Font Size: a A A

User Location Privacy Protection Method In Mobile Internet

Posted on:2023-06-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y P WangFull Text:PDF
GTID:2558307088973719Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the popularization of smart mobile devices and gradually approaching the scale of the Internet,location-based services have been applied to all aspects of the real world.However,the frequent use and interaction of location information pose a great potential threat to the privacy of users themselves.On the one hand,users do not want to disclose their identities,let alone their location information.On the other hand,users need to use certain basic information to send relevant location service requests.This contradiction,especially in the mobile Internet environment,makes location privacy greatly challenging.Scholars at home and abroad have proposed various techniques and means to protect location privacy.Based on previous research,this paper analyzes the characteristics of application scenarios on the mobile Internet and conducts an in-depth study on how to ensure that users get high-quality location services while satisfying privacy needs.The main work and innovation of this paper are as follows:(1)Aiming at the problem of location information leaked by third-party servers and considering the status quo of how to resist background knowledge attacks,the desired location privacy protection method based on the LEP-LR model is proposed by using differential privacy technology and linear regression.Without the need for a third-party server,the Laplace mechanism of differential privacy is used to add noise interference to the real location,and a reasonable noise location is calculated according to the user’s privacy budget.Then the user proposes his privacy level to send a broadcast message,and the users will be sorted according to the privacy level,and the user with the lowest privacy level will be selected as the agent.At the same time,a linear regression expectation model is established by using the discretization characteristics of position information.The regression function is used to calculate the expected position that can represent all users in the anonymous group and within the allowable error range and issue query requests on behalf of all users.Finally,the obtained service results are sent to the user,and the encrypted information is processed using digital packets during the information exchange to maintain the stability of the system.(2)Aiming at the problem that cooperative users cannot be trusted and restrained in the anonymous area,the location privacy-related trusted indicators are introduced to digitally authenticate a single user,and a trusted authentication location privacy protection method based on the TAEM model is proposed.This method combines the discrete coefficient method to calculate the trustworthy entropy value according to the user’s historical behavior,and the size of the trustworthy entropy value reflects the change in the user’s trustworthiness.At the same time,a cloud server is introduced to act as an interactive medium.The cloud server ensures the identity authentication of users in the anonymous area.Users with low trusted entropy may be excluded from participating in the construction of the anonymous area.In addition,the sensitivity of location information only exists in the interaction between user levels,which is resistant to external attacks and single-point failure problems.Through security analysis and comparative experiments,the practical utility and overall performance of this paper’s location privacy protection method are verified,balancing the contradiction between users’ personal privacy needs and ensuring service quality,while reducing the problem of the internal presence of malicious users affecting the privacy protection of the scheme and reducing the threat of internal and external attacks.There are 24 pictures,2 tables,and 73 references.
Keywords/Search Tags:Mobile internet, Location privacy, Linear regression, Trusted authentication, Discrete coefficient method
PDF Full Text Request
Related items