Technology of Information Security
|
559-563

Location privacy protection method against edge attacks and semantic attacks

Zhang Runlian1,2
Zhao Xinhong1
Wu Xiaonian1,3
1. Guangxi Key Laboratory of Cryptography & Information Security, Guilin University of Electronic Technology, Guilin Guangxi 541004, China
2. Guangxi Colleges Key Laboratory of Cloud Computing & Complex Systems, Guilin Guangxi 541004, China
3. Guangxi Key Laboratory of Trusted Software, Guilin Guangxi 541004, China

Abstract

The edge attack and location semantic attack can easily infer the user's location according to the surrounding environment of the mobile user's activity, thus the user's location privacy is revealed. Aiming at this problem, this paper proposed a location semantic security privacy protection method against edge attack. The method defined a concept named as road privacy which combined road sensitivity and road relevance. The road privacy revealed the sensitivity of the road in semantic location, and the equilibrium of the users number among the user road and other roads in the anonymity set. Based on the central server structure, according to the user's location privacy requirements, the proposed method selected the road with the lowest road privacy and added the road to the anonymity set using a breadth-first search method. Finally it built a anonymity set with semantic security and anti-edge attacks. The tested results show that the anonymity set created by the proposed method has higher anonymity success rate to 87%, and the ability to resist edge attack and semantic attack is higher than that of the compared algorithms.

Foundation Support

国家自然科学基金资助项目(61862011)
广西自然科学基金资助项目(2018GXNSFAA294036,2018GXNSFAA138116)
广西密码学与信息安全重点实验室项目(GCIS201705)
广西高校云计算与复杂系统重点实验室项目(YF16205)
广西可信软件重点实验室基金资助项目(kx201622)
广西研究生教育创新计划资助项目(YCSW2018138)

Publish Information

DOI: 10.19734/j.issn.1001-3695.2019.10.0681
Publish at: Application Research of Computers Printed Article, Vol. 38, 2021 No. 2
Section: Technology of Information Security
Pages: 559-563
Serial Number: 1001-3695(2021)02-046-0559-05

Publish History

[2021-02-05] Printed Article

Cite This Article

张润莲, 赵新红, 武小年. 一种防边权和语义攻击的位置隐私保护方法 [J]. 计算机应用研究, 2021, 38 (2): 559-563. (Zhang Runlian, Zhao Xinhong, Wu Xiaonian. Location privacy protection method against edge attacks and semantic attacks [J]. Application Research of Computers, 2021, 38 (2): 559-563. )

About the Journal

  • Application Research of Computers Monthly Journal
  • Journal ID ISSN 1001-3695
    CN  51-1196/TP

Application Research of Computers, founded in 1984, is an academic journal of computing technology sponsored by Sichuan Institute of Computer Sciences under the Science and Technology Department of Sichuan Province.

Aiming at the urgently needed cutting-edge technology in this discipline, Application Research of Computers reflects the mainstream technology, hot technology and the latest development trend of computer application research at home and abroad in a timely manner. The main contents of the journal include high-level academic papers in this discipline, the latest scientific research results and major application results. The contents of the columns involve new theories of computer discipline, basic computer theory, algorithm theory research, algorithm design and analysis, blockchain technology, system software and software engineering technology, pattern recognition and artificial intelligence, architecture, advanced computing, parallel processing, database technology, computer network and communication technology, information security technology, computer image graphics and its latest hot application technology.

Application Research of Computers has many high-level readers and authors, and its readers are mainly senior and middle-level researchers and engineers engaged in the field of computer science, as well as teachers and students majoring in computer science and related majors in colleges and universities. Over the years, the total citation frequency and Web download rate of Application Research of Computers have been ranked among the top of similar academic journals in this discipline, and the academic papers published are highly popular among the readers for their novelty, academics, foresight, orientation and practicality.


Indexed & Evaluation

  • The Second National Periodical Award 100 Key Journals
  • Double Effect Journal of China Journal Formation
  • the Core Journal of China (Peking University 2023 Edition)
  • the Core Journal for Science
  • Chinese Science Citation Database (CSCD) Source Journals
  • RCCSE Chinese Core Academic Journals
  • Journal of China Computer Federation
  • 2020-2022 The World Journal Clout Index (WJCI) Report of Scientific and Technological Periodicals
  • Full-text Source Journal of China Science and Technology Periodicals Database
  • Source Journal of China Academic Journals Comprehensive Evaluation Database
  • Source Journals of China Academic Journals (CD-ROM Version), China Journal Network
  • 2017-2019 China Outstanding Academic Journals with International Influence (Natural Science and Engineering Technology)
  • Source Journal of Top Academic Papers (F5000) Program of China's Excellent Science and Technology Journals
  • Source Journal of China Engineering Technology Electronic Information Network and Electronic Technology Literature Database
  • Source Journal of British Science Digest (INSPEC)
  • Japan Science and Technology Agency (JST) Source Journal
  • Russian Journal of Abstracts (AJ, VINITI) Source Journals
  • Full-text Journal of EBSCO, USA
  • Cambridge Scientific Abstracts (Natural Sciences) (CSA(NS)) core journals
  • Poland Copernicus Index (IC)
  • Ulrichsweb (USA)