• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于位置的社交网络中,为了轨迹隐私保护而交换注册用户对轨迹的提交评价用于评价服务。

Exchanging registered users' submitting reviews towards trajectory privacy preservation for review services in Location-Based Social Networks.

机构信息

School of Cyberspace Security, Information Security Center, National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China.

State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China.

出版信息

PLoS One. 2021 Sep 16;16(9):e0256892. doi: 10.1371/journal.pone.0256892. eCollection 2021.

DOI:10.1371/journal.pone.0256892
PMID:34529699
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8445480/
Abstract

In Location-Based Social Networks (LBSNs), registered users submit their reviews for visited point-of-interests (POIs) to the system providers (SPs). The SPs anonymously publish submitted reviews to build reputations for POIs. Unfortunately, the user profile and trajectory contained in reviews can be easily obtained by adversaries who SPs has compromised with. Even worse, existing techniques, such as cryptography and generalization, etc., are infeasible due to the necessity of public publication of reviews and the facticity of reviews. Inspired by pseudonym techniques, we propose an approach to exchanging reviews before users submit reviews to SPs. In our approach, we introduce two attacks, namely review-based location correlation attack (RLCA) and semantic-based long-term statistical attack (SLSA). RLCA can be exploited to link the real user by reconstructing the trajectory, and SLSA can be launched to establish a connection between locations and users through the difference of semantic frequency. To resist RLCA, we design a method named User Selection to Resist RLCA (USR-RLCA) to exchange reviews. We propose a metric to measure the correlation between a user and a trajectory. Based on the metric, USR-RLCA can select reviews resisting RLCA to exchange by suppressing the number of locations on each reconstructed trajectory below the correlation. However, USR-RLCA fails to resist SLSA because of ignoring the essential semantics. Hence, we design an enhanced USR-RLCA named User Selection to Resist SLSA (USR-SLSA). We first propose a metric to measure the indistinguishability of locations concerning the difference of semantic frequency in a long term. Then, USR-SLSA can select reviews resisting SLSA to exchange by allowing two reviews whose indistinguishability is below the probability difference after the exchange to be exchanged. Evaluation results verify the effectiveness of our approach in terms of privacy and utility.

摘要

在基于位置的社交网络(LBSN)中,注册用户向系统提供商(SP)提交他们对访问的兴趣点(POI)的评价。SP 匿名发布提交的评价,为 POI 建立声誉。不幸的是,用户配置文件和轨迹包含在评价中,很容易被 SP 妥协的对手获取。更糟糕的是,由于评价的公开发布和评价的真实性,现有的技术,如加密和概括化等,是不可行的。受假名技术的启发,我们提出了一种在用户向 SP 提交评价之前交换评价的方法。在我们的方法中,我们引入了两种攻击,即基于评价的位置关联攻击(RLCA)和基于语义的长期统计攻击(SLSA)。RLCA 可以通过重建轨迹来利用它来链接真实用户,而 SLSA 可以通过语义频率差异来建立位置和用户之间的连接。为了抵抗 RLCA,我们设计了一种名为 User Selection to Resist RLCA(USR-RLCA)的方法来交换评价。我们提出了一种度量来衡量用户和轨迹之间的相关性。基于该度量,USR-RLCA 可以通过抑制每个重建轨迹上的位置数量低于相关性来选择抵抗 RLCA 的评价进行交换。然而,由于忽略了本质语义,USR-RLCA 无法抵抗 SLSA。因此,我们设计了一种增强的 USR-RLCA,名为 User Selection to Resist SLSA(USR-SLSA)。我们首先提出了一种度量来衡量在长期内位置关于语义频率差异的不可区分性。然后,USR-SLSA 可以通过允许两个可交换性低于交换后概率差的评价进行交换,来选择抵抗 SLSA 的评价进行交换。评估结果验证了我们的方法在隐私和效用方面的有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/d3758d433150/pone.0256892.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/6f51447bdf18/pone.0256892.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/bb5ff5490eca/pone.0256892.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/846fa2a03440/pone.0256892.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/003dbeef1cfc/pone.0256892.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/3feae17c8a02/pone.0256892.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/85213162587b/pone.0256892.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/e839fe33eef8/pone.0256892.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/3d54d55e5397/pone.0256892.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/eab0d40da054/pone.0256892.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/d3758d433150/pone.0256892.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/6f51447bdf18/pone.0256892.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/bb5ff5490eca/pone.0256892.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/846fa2a03440/pone.0256892.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/003dbeef1cfc/pone.0256892.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/3feae17c8a02/pone.0256892.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/85213162587b/pone.0256892.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/e839fe33eef8/pone.0256892.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/3d54d55e5397/pone.0256892.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/eab0d40da054/pone.0256892.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0b00/8445480/d3758d433150/pone.0256892.g010.jpg

