Research on k-anonymity privacy protection scheme based on bilinear pairings

被引:1
|
作者
Song Cheng [1 ]
Zhang Yadong [1 ]
Wang Lei [1 ]
Liu Zhizhong [1 ]
机构
[1] College of Computer Science and Technology ( Software College) ,Henan Polytechnic University
基金
中国国家自然科学基金;
关键词
location-based services(LBS); bilinear pairings; k-anonymity; privacy protection;
D O I
10.19682/j.cnki.1005-8885.2018.0021
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is proposed. In circular region of Euclidian distance,mobile terminal evenly generates some false locations,from which half optimal false locations are screened out according to position entropy,location and mapping background information. The anonymity obtains the effective guarantee,so as to realize privacy protection. Through security analyses,the scheme is proved not only to be able to realize such security features as privacy,anonymity and nonforgeability,but also able to resist query tracing attack. And the result of simulation shows that this scheme not only has better evenness in selecting false locations,but also improves efficiency in generating and selecting false nodes.
引用
收藏
页码:12 / 19
页数:8
相关论文
共 50 条
  • [1] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [2] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu, Hai
    Li, Xing-Hua
    Luo, Bin
    Wang, Yun-Wei
    Ren, Yan-Bing
    Ma, Jian-Feng
    Ding, Hong-Fa
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
  • [3] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [4] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [5] Enhanced k-anonymity Privacy Protection Scheme in Continuous LBS Queries
    Wang, Wei
    Zhao, Wen-Hong
    Cheng, Zhong
    Li, Xing-Hua
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 289 - 293
  • [6] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    [J]. 2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [7] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [8] A trusted de-swinging k-anonymity scheme for location privacy protection
    Manxiang Yang
    Baopeng Ye
    Yuling Chen
    Tao Li
    Yixian Yang
    Xiaobin Qian
    Xiaomei Yu
    [J]. Journal of Cloud Computing, 11
  • [9] A trusted de-swinging k-anonymity scheme for location privacy protection
    Yang, Manxiang
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    Yu, Xiaomei
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [10] Conditional privacy protection authentication scheme based on bilinear pairings for vanet
    Cheng, Song
    Xin’An, Gu
    Yuan, Ping
    Yadong, Zhang
    [J]. Journal of China Universities of Posts and Telecommunications, 2020, 27 (01): : 62 - 71