• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Pan Xiao, Chen Weizhang, Sun Yige, Wu Lei. Continuous Queries Privacy Protection Algorithm Based on Spatial-Temporal Similarity Over Road Networks[J]. Journal of Computer Research and Development, 2017, 54(9): 2092-2101. DOI: 10.7544/issn1000-1239.2017.20160551
Citation: Pan Xiao, Chen Weizhang, Sun Yige, Wu Lei. Continuous Queries Privacy Protection Algorithm Based on Spatial-Temporal Similarity Over Road Networks[J]. Journal of Computer Research and Development, 2017, 54(9): 2092-2101. DOI: 10.7544/issn1000-1239.2017.20160551

Continuous Queries Privacy Protection Algorithm Based on Spatial-Temporal Similarity Over Road Networks

More Information
  • Published Date: August 31, 2017
  • Continuous queries are one of the most common queries in location-based services (LBSs), although particularly useful, such queries raise serious privacy concerns. However, most of the existing location cloaking approaches over road networks are only applicable for snapshots queries. If these algorithms are applied on continuous queries directly, due to continuous location frequently updated, continuous query privacy will be disclosed. Moreover, combined with the network topology and other network parameters (limited speed etc.), the attackers are knowledgeable, which can easily lead to precise location privacy disclosure. We observe that mobile objects have similar spatial and temporal features due to the existing of network topology. In order to resist continuous query attacks and location-dependent attacks simultaneously, we propose a continuous queries privacy protection algorithm based on spatial-temporal similarity over road networks. The algorithm adopts user grouping and K-sharing privacy requirement strategies to constitute cloaking user sets, which is used to resist continuous queries attack. Then, with the same premise of cloaking user sets, a continuous cloaking segment sets generating algorithm is proposed to resist location-dependent attacks, which makes a balance between location privacy and service quality. Finally, we conduct series of experiments to verify our algorithm with four evaluation measures, and the experimental results show the effectiveness of the proposed algorithm.
  • Related Articles

    [1]Zhang Xuguang, Chen Mingkai, Wei Xin. Ubiquitous Video Transmission Scheduling Supported by Computing Power Network[J]. Journal of Computer Research and Development, 2023, 60(4): 786-796. DOI: 10.7544/issn1000-1239.202330005
    [2]Xiang Chaocan, Cheng Wenhui, Zhang Zhao, Jiao Xianlong, Qu Yuben, Chen Chao, Dai Haipeng. Intelligent Edge Computing-Empowered Adaptive Urban Traffic Sensing Data Recovery[J]. Journal of Computer Research and Development, 2023, 60(3): 619-634. DOI: 10.7544/issn1000-1239.202110962
    [3]Li Yin, Chen Yong, Zhao Jingxin, Yue Xinghui, Zheng Chen, Wu Yanjun, Wu Gaofei. Survey of Ubiquitous Computing Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1054-1081. DOI: 10.7544/issn1000-1239.20211248
    [4]Wang Taochun, Jin Xin, Lü Chengmei, Chen Fulong, Zhao Chuanxin. Privacy Preservation Method of Data Aggregation in Mobile Crowd Sensing[J]. Journal of Computer Research and Development, 2020, 57(11): 2337-2347. DOI: 10.7544/issn1000-1239.2020.20190579
    [5]Jing Yao, Guo Bin, Chen Huihui, Yue Chaogang, Wang Zhu, Yu Zhiwen. CrowdTracker: Object Tracking Using Mobile Crowd Sensing[J]. Journal of Computer Research and Development, 2019, 56(2): 328-337. DOI: 10.7544/issn1000-1239.2019.20170808
    [6]Liu Jingjie, Nie Lei. Bayesian Current Disaggregation: Sensing the Current Waveforms of Household Appliances Using One Sensor[J]. Journal of Computer Research and Development, 2018, 55(3): 662-672. DOI: 10.7544/issn1000-1239.2018.20150311
    [7]Lin Xin, Li Shanping, Yang Zhaohui, Xu Jian. A Reasoning-Oriented Context Replacement Algorithm in Pervasive Computing[J]. Journal of Computer Research and Development, 2009, 46(4): 549-557.
    [8]Sun Peigang, Zhao Hai, Han Guangjie, Zhang Xiyuan, Zhu Jian. Chaos Triangle Compliant Location Reference Node Selection Algorithm[J]. Journal of Computer Research and Development, 2007, 44(12): 1987-1995.
    [9]Tang Lei, Liao Yuan, Li Mingshu, Huai Xiaoyong. The Dynamic Deployment Problem and the Algorithm of Service Component for Pervasive Computing[J]. Journal of Computer Research and Development, 2007, 44(5): 815-822.
    [10]Li Rui and Li Renfa. A Survey of Context-Aware Computing and Its System Infrastructure[J]. Journal of Computer Research and Development, 2007, 44(2): 269-276.

Catalog

    Article views (1221) PDF downloads (753) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return