Location-Based Service Privacy Protection Method
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    In recent years, most location-based service privacy protection turns to peer-to-peer based on subscriber cooperation. However, the biggest drawback of that mode lies in the integrity of collaborative users. If there are vicious users in ambient collaborative users, the information of collaborative users may be accessed illegally. So this paper proposes a method of preventing the location privacy from being revealed to vicious users via using third-party trust institutions to detect the abnormal network behaviors for mobile users. In the meanwhile, we broaden the zone of collaborative users in the mode of peer to peer through binary tree. The experimental result shows the method can effectively prevent unfaithful users from joining in the anonymous group and reduce the probability of the information leakage.

    Reference
    Related
    Cited by
Get Citation

王木涵,汪佳帧,阳杰,迟焕醒,徐九韵.一种位置服务隐私保护方法.计算机系统应用,2017,26(8):267-272

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:December 03,2016
  • Revised:
  • Adopted:
  • Online: October 31,2017
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063