nav emailalert searchbtn searchbox tablepage yinyongbenwen piczone journalimg journalInfo journalinfonormal searchdiv searchzone qikanlogo popupnotification paper paperNew
2025, 04, v.24 10-20
基于多属性决策的双k-匿名位置隐私保护策略
基金项目(Foundation): 国家自然科学基金青年科学基金项目(61902069); 福建省自然科学基金面上项目(2025J01380,2021J011068)
邮箱(Email): lhx1357@163.com;
DOI: 10.12194/j.ntu.20241111001
摘要:

基于位置的隐私保护日益重要,k-匿名技术是保护位置隐私的有效方法之一。大多数现有方案根据位置的单一属性生成匿名集,攻击者很容易根据背景知识推断出匿名集中的真实位置。为了解决这个问题,提出一种基于多属性决策的双k-匿名位置隐私保护策略(dual k-anonymous location privacy-preserving scheme with multi-attribute decision-making,DKMD),来解决基于位置的服务(location-based services,LBS)场景中的隐私问题。首先,提出一个边缘缓存策略来提高数据访问效率,减少第三方匿名器的隐私威胁;其次,设计双k-匿名策略,在用户向边缘缓存器或边缘缓存器向LBS服务器发起查询之前,都生成一个匿名集以防止用户位置被识别,并在边缘缓存器向LBS服务器发起查询前,采用多属性决策生成一个边缘匿名集,从而进一步提高匿名集的安全性;最后,通过在真实轨迹数据集上的对比实验,测试位置熵、位置分散度、缓存效率与运算时间等性能指标。实验结果表明:DKMD能够在保护用户位置隐私的同时,提高整个系统的数据传输速率。

Abstract:

Location-based privacy protection is increasingly important, and k-anonymity technique is an effective method for protecting location privacy. Most existing schemes generate anonymous sets based on a single attribute of location, making it easy for attackers to infer real locations within the anonymous set using background knowledge. To address this issue, a dual k-anonymous location privacy-preserving scheme with multi-attribute decision-making(DKMD) is proposed to solve privacy problems in location-based services(LBS) scenarios. Firstly, an edge caching strategy is proposed to improve data access efficiency and reduce privacy threats from third-party anonymizers.Secondly, a dual k-anonymity scheme is designed: an anonymous set is generated before the user queries the edge cache or before the edge cache queries the LBS server to prevent user location identification. Before the edge cache queries the LBS server, multi-attribute decision-making is adopted to generate an edge anonymous set, thereby further enhancing the security of the anonymous set. Finally, comparative experiments are conducted on real trajectory datasets to evaluate performance metrics including location entropy, location dispersion, caching efficiency, and computational time. Results demonstrate that the proposed DKMD framework enhances overall system data transmission rates while protecting user location privacy.

参考文献

[1]MARIAPPAN SAKTHIVEL G, SUBRAMANIAN A, SYED MOHAMMADU J, et al. A source location privacy protocol-based energy-efficient and link-reliable multi-scale bifurcated deep Capsnet routing in social Internet of Things[J]. International Journal of Communication Systems, 2024,37(8):e5750.

[2]PINTO G P, DONTA P K, DUSTDAR S, et al. A systematic review on privacy-aware IoT personal data stores[J].Sensors, 2024, 24(7):2197.

[3]WIEDEMANN N, JANOWICZ K, RAUBAL M, et al. Where you go is who you are:a study on machine learning based semantic privacy attacks[J]. Journal of Big Data, 2024, 11(1):39.

[4]BUCCAFURRI F, de ANGELIS V, IDONE M F, et al. A hierarchical distributed trusted location service achieving location k-anonymity against the global observer[J]. Computer Networks, 2024, 243:110301.

[5]QIAN J, JIANG H Y, YU Y, et al. Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions[J]. Expert Systems with Applications, 2024, 239:122343.

[6]侯占伟,杨鑫,申自浩,等.面向安全匿名集构建的多属性决策方法[J].计算机工程,2023, 49(11):169-177.HOU Z W, YANG X, SHEN Z H, et al. Multi-attribute decision-making method for secure anonymous set construction[J]. Computer Engineering, 2023, 49(11):169-177.(in Chinese)

[7]CAO T F, ZHANG Z Z, WANG X Y, et al. PTCC:a privacy-preserving and trajectory clustering-based approach for cooperative caching optimization in vehicular networks[J]. IEEE Transactions on Sustainable Computing, 2024, 9(4):615-630.

[8]DU M , WANG K , CHEN Y F , et al. Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things[J]. IEEE Communications Magazine, 2018, 56(8):62-67.

[9]ZHANG J, HUANG Q H, HUANG Y R, et al. DP-TrajGAN:a privacy-aware trajectory generation model with differential privacy[J]. Future Generation Computer Systems,2023, 142:25-40.

[10]SUN X Y, YE Q Q, HU H B, et al. Synthesizing realistic trajectory data with differential privacy[J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(5):5502-5515.

[11]ZHANG Q, WANG T C, TAO Y, et al. Location privacy protection method based on differential privacy in crowdsensing task allocation[J]. Ad Hoc Networks, 2024, 158:103464.

[12]ESHUN S N, PALMIERI P. A cryptographic protocol for efficient mutual location privacy through outsourcing in indoor Wi-Fi localization[J]. IEEE Transactions on Information Forensics and Security, 2024, 19:4086-4099.