相似文献

1
Exchanging registered users' submitting reviews towards trajectory privacy preservation for review services in Location-Based Social Networks.基于位置的社交网络中,为了轨迹隐私保护而交换注册用户对轨迹的提交评价用于评价服务。
PLoS One. 2021 Sep 16;16(9):e0256892. doi: 10.1371/journal.pone.0256892. eCollection 2021.
2
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services.基于虚拟代理的基于位置服务的位置隐私保护技术研究综述。
Sensors (Basel). 2022 Aug 17;22(16):6141. doi: 10.3390/s22166141.
3
CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.移动社交网络中基于CP-ABE的隐私保护用户简档匹配
PLoS One. 2016 Jun 23;11(6):e0157933. doi: 10.1371/journal.pone.0157933. eCollection 2016.
4
Differential privacy protection method based on published trajectory cross-correlation constraint.基于发布轨迹互相关约束的差分隐私保护方法。
PLoS One. 2020 Aug 12;15(8):e0237158. doi: 10.1371/journal.pone.0237158. eCollection 2020.
5
A Vehicle Trajectory Privacy Preservation Method Based on Caching and Dummy Locations in the Internet of Vehicles.基于车载网中缓存和虚拟位置的车辆轨迹隐私保护方法。
Sensors (Basel). 2022 Jun 11;22(12):4423. doi: 10.3390/s22124423.
6
Perturb and optimize users' location privacy using geo-indistinguishability and location semantics.利用地理不可区分性和位置语义来干扰和优化用户的位置隐私。
Sci Rep. 2022 Nov 28;12(1):20445. doi: 10.1038/s41598-022-24893-0.
7
A fine granularity based user collaboration algorithm for location privacy protection.一种基于细粒度的用户协作算法,用于保护位置隐私。
PLoS One. 2019 Jul 25;14(7):e0220278. doi: 10.1371/journal.pone.0220278. eCollection 2019.
8
Effectively computing transition patterns with privacy-preserved trajectory datasets.有效计算具有隐私保护轨迹数据集的转换模式。
PLoS One. 2022 Dec 9;17(12):e0278744. doi: 10.1371/journal.pone.0278744. eCollection 2022.
9
Privacy-Enhancing -Nearest Neighbors Search over Mobile Social Networks.基于移动社交网络的隐私增强最近邻搜索。
Sensors (Basel). 2021 Jun 9;21(12):3994. doi: 10.3390/s21123994.
10
Research on Information Leakage Tracking Algorithms in Online Social Networks.在线社交网络中的信息泄露追踪算法研究。
Comput Intell Neurosci. 2022 Oct 4;2022:5634385. doi: 10.1155/2022/5634385. eCollection 2022.

本文引用的文献

1
Distributed Memetic Algorithm for Outsourced Database Fragmentation.分布式进化算法在外包数据库分片问题中的应用
IEEE Trans Cybern. 2021 Oct;51(10):4808-4821. doi: 10.1109/TCYB.2020.3027962. Epub 2021 Oct 12.
2
Improving accessibility of the Australian My Health Records while preserving privacy and security of the system.在保护系统隐私和安全的同时,提高澳大利亚我的健康记录的可访问性。
Health Inf Sci Syst. 2020 Oct 8;8(1):31. doi: 10.1007/s13755-020-00126-4. eCollection 2020 Dec.