中兴通讯技术
中興通訊技術
중흥통신기술
ZHONGXING TELECOM TECHNOLOGY
2015年
3期
16-22
,共7页
移动互联网%身份隐私%位置隐私%查询隐私
移動互聯網%身份隱私%位置隱私%查詢隱私
이동호련망%신빈은사%위치은사%사순은사
mobile internet service%identity privacy%location privacy%query privacy
探讨了考虑背景信息的位置和查询隐私保护方案,如基于背景信息的虚假位置k-匿名方案、同时保护位置和兴趣的隐私保护方案、基于交互的隐私保护方案,还探讨了基于用户隐私链拆分的实名认证和身份隐私保护策略;认为在避免可信第三方参与,敌手能够获取到背景信息的前提下,能够实现对用户身份、位置和查询隐私的保护,达到信任机制和隐私保护的有机结合将是未来隐私保护发展的趋势。
探討瞭攷慮揹景信息的位置和查詢隱私保護方案,如基于揹景信息的虛假位置k-匿名方案、同時保護位置和興趣的隱私保護方案、基于交互的隱私保護方案,還探討瞭基于用戶隱私鏈拆分的實名認證和身份隱私保護策略;認為在避免可信第三方參與,敵手能夠穫取到揹景信息的前提下,能夠實現對用戶身份、位置和查詢隱私的保護,達到信任機製和隱私保護的有機結閤將是未來隱私保護髮展的趨勢。
탐토료고필배경신식적위치화사순은사보호방안,여기우배경신식적허가위치k-닉명방안、동시보호위치화흥취적은사보호방안、기우교호적은사보호방안,환탐토료기우용호은사련탁분적실명인증화신빈은사보호책략;인위재피면가신제삼방삼여,활수능구획취도배경신식적전제하,능구실현대용호신빈、위치화사순은사적보호,체도신임궤제화은사보호적유궤결합장시미래은사보호발전적추세。
In this paper, we discuss the location and query privacy mechanism which considering the background information, such as the k-anonymity based on background information, the privacy mechanism that preserves the location and interest and privacy preservation mechanism based on interaction. The real-name authentication based on user privacy chain separation and identity privacy mechanism are also discussed. In order to avoid the trusted party, and the background information can be obtained by an adversary, it wil be the tendency that the user ’s identity, location and query can be kept private, and trust mechanism and privacy protection can be combined.