[13]HUANG W, ZHUO M, ZHU T Q, et al. Differential privacy:review of improving utility through cryptographybased technologies[J]. Concurrency and Computation:Practice and Experience, 2023, 35(5):e7565.

[14]SWEENEY L. K-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):557-570.

[15]WANG B, GUO Y N, LI H T, et al. k-anonymity based location privacy protection method for location-based services in Internet of Thing[J]. Concurrency and Computation:Practice and Experience, 2023, 35(20):e6760.

[16]LI H T, GONG L X, WANG B, et al. k-anonymity based location data query privacy protection method in mobile social networks[C]//Proceedings of the 2020 International Conference on Networking and Network Applications(NaNA), December 10-13, 2020, Haikou City, China.New York:IEEE Xplore, 2021:326-334.

[17]王辉,朱国宇,申自浩,等.基于用户偏好和位置分布的假位置生成方法[J].计算机科学,2021, 48(7):164-171.WANG H, ZHU G Y, SHEN Z H, et al. Dummy location generation method based on user preference and location distribution[J]. Computer Science, 2021, 48(7):164-171.(in Chinese)

[18]张琳,张鸿刚,刘茜萍.一种基于多元数据的假位置筛选算法[J].南京邮电大学学报(自然科学版),2021, 41(6):47-56.ZHANG L, ZHANG H G, LIU X P. Dummy location screening algorithm based on multivariate data[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition), 2021, 41(6):47-56.(in Chinese)

[19]杨洋,胡晓辉,杜永文.基于历史查询概率的K-匿名哑元位置选取算法[J].计算机工程,2022, 48(2):147-155.YANG Y, HU X H, DU Y W. The K-anonymous dummy location selection algorithm based on historical query probability[J]. Computer Engineering, 2022, 48(2):147-155.(in Chinese)

[20]KO H, LEE H, KIM T, et al. LPGA:location privacyguaranteed offloading algorithm in cache-enabled edge clouds[J]. IEEE Transactions on Cloud Computing, 2022,10(4):2729-2738.

[21]彭维平,熊长可,贺军义,等.边缘计算场景下车联网身份隐私保护方案研究[J].小型微型计算机系统,2020,41(11):2399-2406.PENG W P, XIONG C K, HE J Y, et al. Research on the identity privacy protection scheme of Internet of vehicles in edge computing scenario[J]. Journal of Chinese Computer Systems, 2020, 41(11):2399-2406.(in Chinese)

[22]ZHANG S W, HU B, LIANG W, et al. A caching-based dual K-anonymous location privacy-preserving scheme for edge computing[J]. IEEE Internet of Things Journal, 2023,10(11):9768-9781.

[23]AL-SAFWANI N, HASSAN S, KATUK N. A multiple attribute decision making for improving information security control assessment[J]. International Journal of Computer Applications, 2014, 89(3):19-24.

[24]张梅舒,徐雅斌.多维数值型敏感属性数据的个性化隐私保护方法[J].计算机应用,2020, 40(2):491-496.ZHANG M S, XU Y B. Personalized privacy protection method for data with multiple numerical sensitive attributes[J]. Journal of Computer Applications, 2020, 40(2):491-496.(in Chinese)

[25]XU C, LUO L, DING Y Y, et al. Personalized location privacy protection for location-based services in vehicular networks[J]. IEEE Wireless Communications Letters, 2020,9(10):1633-1637.

[26]陆佳瑜,张琳,雷诚,等.一种基于停留点和位置语义的隐私保护算法[J].小型微型计算机系统,2024, 45(10):2500-2507.LU J Y, ZHANG L, LEI C, et al. Trajectory protection scheme based on stop-points and semantics[J]. Journal of Chinese Computer Systems, 2024, 45(10):2500-2507.(in Chinese)

[27]ZHENG Y, ZHANG L Z, XIE X, et al. Mining interesting locations and travel sequences from GPS trajectories[C]//Proceedings of the 18th International Conference on World Wide Web, April 20-24, 2009, Madrid, Spain. New York:ACM, 2009:791-800.

[28]ZHENG Y, XIE X, MA W Y. GeoLife:a collaborative social networking service among user, location and trajectory[J]. IEEE Data Engineering Bulletin, 2010, 33:32-39.

[29]HUANG Y R, ZHANG J, HOU H M, et al. GeoPMDMEIRL:a deep inverse reinforcement learning security trajectory generation framework with serverless computing[J]. Future Generation Computer Systems, 2024, 154:123-139.

[30]ZHOU H, ZHANG Z Y, WU Y, et al. Energy efficient joint computation offloading and service caching for mobile edge computing:a deep reinforcement learning approach[J].IEEE Transactions on Green Communications and Networking, 2023, 7(2):950-961.

基本信息:

DOI:10.12194/j.ntu.20241111001

中图分类号:TP309

引用信息:

[1]陈雪祺,章静,林雨薇,等.基于多属性决策的双k-匿名位置隐私保护策略[J].南通大学学报(自然科学版),2025,24(04):10-20.DOI:10.12194/j.ntu.20241111001.

基金信息:

国家自然科学基金青年科学基金项目(61902069); 福建省自然科学基金面上项目(2025J01380,2021J011068)

检 索 高级检索

引用

GB/T 7714-2015 格式引文
MLA格式引文
APA格式引文