用户名: 密码: 验证码:
基于空间k-匿名的位置隐私保护技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,具备全球定位系统GPS (Global Positioning System)和互联网功能的移动设备已经变得非常普遍,人们使用这些设备通过基于位置的服务LBS (Location-BasedServices)可以很方便地获取所需的信息。但人们在享受这些服务的同时,也引发了严重的隐私问题,因为LBS需要依据用户的地理位置检索信息。如果攻击者知晓用户的精确位置,那么他可能从用户的查询位置(如医院等)推测出敏感信息。因此,当人们使用LBS时有必要引入位置隐私保护机制。对于不同的隐私保护目标和不同的攻击模型,有着不同的保护方法,其中大多数方法利用空间k-匿名的概念保护用户隐私。这些方法通常基于可信第三方TTP (Trusted Third Parties)组件实现匿名。
     文中首先系统评估了现有位置隐私保护方法的适用性和有效性,引入了攻击分类,并分析了现有方法的保护目标和抗攻击能力。然后基于用户—匿名器—LBS架构,分别针对欧氏空间和路网环境的位置隐私保护、常见查询等问题进行了研究。具体内容如下。
     首先,提出了空间k-匿名共匿算法。不仅保证了共匿性要求,而且由于采用通用的空间索引技术,如R*-树或Quard-树,所以在保证匿名要求的同时,还支持其它类型的查询。在此基础上,提出了一种新型调节中值分割方法,以提高查询效率和有效性。并且文中还提出了一种基于位置敏感哈希分割的空间k-匿名算法,该算法具有保距性和适度的计算复杂度,还可以作为分割方法来使用。
     其次,提出了路网环境下移动服务隐私保护的通用模型StarGCloaking。主要有三个特性:支持路网、个性化隐私和服务质量QoS (Quality of Service)需求;在抗攻击能力和匿名查询的处理成本方面取得平衡;基于星图的隐私保护模式以及多重优化实现,支持大量移动用户不同的服务需求。
     再次,提出保护路网用户隐私的隐匿算法HSGCloaking。通过将星形网络节点进行希尔伯特排序满足每个用户的共匿条件。框架支持k-最近邻居k-NN (k-NearestNeighbor)和范围查询,并提出了这两种常见查询的处理算法。
     最后,基于理论分析和实验验证,证明了上述算法的正确性和有效性。
In recent years, mobile devices enabled with GPS and Internet access have becomeextremely common. People use these devices to obtain information easily through locationbased services (LBS). Although these services are very popular, their usage can also raisesevere privacy concerns because LBS provides customized information based on a user’sgeographic location. For example, an adversary may infer sensitive information fromprecise user positions (such as hospital). Therefore, mechanisms for protecting locationprivacy are mandatory when using LBSs. Available location privacy approaches differwith respect to the protected information and the considered attacker model. Most of themimplement the concept of k-anonymity to protect the user’s privacy. These methodsusually rely on the use of trusted third parties (TTP) such as anonymous servers.
     This thesis assess the applicability and effectiveness of location privacy approachessystematically firstly. A classification of possible attacks that try to reveal the protectedinformation introduced. It analyzes existing approaches with respect to their protectiongoals and their ability to resists the introduced attacks. Then it implements researches onsome key issues such as location privacy protection, general queries in Euclidean spaceand road network condition based on user-anonymizer-LBS framework. The completeresearch is outlined below:
     Firstly, a general framework for implementing reciprocal algorithms using anyexisting spatial index (such as R*-trees and Quad-trees) on the user locations is proposed.Moreover, since employing general-purpose spatial indices, the proposed system is notlimited to anonymization, but supports conventional spatial queries as well. At the sametime, an adjusted median splits method is provided, aimed on effectiveness and efficiency.And a spatial k-anonymity algorithm based on locality-sensitive hashing partition isproposed. The algorithm is shown to preserve both locality and moderate computationcomplexity. It can also be used as splits method.
     Secondly, a general model for privacy-aware mobile services over road networks(StarGCloaking) is proposed. StarGCloaking has three distinct features: it supports road-network-specific, personalized privacy and quality of service (QoS) requirements ona per request basis; it strikes a balance between the attack resilience of the performedprotection and the processing cost of the anonymous query; it scales to support a largenumber of mobile users with varying service requirements, through a star-graph basedprivatization model, powered by multi-folded optimizations in implementation.
     Thirdly, an HSGCloaking algorithm to protect users’ privacy in road network isproposed. It orders the nodes of a star network by using Hilbert order to meet thereciprocity condition of every user. The cloaking framework supports k-nearest neighbor(k-NN) and range queries by presenting two query processing algorithms.
     Finally, the correctness and validity of the above algorithms are proved by thetheoretical analysis and experimental verification.
引文
[1] A.R. Beresford, F. Stajano. Location Privacy in Pervasive Computing[J]. IEEE PervasiveComputing,2003,2(1):46-55.
    [2] C. Bettini, S. Wang, S. Jagodia. Protecting Privacy against Location-Based PersonalIdentification[C]//VLDB Workshop on Secure Data Management, Trondheim, Norway,2005,3674:185-199.
