咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Trajectory Privacy Protectio... 收藏

A Trajectory Privacy Protection Method to Resist Long-Term Observation Attacks

A Trajectory Privacy Protection Method to Resist Long-Term Observation Attacks

作     者:Qixin Zhan Qixin Zhan

作者机构:School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China 

出 版 物:《Journal of Computer and Communications》 (电脑和通信(英文))

年 卷 期:2024年第12卷第5期

页      面:53-70页

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Location Privacy Long-Term Observation Attacks K-Anonymity Location Caching 

摘      要:Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exploited by opponents, greatly increasing the risk of trajectory privacy leakage. This attack method is called a long-term observation attack. On the premise of ensuring lower time overhead and higher cache contribution rate, the existing methods cannot utilize cache to answer subsequent queries while also resisting long-term observation attacks. So this article proposes a trajectory privacy protection method to resist long-term observation attacks. This method combines caching technology and improves the existing differential privacy mechanism, while incorporating randomization factors that are difficult for attackers to recognize after long-term observation to enhance privacy. Search for locations in the cache of both the mobile client and edge server that can replace the user’s actual location. If there are replacement users in the cache, the query results can be obtained more quickly. Simultaneously obfuscating the spatiotemporal correlation of actual trajectories by generating confusion regions. If it does not exist, the obfuscated location generation method that resists long-term observation attacks is executed to generate the real anonymous area and send it to the service provider. The above steps can comprehensively protect the user’s trajectory privacy. The experimental results show that this method can protect user trajectories from long-term observation attacks while ensuring low time overhead and a high cache contribution rate.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分