《山东大学学报(理学版)》 ›› 2018, Vol. 53 ›› Issue (11): 35-50.doi: 10.6040/j.issn.1671-9352.0.2018.128
Hai-yan KANG1(),Wan-xiang ZHU2
摘要:
隐私的泄露问题不仅包含用户提交的位置和查询数据,更是包含了其中隐藏的用户身份、兴趣爱好、社会习惯、行为模式等。对位置服务隐私保护的技术进行综述,介绍了位置服务的应用场景、位置隐私的攻击方法。对现有的隐私保护体系结构和保护技术进行整理归纳。对未来的研究进行了展望,并提出一种基于缓存的时空扰动方法和LBS隐私保护度量假设方案。
中图分类号:
1 | PRITI Jagwani , SAROJ Kaushik . Privacy in location based services: protection strategies, attack models and open challenges[M]. Singapore: Springer, 2017. |
2 |
KIM J S , LI K J . Location K-anonymity in indoor spaces[J]. Geoinformatica, 2016, 20 (3): 415- 451.
doi: 10.1007/s10707-015-0241-y |
3 |
PAN X , XU J , MENG X . Protecting location privacy against location-dependent attacks in mobile services[J]. Knowledge and Data Engineering, 2012, 24 (8): 1506- 1519.
doi: 10.1109/TKDE.2011.105 |
4 | XUE A Y, ZHANG R, ZHENG Y, et al. Destination prediction by sub-trajectory synthesis and privacy protection against such prediction[C]// Data Engineering(ICDE), 2013 IEEE 29th International Conference.[S.l.]: IEEE, 2013: 254-265. |
5 | 乔少杰, 金琨, 韩楠, 等. 一种基于高斯混合模型的轨迹预测算法[J]. 软件学报, 2015, 26 (5): 1048- 1063. |
QIAO Shaojie , JIN Kun , HAN Nan , et al. Trajectory prediction algorithm based on Gaussian mixture model[J]. Journal of Software, 2015, 26 (5): 1048- 1063. | |
6 | SHOKRI R, THEODORAKOPOULOS G, LE BOUDEC J Y, et al. Quantifying location privacy[C]// Security and Privacy(SP), IEEE Symposium.[S.l.]: IEEE, 2011: 247-262. |
7 | THEODORAKOPOULOS G. The same-origin attack against location privacy[C]// Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society(WPES'15). Denver: [s.n.], 2015: 49-53. |
8 | LIU F Y, HUA K A, CAI Y. Query l-diversity in location-based services[C]// Mobile Data Management: Systems, Services and Middleware. Tenth International Conference on IEEE.[S.l.]: IEEE, 2009: 436-442. |
9 | 吴雷, 潘晓, 朴春慧, 等. 基于位置服务中防止敏感同质性攻击的个性化隐私保护[J]. 计算机应用, 2014, 34 (8): 2356- 2360. |
WU Lei , PAN Xiao , PIAO Chunhui , et al. Personalized privacy preservation against sensitive homogeneity attack in location-based services[J]. Journal of Computer Applications, 2014, 34 (8): 2356- 2360. | |
10 | PAN X, MENG X, XU J. Distortion-based anonymity for continuous queries in location-based mobile services[C]// Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York: ACM, 2009: 256-265. |
11 | Internet Engineering Task Force(IETF). Geographic location/privacy (geopriv)[EB/OL]. (2014-4-20)[2016-3-30]. http://datatracker.ietf.org/wg/geopriv/charter/ |
12 | World Wide Web Consortium(W3C). Platform for privacy preferences(P3P) project.[EB/OL]. (2007-11-20)[2016-3-30]. http://www.w3.org/P3P |
13 | GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[C]// Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. New York: ACM, 2003: 31-42. |
14 | MOKBEL M F, CHOW C Y, AREF W G. The new Casper: query processing for location services without com-promising privacy[C]// Proc. of the 32nd Int'l Conf. on Very Large Data Bases. Seoul: VLDB Endowment, 2006: 763-774. |
15 |
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. Mobile Computing, IEEE Transactions on, 2008, 7 (1): 1- 18.
doi: 10.1109/TMC.2007.1062 |
16 |
KALNIS P , GHINITA G , MOURATIDIS K , et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19 (12): 1719- 1733.
