG Songtao,et al.Real-time similar trajectory generation algorithm for resisting trajectory difference identification attack[J].Journal of Harbin Engineering University,2017,38(5):1173.[doi:10.11990/jheu.201605070]
[10]王斌,張國印,張磊.查詢分割的用戶協作隱私保護方法[J].哈爾濱工程大學學報,2020,41(4):569.[doi:10.11990/jheu.201812094]
 WANG Bin,ZHANG Guoyin,ZHANG Lei.A user collaborative privacy protection scheme based on query division[J].Journal of Harbin Engineering University,2020,41(5):569.[doi:10.11990/jheu.201812094]

備注/Memo

備注/Memo:
收稿日期:2019-12-17。
基金項目:國家自然科學基金項目(61932005,U1936112);中國博士后基金項目(2019M661260);黑龍江省自然科學基金項目(YQ2019F018,LH2019F011).
作者簡介:杜剛,男,講師,博士研究生;張磊,男,副教授,博士.
通訊作者:張磊,E-mail:8213662@163.com.
更新日期/Last Update: 2021-04-26
看真人视频a级毛片