透過您的圖書館登入
IP:18.223.160.61
  • 學位論文

高效率之適地性服務隱私保護機制

An Efficient Privacy Protection Scheme for Location-Based Service

指導教授 : 雷欽隆

摘要


自從適地性服務被提出之後,地點隱私保護的機制也被廣泛地研究。然而大多數的機制因為像是使用錯誤的假設、提高伺服器負擔或降低服務品質等原因,並沒法辦法真正的實作出來。SpaceTwist[1]是一個原創且有效率的地點隱私保護的模型。根基於它的概念,在這篇論文中我們進一步地提出效率更高並且同時花費更低的地點隱私保護模型。其中主要的差別在於,(i)在用戶端的演算法中新增一條終止的條件,(ii)同步要求距離與網格邊長的S策略。我們使用來實際的資料庫來執行模擬,而其結果令人滿意。

並列摘要


Since location-based service (LBS) was proposed, the location privacy protection schemes are wildly researched. However, because of many reasons such as making unrealistic assumption, incurring high server load or degrading quality of service, there are few schemes can be further practically implemented. A newly proposed location privacy protection scheme, named SpaceTwist [1], is novel as well as effective. Based on its concept, we propose an efficient way for location-based service privacy protection scheme in this thesis. The major differences are (i) maximum restriction termination condition in client-side algorithm and (ii) S-strategy for setting proper query distance and cell extent. We run our simulation in real POI (Point of Interest) datasets derived from Google local search API (Application Programming Interface) and the results is desirable.

參考文獻


[1] M.-L Yiu, C.S. Jensen, and X. Huang, H. Lu; “SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services,” IEEE 24th International Conference on Data Engineering, pp.366-375, 2008.
[2] A.R. Beresford and F. Stajano; “Mix Zones: User Privacy in Location-Aware Services,” Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp.127-131, 2004.
[5] H. Kido, Y. Yanagisawa, and T. Satoh; “An Anonymous Communication Technique using Dummies for Location-Based Services,” Proc. of the 2nd international conference on pervasive services, pp. 88-97, 2005.
[6] M. Duckham and L. Kulik; “A Formal Model of Obfuscation and Negotiation for Location Privacy,” LNCS, vol. 3468, pp.152-170, 2005.
[7] M. Duckham and L. Kulik; “Simulation of Obfuscation and Negotiation for Location Privacy,” LNCS, vol. 3693, pp. 33-48, 2005.

延伸閱讀