透過您的圖書館登入
IP:18.218.38.125
  • 學位論文

位置隱私權上的新混合式隱匿系統

A New Hybrid Cloaking System for Location Privacy

指導教授 : 劉傳銘

摘要


近年來,地理資訊查詢系統在行動裝置普遍化的影響下,民眾可以輕易的把握自己的位置資訊或是道路狀況,但相對來說,使用者在查詢自己位置資訊的過程中可能會被不肖份子截取位置而產生安全性上的問題。前人曾提出了增進查詢安全性的位置資訊隱匿方式,其一是把查詢資訊交給第三可信任的隱匿主機去做混淆;另一個則是將查詢資訊交給鄰近使用者代發查詢;然而也有人將此兩種隱匿方式組合成一個混合的系統,混合式隱匿系統可以提供完整的分散式隱匿方法,對集中式隱匿主機的負擔可以較過去低,而集中式方法的部分彌補分散式部分無法提供的可靠性,但此方法在使用者快速移動的情況會有查詢結果過多而需要過濾許久才能得到答案的問題,此為查詢精確度低問題。因此筆者在此動機下試著設計一個新的混合式隱匿系統的架構。此系統產生出來的隱匿區域較小使得地理資訊查詢系統的負擔能夠減輕,傳回的答案精確度高使得答案的過濾負擔也較輕。另外本文亦探討過去相關文獻所未提及的隱匿查詢精確度及查全率的分析,進而提供未來隱匿系統的新的評比方式。而本文所設計出來的隱匿系統加入了連續性的查詢中預估的概念,因此在實驗中也得到了較高的精確度、答案完整性高也就是說高查全率,讓此混合式隱匿系統在定位隱私系統中有了良好的表現。

並列摘要


In recent years, Location-Based Service can easily provide people location status. On the contrary, the user query data would be exposed by attacker without protection. In order to protect the location query privacy, there proposed some solutions in past literatures. One is delivering the query with location to centralized cloaking server. It could blur the location of query user. With blur location information, the LBS query could be safe. The other is finding a neighbor query user to deliver query, so the attacker couldn’t figure out query user. While someone proposed a hybrid cloaking system – HiSC. It combined the advantage of Centralized cloaking and P2P cloaking. But, HiSC has less using balance on Centralized and P2P part, and high user move speed would make bad answer quality. Therefore, we provide a judgment of query answer quality so that we can know which cloaking system is better. To make good system balance and good query quality, we proposed a New Hybrid Cloaking System (HNCS) to achieve them, and the experiment proves NHCS has good react on system balance, and query answer quality.

並列關鍵字

Location Privacy Cloaking Precision Recall

參考文獻


[4] Chi-Yin Chow, Mohamed F. Mokbel, and Xuan Liu. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. GIS '06: Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, New York, NY, USA, 2006.
[45] Kar Way Tan, Yimin Lin, and Kyriakos Mouratidis. Spatial cloaking revisited: Distinguishing information leakage from anonymity. In SSTD '09: Proceedings of the 11th International Symposium on Advances in Spatial and Temporal
[1] H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. Pervasive Services, 2005.
[2] C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia. Anonymity in location-based services: Towards a general framework. In Mobile Data Management, 2007 International Conference on, pages 69-76, May 2007.
[3] M.F. Mokbel and Chi-Yin Chow. Challenges in preserving location privacy in peer-to-peer environments. Web-Age Information Management Workshops, 2006. WAIM '06, pages 1-1, June 2006.

延伸閱讀