Research on k-anonymity privacy protection scheme based on bilinear pairings

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:winyx000
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Aimed at enhancing privacy protection of location-based services (LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is proposed.In circular region of Euclidian distance,mobile terminal evenly generates some false locations,from which half optimal false locations are screened out according to position entropy,location and mapping background information.The anonymity obtains the effective guarantee,so as to realize privacy protection.Through security analyses,the scheme is proved not only to be able to realize such security features as privacy,anonymity and non-forgeability,but also able to resist query tracing attack.And the result of simulation shows that this scheme not only has better evenness in selecting false locations,but also improves efficiency in generating and selecting false nodes.
其他文献
In order to overcome the poor generalization ability and low accuracy of traditional network traffic prediction methods,a prediction method based on improved artificial bee colony (ABC) algorithm optimized error minimized extreme learning machine (EM-ELM)
The explosive increase of smart devices and mobile traffic results in heavy burden on backhaul and core network,intolerable network latency and degraded service to the end-users.As a complement to core network,edge network contributes to relieving network
The underflow concentration prediction of deep-cone thickener is a difficult problem in paste filling.The existing prediction model only determines the influence of some parameters on the underflow concentration,but lacks a prediction model that comprehen
An isotropic electromagnetic (EM) lens based on Huygens\' metasurface is proposed for 28.0 GHz lens antenna design.The lens consists of a series of non-resonant and subwavelength metallic patterns etched on both sides of an ultrathin dielectric substrat
Traditional virtual private networks (VPNs) are conditional security.In order to ensure the security and confidentiality of user data transmission,a model of quantum VPN based on Internet protocol security (IPSec)protocol is proposed.By using quantum keys
There are many people in China who suffered from physical and mental diseases and need physical and psychological rehabilitation.Traditional treatments can work in rehabilitation,but will take much money and labor.In recent years,virtual reality (VR) tech
The compressed sensing matrices based on affine symplectic space are constructed.Meanwhile,a comparison is made with the compressed sensing matrices constructed by DeVore based on polynomials over finite fields.Moreover,we merge our binary matrices with o
Edge is the intrinsic geometric structure of an image.Edge detection methods are the key technologies in the field of image processing.In this paper,a multi-scale image edge detection method is proposed to effectively extract image geometric features.A so
As different requirements on mobility support will be introduced by diversified communication scenarios in the fifth generation (5G),on demand mobility management is put forward to simplify signaling process,reduce terminal power consumption,improve netwo
A high resolution and fast conversion rate time-to-digital converter (TDC) design based on time amplifier (TA) is proposed.The pulse-train TA employs a two-step scheme.The input time interval is first amplified by a N-times TA and the effective time is ex