| With the rapid development of the Internet of Vehicles(IoV),service providers can provide location services for vehicles using the vehicle’s GPS and self-developed software.Location services are becoming increasingly popular,and people’s travel is increasingly inseparable from these services.However,while these services bring convenience to users,they also bring a specific risk of privacy leakage.Most of the current user privacy protection relies on the server side to follow specific privacy protection rules.When the server side is curious or malicious,the server side,through some data mining methods,can get more private user information,causing privacy leakage problems.The privacy leakage problem based on Location based Service(LBS)mainly includes query content privacy leakage and vehicle location privacy leakage.Through investigating the existing privacy protection technologies of location services,it is found that in the aspect of location services based on interest point query,academia has proposed to use Kanonymity,homomorphic encryption,privacy information retrieval,Oblivious transfer protocol and other technologies to achieve privacy protection.However,these schemes have issues such as inaccurate query results,high computational overhead,and insufficient consideration of the mobility of vehicle networking nodes.Therefore,we conduct research on privacy protection technology for query content in the context of the IoV,and propose corresponding privacy protection schemes.The main innovation points of the article are as follows:(1)We propose a query content privacy protection scheme that integrates proxy re-encryption and K-anonymity technology to address the issue of strong trust dependency assumptions between location servers and anonymous servers in current privacy protection schemes based on Point of Interest(POI)query services.This scheme utilizes proxy re-encryption technology to achieve privacy protection for user query content,and utilizes K-anonymity technology to mix query requests from different vehicles,achieving isolation between the location server and the query vehicle.Under the assumption that the anonymous server and location server are semi trusted,the system’s privacy protection ability is enhanced.The paper used a POI dataset to experimentally validate the communication and computational costs of the proposed scheme,and the results showed that the proposed scheme had lower communication and computational costs.Specifically,when the anonymity level K is 20,the data size sent by the anonymous server to the LBS server is about 141KB,and the response data size sent by the LBS server to the anonymous server is about 816KB,with a response time of about 4s.(2)We propose a query content privacy protection scheme based on the "Cloud-Edge-End" architecture to address the network topology variability caused by the fast movement of nodes in the IoV and the need for multi-attribute comprehensive top-k queries.This scheme first utilizes the local search architecture of the vehicle terminal to achieve multiattribute comprehensive top-k sorting.Secondly,it alleviates the impact of unstable network connections by introducing multiple RSU edge nodes.Finally,it utilizes threshold proxy re encryption technology to achieve privacy protection of query content.The experiment shows that the proposed scheme has lower communication and computational costs.Specifically,when the anonymity level K is 20,the data size of RSU sending requests to LBS servers is approximately 47KB;The response data size sent by the LBS server to the RSU is approximately 44KB;The response time of this scheme is approximately 5s. |