doi: 10.1109/TKDE.2007.190662 |
17 | HUO Z, MENG X F, HU H B, et al. You can walk alone: trajectory privacy-preserving through significant stays protection[C]// Proceedings of the 17th International Conference on Database Systems for Advanced Applications. Busan: ACM, 2012. |
18 | GAO S , MA J F , SUN C , et al. Balancing trajectory privacy and data utility using a personalized anonymization model[J]. Journal of Network and Computer Applications, 2014, 38 (1): 125- 134. |
19 | 吴英杰, 唐庆明, 倪巍伟, 等. 基于聚类杂交的隐私保护轨迹数据发布算法[J]. 计算机研究与发展, 2013, 50 (3): 578- 593. |
WU Yingjie , TANG Qingming , NI Weiwei , et al. A clustering hybrid based algorithm for privacy preserving trajectory data publishing[J]. Journal of Computer Research and Development, 2013, 50 (3): 578- 593. | |
20 | 王超, 杨静, 张健沛. 基于轨迹位置形状相似性的隐私保护算法[J]. 通信学报, 2015, 36 (2): 144- 157. |
WANG Chao , YANG Jing , ZHANG Jianpei . Privacy preserving algorithm based on trajectory location and shape similarity[J]. Journal on Communications, 2015, 36 (2): 144- 157. | |
21 | 王超, 杨静, 张健沛. 基于轨迹特征及动态邻近性的轨迹匿名方法研究[J]. 自动化学报, 2015, 41 (2): 330- 341. |
WANG Chao , YANG Jing , ZHANG Jianpei . Research on trajectory privacy preserving method based on trajectory characteristics and dynamic proximity[J]. Journal of automation, 2015, 41 (2): 330- 341. | |
22 | 李婕,白志宏,于瑞云,等.基于PSO优化的移动位置隐私保护算法[J/OL]. [2018-04-15].计算机学报, 2017, 40: 1-15. |
LI Jie, Bai Zhihong, YU Ruiyun, et al. Mobile location privacy protection algorithm based on PSO optimization[J/OL]. [2018-04-15]. Chinese Journal of Computers, 2017, 40: 1-15. | |
23 | 李成龙, 吕鑫, 李鑫. 抗基于历史轨迹预测攻击的动态K-匿名算法[J]. 计算机工程与应用, 2018, 54 (2): 119- 124. |
LI Chenglong , LYU Xin , LI Xin . Dynamic K-anonymity algorithm for resisting prediction attack based on historical trajectories[J]. Computer Engineering and Applications, 2018, 54 (2): 119- 124. | |
24 | 林邓伟,王云峰.一种基于用户真实轨迹的虚假轨迹生成方法[J/OL].计算机工程, https://doi.org/10.19678/j.issn.1000-3428.0049930 |
LIN Dengwei, WANG Yunfeng. Generating dummy trajectory in location privacy-preserving based on user's real trajectory[J/OL]. Computer Engineering, https://doi.org/10.19678/j.issn.1000-3428.0049930 | |
25 |
PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015, 14 (3): 495- 508.
doi: 10.1109/TMC.2014.2321747 |
26 | PALANISAMY B, LIU L. Mobimix: protecting location privacy with mix-zones over road networks[C]// Proceedings of the 27th International Conference on Data Engineering. Hannover: IEEE, 2011: 494-505. |
27 |
PALANISAMY B , LIU L . Effective mix-zone anonymization techniques for mobile travelers[J]. GeoInformatica, 2014, 18 (1): 135- 164.
doi: 10.1007/s10707-013-0194-y |
28 | LIU X, ZHAO H, PAN M, et al. Traffic-aware multiple mix zone placement for protecting location privacy[C]// Proceedings of the 31th Annual IEEE Int'l Conf. on Computer Communications. Piscataway: IEEE, 2012: 972-980. |
29 | LIU X, LI X. Privacy Preserving Techniques for Location Based Services in Mobile Networks[C]// Parallel and Distributed Processing Symposium Workshops & Phd Forum.[S.l.]: IEEE, 2012: 2474-2477. |
30 |
SUN Y , ZHANG B , ZHAO B , et al. Mix-zones optimal deployment for protecting location privacy in VANET[J]. Peer-to-Peer Networking and Applications, 2015, 8 (6): 1108- 1121.
doi: 10.1007/s12083-014-0269-z |
31 | NIU B, LI Q, ZHU X, et al. Achieving k-anonymity in privacy-aware location-based services[C]// IEEE INFOCOM2014-IEEE Conference on Computer Communications.[S.l.]: IEEE, 2014: 754-762. |
32 | PINGLERY A, ZHANG N, FU X, et al. Protection of query privacy for continuous location based services[C]// INFOCOM, 2011 Proceedings IEEE.[S.l.]: IEEE, 2011: 1710-1718. |
33 | LU H, JENSEN C S, YIU M L. Pad: privacy-area aware, dummy-based location privacy in mobile services[C]// Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access. New York: ACM, 2008: 16-23. |
34 |
SHIN K G , JU X , CHEN Z , et al. Privacy protection for users of location-based services[J]. IEEE Wireless Communications, 2012, 19 (1): 30- 39.
doi: 10.1109/MWC.2012.6155874 |
35 | YIU M L , JENSEN C S , MOLLER J , et al. Design and analysis of a ranking approach to private location-based services[J]. ACM Transactions on Database Systems(TODS), 2011, 36 (2): 10. |
36 | ZHOU C, MA C, YANG S, et al. A location privacy preserving method based on sensitive diversity for LBS[M]// Network and Parallel Computing. Berlin: Springer, 2014: 409-422. |
37 | NIU B, ZHANG Z, LI X, et al. Privacy-area aware dummy generation algorithms for Location-Based services[C]// ICC 2014-2014 IEEE International Conference on Communications.[S.l.]: IEEE, 2014: 957-962. |
38 |
HARA T , SUZUKI A , IWATA M , et al. Dummy-Based user location anonymization under Real-World constraints[J]. IEEE Access, 2016, 4: 673- 687.
doi: 10.1109/ACCESS.2016.2526060 |
39 | DO H J, JEONG Y S, CHOI H J, et al. Another dummy generation technique in location-based services[C]// International Conference on Big Data and Smart Computing.[S.l.]: IEEE, 2016: 532-538. |
40 | ASSAM R, HASSANI M, SEIDL T. Differential private trajectory protection of moving objects[C]// Proceedings of the Third ACM SIGSPATIAL International Workshop on Geo Streaming. New York: ACM, 2012: 68-77. |
41 | CHEN R, FUNG B, DESAI B C, et al. Differentially private transit data publication: a case study on the montreal transportation system[C]// Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. New York: ACM, 2012: 213-221. |
42 | XIONG P, ZHU T, PAN L, et al. Privacy preserving in location data release: a differential privacy approach[C]// PRICAI 2014: Trends in Artificial Intelligence. Berlin: Springer, 2014: 183-195. |
43 | 王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014, 25 (4): 693- 712. |
WANG Lu , MENG Xiaofeng . Location privacy preservation in big data era: a survey[J]. Journal of Software, 2014, 25 (4): 693- 712. | |
44 | 张琳, 刘彦, 王汝传. 位置大数据服务中基于差分隐私的数据发布技术[J]. 通信学报, 2016, 37 (9): 46- 54. |
ZHANG Lin , LIU Yan , WANG Ruchuan . Location publishing technology based on differential privacy-preserving for big data services[J]. Journal on Communications, 2016, 37 (9): 46- 54. | |
45 | 吴云乘, 陈红, 赵素云, 等. 一种基于时空相关性的差分隐私轨迹保护机制[J]. 计算机学报, 2018, 41 (2): 309- 322. |
WU Yuncheng , CHEN Hong , ZHAO Suyun , et al. Differentially private trajectory protection based on spatial and temporal correlation[J]. Chinese Journal of Computers, 2018, 41 (2): 309- 322. | |
46 | 毕晓迪, 梁英, 史红周, 等. 一种基于隐私偏好的二次匿名位置隐私保护方法[J]. 山东大学学报(理学版), 2017, 52 (5): 75- 84. |
BI Xiaodi , LIANG Ying , SHI Hongzhou , et al. Aparameterized location privacy protection method based on two-level anonymity[J]. Journal of Shandong University(Natural Science), 2017, 52 (5): 75- 84. | |
47 | 马银方, 张琳. 基于差分隐私的LBS群组最近邻查询[J]. 计算机科学, 2017, 44 (S1): 336- 341. |
MA Yinfang , ZHANG Lin . LBS group nearest neighbor query method based on differential privacy[J]. Computer Science, 2017, 44 (S1): 336- 341. | |
48 | GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services: anonymizers are not necessary[C]// Proceedings of the 2008 ACM SIGMOD international conference on management of data. New York: ACM, 2008: 121-132. |
49 | PAPADOPOULOS S, BAKIRAS S, PAPADIAS D. Nearest neighbor search with strong location privacy[C]// Proceedings of the International Conference on Very Large Data Bases Endowment(VLDB'10).Singapore: Springer, 2010, 3(1): 619-629. |
50 |
PAPADOPOULOS S , BAKIRAS S , PAPADIAS D . pCloud: a distributed system for practical PIR[J]. IEEE Trans Dependable Sec Comput, 2012, 9 (1): 115- 127.
doi: 10.1109/TDSC.2010.60 |
51 | YI X , KAOSAR M G , PAULET R , et al. Single-database private information retrieval from fully homomorphic encryption[J]. IEEE Transactions on Knowledge & Data Engineering, 2013, 25 (5): 1125- 1134. |
52 |
张峰, 倪巍伟. 基于伪随机数加密的保护位置隐私近邻查询方法[J]. 华东师范大学学报(自然科学版), 2015, (5): 128- 142.
doi: 10.3969/j.issn.1000-5641.2015.05.011 |
ZHANG Feng , NI Weiwei . Pseudo-random number encryption based location privacy preserving nearest neighbor querying[J]. Journal of East China Normal University(Natural Science), 2015, (5): 128- 142.
doi: 10.3969/j.issn.1000-5641.2015.05.011 |
|
53 | FUNG E, KELLARIS G, PAPADIAS D. Combining differential privacy and PIR for efficient strong location privacy[M]// Advances in Spatial and Temporal Databases. Springer International Publishing, 2015: 295-312. |
54 | RAO U P, GIRME H. A novel framework for privacy preserving in location based services[C]// Fifth International Conference on Advanced Computing & Communication Technologies. IEEE Computer Society, 2015: 272-277. |
55 | 张峰.基于PIR的保护位置隐私近邻查询技术研究[D].南京:东南大学, 2017. |
ZHANG Feng. Research on location privacy-preserving nearest neighbor query based PIR[D]. Nanjing: Southeast University, 2017. | |
56 |
KHOSHGOZARAN A , SHIRANI-MEHR H , SHAHABI C . Blind evaluation of location based queries using space transformation to preserve location privacy[J]. Geoinformatica, 2013, 17 (4): 599- 634.
doi: 10.1007/s10707-012-0172-9 |
57 | TIAN F , GUI X L , ZHANG X J , et al. Privacy-preserving approach for outsourced spatial data based on POI distribution[J]. Chinese Journal of Computer, 2014, 37 (1): 123- 138. |
58 | KIM H , HONG S , CHANG J . Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data[J]. Data & Knowledge Engineering, 2016, 104. |
59 | 梁慧超, 王斌, 崔宁宁, 等. 路网环境下兴趣点查询的隐私保护方法[J]. 软件学报, 2018, (3): 703- 720. |
LIANG Huichao , WANG Bin , CUI Ningning , et al. Privacy preserving method for point-of-interest query on road network[J]. Journal of Software, 2018, (3): 703- 720. | |
60 | 康海燕, 马跃雷. 差分隐私保护在数据挖掘中应用综述[J]. 山东大学学报(理学版), 2017, 52 (3): 16- 23, 31. |
KANG Haiyan , MA Yuelei . Survey on application of data mining via differential privacy[J]. Journal of Shandong University(Natural Science), 2017, 52 (3): 16- 23, 31. |
[1] | 李艳平,齐艳姣,张凯,魏旭光. 支持用户撤销的多授权机构的属性加密方案[J]. 山东大学学报(理学版), 2018, 53(7): 75-84. |
[2] | 康海燕,黄渝轩,陈楚翘. 基于视频分析的地理信息隐私保护方法[J]. 山东大学学报(理学版), 2018, 53(1): 19-29. |
[3] | 毕晓迪,梁英,史红周,田辉. 一种基于隐私偏好的二次匿名位置隐私保护方法[J]. 山东大学学报(理学版), 2017, 52(5): 75-84. |
[4] | 康海燕,马跃雷. 差分隐私保护在数据挖掘中应用综述[J]. 山东大学学报(理学版), 2017, 52(3): 16-23. |
[5] | 查明明,王伟. FlowMonitor: Android隐私数据流向监控防护系统[J]. 山东大学学报(理学版), 2016, 51(9): 59-67. |
[6] | 柳欣,徐秋亮,张波. 满足可控关联性的合作群签名方案[J]. 山东大学学报(理学版), 2016, 51(9): 18-35. |
[7] | 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91. |
[8] | 蔡红云,马晓雪. 在线社会网络中基于关系强度的访问控制机制[J]. 山东大学学报(理学版), 2016, 51(7): 90-97. |
[9] | 康海燕, 杨孔雨, 陈建明. 基于K-匿名的个性化隐私保护方法研究[J]. 山东大学学报(理学版), 2014, 49(09): 142-149. |
[10] | 杨松涛, 马春光, 周长利, 张宗利. 一种地理围栏服务中的LBS隐私保护方法[J]. 山东大学学报(理学版), 2014, 49(09): 69-73. |
[11] | 蔡红云, 田俊峰. 云计算中的数据隐私保护研究[J]. 山东大学学报(理学版), 2014, 49(09): 83-89. |
[12] | 赵泽茂1,李林1,张帆1,2,张品1,周建钦1,王家波1. 基于分散子匿名区域的位置隐私保护方法[J]. J4, 2013, 48(7): 56-61. |
[13] | 赵泽茂1,刘洋1,张帆1,2,周建钦1,张品1. 基于角度和概率的WSN源位置隐私保护路由研究[J]. J4, 2013, 48(09): 1-9. |
[14] | 景旭1,2,3, 何东健1*. 无完全可信PKG身份签名的分层CES方案[J]. J4, 2012, 47(9): 7-14. |
[15] | 高枫1,何泾沙2. 基于信任和信息流模型的隐私保护方法[J]. J4, 2011, 46(5): 39-43. |
|