期刊文献+

基于移动终端位置的隐私泄露及隐私保护方法概述 被引量:2

Overview of Privacy Disclosure and Privacy Protection Methods Based on Mobile Terminal Location
在线阅读 下载PDF
导出
摘要 随着移动终端的普及和基于位置服务(location-based services,LBS)的发展,移动定位技术在移动互联网中得到了广泛应用.然而该技术在带给人们便利的同时也带来了诸如用户隐私泄露的安全性风险.介绍了几种重要的移动定位技术,包括卫星定位技术、基站定位技术、第三方服务定位技术以及它们各自的特点,分析了移动终端位置隐私保护面临的主要问题与相关研究工作,提出了几种移动终端位置隐私保护技术与方法,最后根据当前定位服务的位置隐私保护方法提出了改进模型. With the popularity of mobile terminals and the development of location-based services,mobile location technology has been widely applied in mobile Internet. However,mobile location technology brings convenience to people as well as security risks such as user privacy leakage. This paper introduces several important mobile positioning technologies such as satellite positioning technology, base station location technology and third party services positioning technology, and introduces their respective characteristics. This paper analyzes the main problems and related research work of mobile terminal location privacy protection. We propose several mobile terminal location privacy preserving technologies and methods. Finally, an improved model is proposed according to the current location privacy protection method of location service.
作者 李彬 高宗宁 崔苏 Li Bin;Gao Zongning;and Cui Su(Institute of Information Engineering,Chinese Academy of Sciences,Beij ing 100195)
出处 《信息安全研究》 2018年第8期698-703,共6页 Journal of Information Security Research
关键词 移动终端 定位技术 基于位置服务 隐私保护 位置隐私 mobile terminal positioning technology location based services privacy protection location privacy
  • 相关文献

参考文献1

二级参考文献42

  • 1Jcsang A, Ismail R, Boyd C. A survey of trust and reputa- tion systems for online service provision. Decision Support Systems, 2007, 43(2): 618-644.
  • 2Cho J H, Swami A, Chen I R. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 2011, 13(4): 562-583.
  • 3Sun Y, Yu W, Han Z et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 305-317.
  • 4Theodorakopoulos G, Baras J. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 318-328.
  • 5Guo L, Zhu X, Zhang C et al. A multi-hop privacypreserving reputation scheme in online social networks. In Proc. IEEE GLOBECOM, Dec. 2011.
  • 6Jesang A. An algebra for assessing trust in certification chains. In Proc. NDSS, Feb. 1999.
  • 7Capkun S, Buttyan L, Hubaux J P. Self-organized publickey management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2003, 2(1): 52-64.
  • 8Zhang C, Song Y, Fang Y. Modeling secure connectivity of self-organized wireless ad hoc networks. In Proc. the 27th IEEE INFO COM, April 2008.
  • 9Guo L, Zhang C, Fang Y. A trust-based privacy-preserving friend recommendation scheme for online .social networks. IEEE Transactions on Dependable and Secure Computing 2014, PP(99): l.
  • 10Lin P, Chung PC, Fang Y. P2P-iSN: A peer-to-peer architecture for heterogeneous social networks. IEEE Networks, 28(1): 56-64.

共引文献4

同被引文献27

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部