    [3] Latanya Sweeney. K-Anonymity: A Model for Protecting Privacy[J]. International Journal ofUncertainty, Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
    [4] P. Samarati. Protecting Respondents Identities in Microdata Release[J]. IEEE Transactions onKnowledge and Data Engineering,2001,13(6):1010-1027.
    [5] R.J. Bayardo, R. Agrawal. Data Privacy through Optimal k-Anonymization[C]//Proceedings ofthe21st International Conference on Data Engineering,2005:217-228.
    [6] K. LeFevre, D.J. DeWitt, R. Ramakrishnan. Incognito: Efficient Full-Domain K-Anonymity[C]//Proceedings of the2005ACM SIGMOD International Conference on Management of Data,2005:49-60.
    [7] K. LeFevre, D.J. DeWitt, R. Ramakrishnan. Mondrian Multidimensional K-Anonymity[C]//Proceedings of the22nd International Conference on Data Engineering,2006:25.
    [8] T. Iwuchukwu, F. Jeffrey, J. Naughton. K-Anonymization as Spatial Indexing: Toward Scalableand Incremental Anonymization[C]//Proceedings of the33rd International Conference on VeryLarge Data Bases,2007:746-757.
    [9] G. Aggarwal, T. Feder, K. Kenthapadi, et al. Achieving Anonymity via Clustering[C]//Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles ofDatabase Systems,2006:153-162.
    [10] J. Xu, W. Wang, J. Pei, et al. Utility-Based Anonymization Using Local Recoding[C]//Proceedings of the12th ACM SIGKDD International Conference on Knowledge Discovery AndData Mining,2006:785-79.
    [11] A. Machanavajjhala, D. Kifer, J. Gehrke, et al. L-Diversity: Privacy beyond k-Anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):3.
    [12] G. Ghinita, P. Karras, P. Kalnis, et al. Fast Data Anonymization with Low Information Loss[C]//Proceedings of the33rd International Conference on Very Large Data Bases,2007:758-769.
    [13] X. Xiao, Y. Tao. Anatomy: Simple and Effective Privacy Preservation[C]//Proceedings of the32nd International Conference on Very Large Data,2006:139-150.
    [14] Q. Zhang, N. Koudas, D. Srivastava, et al. Aggregate Query Answering on AnonymizedTables[C]//IEEE International Conference on Data Engineering,2007,7:116-125.
    [15] C. Chow, M.F. Mokbel, X. Liu. A Peer-to-Peer Spatial Cloaking Algorithm for AnonymousLocation-Based Services[C]//Proceedings of the14th Annual ACM International Symposium onAdvances in Geographic Information Systems, New York,2006:171-178.
    [16] M.F. Mokbel. Privacy in Location-Based Services: State-of-the-Art and Research Directions[C]//IEEE International Conference on Mobile Data Management,2007:228-228.
    [17] D. Pedreschi, F. Bonchi, F. Turini, et al. Privacy Protection: Regulations and Technologies,Opportunities and Threats[M]//Mobility, Data Mining and Privacy. Springer,2008:101-119.
    [18] C.A. Ardagna, M. Cremonini, E. Damiani, et al. Location Privacy Protection throughObfuscation-Based Techniques[M]//Data and Applications Security XXI. Springer BerlinHeidelberg,2007:47-60.
    [19] P. Kalnis, G. Ghinita, K. Mouratidis, et al. Preventing Location-Based Identity Inference inAnonymous Spatial Queries[J]. IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
    [20] A. Solanas, J. Domingo-Ferrer, A. Martínez-Ballesté. Location Privacy in Location-BasedServices: Beyond TTP-Based Schemes[C]//Proceedings of the1st International Workshop onPrivacy in Location-Based Applications (PILBA).2008:12-23.
    [21] K. Barker, M. Askari, M. Banerjee, et al. A Data Privacy Taxonomy[M]//Dataspace: The FinalFrontier. Springer Berlin Heidelberg,2009:42-54.
    [22] A. Khoshgozaran, C. Shahabi. A Taxonomy of Approaches to Preserve Location Privacy inLocation-Based Services [J]. International Journal of Computational Science and Engineering,2010,5(2):86-96.
    [23] C. Bettini, S. Mascetti, X.S. Wang, et al. Anonymity and Historical-Anonymity inLocation-Based Services[M]//Privacy in Location-Based Applications. Springer BerlinHeidelberg,2009:1-30.
    [24] J. Krumm. A Survey of Computational Location Privacy[J]. Personal and Ubiquitous Computing,2009,13(6):391-399.
    [25] P. Gilbert, L.P. Cox, J. Jung, et al. Toward Trustworthy Mobile Sensing[C]//Proceedings of theEleventh Workshop on Mobile Computing Systems&Applications. ACM,2010:31-36.
    [26] P. Golle, K. Partridge. On the Anonymity of Home/work Location Pairs[M]//PervasiveComputing. Springer Berlin Heidelberg,2009:390-397.
    [27] M.L. Damiani, E. Bertino, C. