Track privacy protection method based on k anonymity

A privacy protection and trajectory technology, applied in location-based services, electrical components, wireless communications, etc.

Active Publication Date: 2020-10-20
JINAN UNIVERSITY
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[Real-time generation method of similar trajectory against trajectory difference recognition attack[J].Journal of Harbin Engineering University, 2017,38(07):1173-1178.] proposed a false trajectory privacy protection method, through the original trajectory of the user Adding a false trajectory similar to the user's original trajectory to confuse the user's original trajectory, but this method will still expose the user's overall travel trend, and then expose the user's travel trajectory, although it does not reveal the user's accurate trajectory , but still exposes its general direction of travel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Track privacy protection method based on k anonymity
  • Track privacy protection method based on k anonymity
  • Track privacy protection method based on k anonymity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] The technical solution of the present invention mainly includes three elements: user equipment, anonymous server and LBS server. Each element communicates through the communication equipment provided by the mobile operator. The user equipment is mainly responsible for forming a location generalization area, screening the results it needs, and forming query information; the LBS server is responsible for anonymously forwarding the query information sent by the user equipment to the The LBS server sends the query results of the LBS server to the corresponding users; the LBS server provides accurate query results for user queries.

[0050] The method of the present invention includes six stages of system initialization, location generalization, multi-destination selection, anonymous forwarding, multi-path generation and temporary query. Among them, in the system initialization phase, the user registers with the LBS server, the LBS server sends the location cache to the regi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a track privacy protection method based on k anonymity, which comprises the following steps that: user equipment applies to an LBS (Location Based Service) server for registration, and the LBS server sends a position cache to the user equipment; a plurality of data for obfuscating the real position of the user are selected from a position cache database according to the position of the user to form a position generalization area; a plurality of false destinations are calculated by using the Manhattan distance; a query set containing multiple paths is generated accordingto the position of the user and the real destination and the false destination of the user; the query set is sent to an anonymous server; the anonymous server anonymously forwards the query set to the LBS server; and the LBS server sends the route corresponding to each request to the user according to the query request of the user, and the user screens out the required route. According to the invention, the track privacy of the user can be effectively protected, the use experience of the user is improved, the communication overhead is reduced, and the customized privacy protection experienceis provided.

Description

technical field [0001] The invention relates to the field of location privacy protection, in particular to a k-anonymity-based trajectory privacy protection method. Background technique [0002] The development of smart devices has made people's lives more convenient. Location Based Service (LBS) has also entered people's lives with the development of smart devices and has become an indispensable part of people's lives. Location-based services provide users with functions such as point-of-interest retrieval and navigation planning, which enrich people's lives and provide convenience for people's lives. However, as users use location-based services more and more frequently, a large amount of user query information is exposed to the Internet, increasing the risk of privacy information leakage. [0003] During a query, the user's information is uploaded to the LBS server, and the attacker uses certain vulnerabilities to obtain the user's location and even query content. After...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W4/02
CPCH04W12/02H04W4/02Y02D30/70
Inventor 史秀黄斐然刘志全田美金李宇娴黄昱铭
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products