Location privacy protection method for social vehicle networking based on double k-anonymity

A privacy protection, social car technology, applied in the field of location privacy protection of social vehicle networking based on double k-anonymity, can solve problems such as high computational complexity and overhead, unsatisfactory location privacy protection effect, and limited degree of location privacy protection. , to achieve effective location privacy protection and reduce the probability of guessing

Active Publication Date: 2022-07-26
HENAN UNIV OF SCI & TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing location privacy protection methods based on user behavior information have high computational complexity and overhead, and may affect the quality of services enjoyed by users. Therefore, the location privacy protection effect of such methods is not ideal
In addition, although the location privacy protection technology based on the user relationship network can guarantee the quality of service obtained by the user, the degree of protection of the user's location privacy is limited.
The last is the location privacy protection method based on user attribute information. By changing the user ID to achieve the purpose of protecting location privacy, compared with the above two types of methods, it does not affect the service quality required by the user and does not require complicated calculations. The user's location privacy protection is limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Location privacy protection method for social vehicle networking based on double k-anonymity
  • Location privacy protection method for social vehicle networking based on double k-anonymity
  • Location privacy protection method for social vehicle networking based on double k-anonymity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] figure 1 This is a specific implementation flow chart of the method for protecting the location privacy of the social vehicle networking based on double k-anonymity of the present invention. like figure 1 As shown, the specific steps of the present invention based on the double k-anonymous social vehicle networking location privacy protection method include:

[0028] S101: Set up cloud server:

[0029] figure 2 It is a schematic diagram of the setting of the cloud server in the present invention. like figure 2 As shown, in the present invention, a cloud server is set as a trusted third party, which is used to isolate the direct communication between the service provider and the user, and realize the bidirectional transmission of information, that is, collect the user-related information from the user and distribute the location service information to the user. , obtain location-based services from service providers and receive service feedback from service provid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting the location privacy of social vehicle networking based on double k-anonymity. First, a cloud server is set up as a trusted third party, vehicle users are constructed as user groups, and user IDs, locations and service requests are collected, The location and the request set are randomly scrambled and recombined to construct a user data matrix, and then use the random matrix to encrypt the user data matrix. After the cloud server uses the encrypted user data to request related services from the service provider, after receiving the feedback After the location service information is located to the user ID, the service content is fed back to the corresponding user. The present invention uses the method of randomly scrambled user data and random matrix encryption to perform double k-anonymity on both user location and service request content, so as to reduce the correlation between user ID, location and service request and users, thereby reducing the accuracy of attackers. The probability of identifying the user can protect the privacy of the user's location.

Description

technical field [0001] The invention belongs to the technical field of Internet of Vehicles, and more particularly, relates to a method for protecting the location privacy of social Internet of Vehicles based on double k-anonymity. Background technique [0002] With the continuous development of science and technology, ordinary social networks can no longer meet the daily needs of users. In order to ensure the convenience and safety of the user's driving process, a network paradigm that combines the two types of Internet of Vehicles and social networks - the Social Internet of Vehicles came into being, and the intelligent networked car has become the carrier of the next mobile social network. After the car, the mobile phone social function is abandoned, and the communication device of the vehicle itself is used to complete the social interaction. Social Internet of Vehicles is a subset of the Internet of Vehicles. It uses intelligent connected vehicles in motion as nodes, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/033H04W12/02H04W4/21H04W4/40
CPCH04W12/02H04W4/21H04W4/40
Inventor 邢玲贾晓凡高建平吴红海
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products