簡易檢索 / 詳目顯示

研究生: 呂暉智
HUEI-JHIH LYU
論文名稱: 在道路網路中的連續性以位置為基礎服務的隱私保護
Privacy Protection in Continuous Location-Based Service over Road Network
指導教授: 邱舉明
Ge-Ming Chiu
口試委員: 陳秋華
Chyouhwa Chen
金台齡
Tai-Lin Chin
花凱龍
Kai-Lung Hua
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 62
中文關鍵詞: 隱私保護連續性
外文關鍵詞: lovation-based service
相關次數: 點閱:161下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來空間查詢的隱私保護議題越來越受到重視,不管是一次性查詢或連續性查詢,都對隱私權保護有所要求。而這其中,又以連續性查詢牽扯到連續相關與移動性,要達到隱私保護上有其相當的困難點,故較少有論文針對此方向進行研究,另外大部分的隱私保護研究都著重在隨機移動模組(random way point model),而非實際情況下,會受網路或道路限制的移動模組(network constrained model)。本論文在network constrained model環境下提出了一個新的路徑隱私保護(path privacy)做為位置隱私保護(location privacy)在連續性查詢下的延伸,並對此提出一種新型態的隱私權需求M-cut,希望連續性的CSR內,都可以利用M條路徑,混淆攻擊者,令其無法將某條特定路段與查詢者做直接對應,猜測出查詢會經過某條路段。本論文最後提出兩個建構CSR的演算法,random way 與junction sharing,前者在建構CSR著重於隨機處理,後者可以在滿足隱私需求後有效降低伺服器端的資料運算量。


    In recent years, the research of privacy protection for spatial query is getting more and more important. No matter snap shot query or continuous query, both of them have request on privacy protection. Since the privacy protection under continuous query has its own difficulty to breakthrough recently, few studies are proposed in this certain area. Besides, most of studies are not focused on the real situation as network constrained model, but rather on random way point model. This thesis proposes a new path privacy based on network constrained model environment as the extension of location privacy under continuous query, and also presents a new type of privacy requirement, named M-cut. We hope every CSR can manipulate these m paths to confuse adversaries to prevent a segment or a route from being linked to a specific user, or inferring some segment that the user will pass through. This thesis proposes two methods to create CSR, one is so-called random way, another is junction sharing. The former focus on random selection on CSR creation, the latter can cut down the transporting cost of the server.

    摘要 I ABSTRACT II 致謝 III 目錄 IV 圖目錄 VI 第一章 緒論 1 1.1 背景 1 1.2 空間查詢的隱私保護 3 1.2.1基本架構 3 1.2.2隱私權需求(Privacy Requirement) 5 1.3 論文目標 7 1.4 論文架構 9 第二章 相關研究 10 第三章 連續性空間查詢之隱私保護 14 3.1 道路網路環境,攻擊者與假設 14 3.2 連續性空間查詢隱私保護分析 16 3.3 路徑隱私保護與M-CUT 19 3.3.1 路徑隱私保護 19 3.3.2 M-cut 19 3.3.3多個CSR的M-cut隱私保護需求分析 22 第四章 CSR建構方法 25 4.1 運算成本 25 4.2 路段選取準則 26 4.3 CSR建構方法 29 第五章 效能評估與模擬結果 40 5.1 效能評估 40 5.2 環境設定與模擬參數 41 5.3 模擬結果 42 5.3.1網格狀道路網路模型 42 5.3.1實際道路網路模型 44 5.4 小結 47 第六章 論文貢獻與未來展望 49 重要參考文獻 50

    [1] R. Dewri, I. Ray, and D. Whitley, "Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services," in Proc. 2010 Eleventh International Conference on Mobile Data Management (MDM)2010, pp. 95-104.
    [2] U. Jung-Ho, J. Mi-Young, J. Kyoung-Jin, and C. Jae-Woo, "A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service," in Proc. 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009, pp. 79-85.
    [3] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Transactions on Knowledge and Data Engineering, vol. 19, pp. 1719-1733, 2007.
    [4] R. H. Katz, E. A. Brewer, E. Amir, H. Balakrishnan, A. Fox, S. Gribble, T. Hodes, D. Jiang, N. Giao Thanh, V. Padmanabhan, and M. Stemm, "The Bay Area Research Wireless Access Network (BARWAN)," in Proc. Compcon '96. 'Technologies for the Information Superhighway' Digest of Papers, 1996, pp. 15-20.
    [5] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, "The new Casper: query processing for location services without compromising privacy," in Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, 2006.
    [6] K. Mouratidis and Y. Man Lung, "Anonymous Query Processing in Road Networks," IEEE Transactions on Knowledge and Data Engineering, vol. 22, pp. 2-15, 2010.
    [7] X. Pan, X. Meng, and J. Xu, "Distortion-based anonymity for continuous queries in location-based mobile services," in Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Seattle, Washington, 2009.
    [8] B. Rao and L. Minakakis, "Evolution of Mobile Location-based Services," Communications of the ACM, vol. 46, p. 65, 2003.
    [9] H. Shin, J. Vaidya, V. Atluri, and S. Choi, "Ensuring Privacy and Security for LBS through Trajectory Partitioning," in Proc. p. 224-226.
    [10] T. Wang and L. Liu, "Privacy-aware mobile services over road networks," in Proc. VLDB Endow., vol. 2, pp. 1042-1053, 2009.
    [11] T. Xu and Y. Cai, "Location anonymity in continuous location-based services," in Proceedings of the 15th annual ACM International Symposium on Advances in Geographic Information Systems, Seattle, Washington, 2007.
    [12] W. Yiming, W. Lingyu, and B. C. M. Fung, "Preserving Privacy for Location-Based Services with Continuous Queries," in Proc. IEEE International Conference on Communications, 2009. ICC '09. , 2009, pp. 1-5.
    [13] Bluetooth.org, https://www.bluetooth.org/apps/content/
    [14] LTE 3GPP homepage, http://www.3gpp.org/article/lte
    [15] WiFi Alliance, http://www.wi-fi.org/
    [16] ZigBee Alliance, http://www.zigbee.org/

    QR CODE