计算机应用研究
計算機應用研究
계산궤응용연구
APPLICATION RESEARCH OF COMPUTERS
2013年
3期
641-646
,共6页
匿名集%匿名区%候选集%兴趣点(POI)
匿名集%匿名區%候選集%興趣點(POI)
닉명집%닉명구%후선집%흥취점(POI)
anonymous set%anonymous spatial region%candidate set%points of interest(POI)
随着如智能手机和平板电脑等移动设备的普及, 基于位置的服务(LBS)变得越来越流行, 人们通过网络进行查询的同时, 将自己的位置信息暴露给了LBS提供商。如何保护用户的位置信息不被潜在地泄露给LBS提供商, 对一个LBS系统来说是至关重要的。目前关于LBS的隐私保护的研究已经取得了一定的成果, 为了更深入地解决位置隐私保护技术中还没有解决的诸多问题, 展开对相关课题的深入研究, 从非k-匿名位置隐私技术、k-匿名位置隐私技术、P2P架构下的k-匿名技术和连续查询轨迹匿名技术四个方面对相关文献进行了综述, 分别介绍了相关的算法。最后, 总结了位置隐私保护技术当前存在的问题及未来的发展方向。
隨著如智能手機和平闆電腦等移動設備的普及, 基于位置的服務(LBS)變得越來越流行, 人們通過網絡進行查詢的同時, 將自己的位置信息暴露給瞭LBS提供商。如何保護用戶的位置信息不被潛在地洩露給LBS提供商, 對一箇LBS繫統來說是至關重要的。目前關于LBS的隱私保護的研究已經取得瞭一定的成果, 為瞭更深入地解決位置隱私保護技術中還沒有解決的諸多問題, 展開對相關課題的深入研究, 從非k-匿名位置隱私技術、k-匿名位置隱私技術、P2P架構下的k-匿名技術和連續查詢軌跡匿名技術四箇方麵對相關文獻進行瞭綜述, 分彆介紹瞭相關的算法。最後, 總結瞭位置隱私保護技術噹前存在的問題及未來的髮展方嚮。
수착여지능수궤화평판전뇌등이동설비적보급, 기우위치적복무(LBS)변득월래월류행, 인문통과망락진행사순적동시, 장자기적위치신식폭로급료LBS제공상。여하보호용호적위치신식불피잠재지설로급LBS제공상, 대일개LBS계통래설시지관중요적。목전관우LBS적은사보호적연구이경취득료일정적성과, 위료경심입지해결위치은사보호기술중환몰유해결적제다문제, 전개대상관과제적심입연구, 종비k-닉명위치은사기술、k-닉명위치은사기술、P2P가구하적k-닉명기술화련속사순궤적닉명기술사개방면대상관문헌진행료종술, 분별개소료상관적산법。최후, 총결료위치은사보호기술당전존재적문제급미래적발전방향。
As the proliferation of mobile devices such as smartphones and tablets, location-based services(LBS) are becoming increasingly popular. LBS, albeit useful and convenient, posed a serious threat to users' privacy as they are enticed to reveal their locations to LBS providers via their queries for. How to protect users' privacy against potentially compromised LBS providers is of vital importance to the well being of the LBS ecosystem. Some solutions have been proposed to deal with location privacy problems in location-based services, however, there is still a distance to be widely used. In order to resolve the contradictions which have been not solved, and deeply study with the related topics, this paper overviewed the related literatures from four aspects: the not k-anonymous location privacy technologies, the k-anonymous location privacy technologies, the k-anonymous location privacy in the P2P environment technologies, and the anonymous location privacy for continuously querying technologies. It introduced the related algorithms. Finally it concluded the problem remaining and development orientation of the location privacy protection technologies.