一种基于语义匿名代理的轨迹保持方法

Meng Li, Sheng Cao, Zhiguang Qin
{"title":"一种基于语义匿名代理的轨迹保持方法","authors":"Meng Li, Sheng Cao, Zhiguang Qin","doi":"10.1109/DASC.2013.31","DOIUrl":null,"url":null,"abstract":"Privacy protection attracts more and more attention from researchers to users. Due to the unreliability of mobile devices which often leads confidential information such as personal trajectory data divulged. We propose a new trajectory privacy protection method based on Semantic Anonymity Proxy proved to have some excellent characteristics. We alter the traditional ways which used to rely on the center anonymous server, adopting semantic anonymity and proxy request to construct the SAP tree on account of background map model to satisfy the location based services. The comparative results have shown that the new method achieves better performance than the classic ways on higher efficiency and quality.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Trajectory Preserving Method Based on Semantic Anonymity Proxy\",\"authors\":\"Meng Li, Sheng Cao, Zhiguang Qin\",\"doi\":\"10.1109/DASC.2013.31\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Privacy protection attracts more and more attention from researchers to users. Due to the unreliability of mobile devices which often leads confidential information such as personal trajectory data divulged. We propose a new trajectory privacy protection method based on Semantic Anonymity Proxy proved to have some excellent characteristics. We alter the traditional ways which used to rely on the center anonymous server, adopting semantic anonymity and proxy request to construct the SAP tree on account of background map model to satisfy the location based services. The comparative results have shown that the new method achieves better performance than the classic ways on higher efficiency and quality.\",\"PeriodicalId\":179557,\"journal\":{\"name\":\"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DASC.2013.31\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DASC.2013.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

隐私保护越来越受到研究者和用户的关注。由于移动设备的不可靠性往往导致个人轨迹数据等机密信息泄露。提出了一种新的基于语义匿名代理的轨迹隐私保护方法,该方法具有良好的特性。我们改变了传统的依赖中心匿名服务器的方式,采用语义匿名和代理请求的方式,根据后台地图模型构建SAP树,以满足基于位置的服务。对比结果表明,新方法在效率和质量上都优于传统方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Trajectory Preserving Method Based on Semantic Anonymity Proxy
Privacy protection attracts more and more attention from researchers to users. Due to the unreliability of mobile devices which often leads confidential information such as personal trajectory data divulged. We propose a new trajectory privacy protection method based on Semantic Anonymity Proxy proved to have some excellent characteristics. We alter the traditional ways which used to rely on the center anonymous server, adopting semantic anonymity and proxy request to construct the SAP tree on account of background map model to satisfy the location based services. The comparative results have shown that the new method achieves better performance than the classic ways on higher efficiency and quality.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Improved Algorithm for Dynamic Cognitive Extraction Based on Fuzzy Rough Set An Improved Search Algorithm Based on Path Compression for Complex Network Dynamic Spectrum Sensing for Energy Harvesting Wireless Sensor Study and Application of Dynamic Collocation of Variable Weights Combination Forecasting Model A Multicast Routing Algorithm for GEO/LEO Satellite IP Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1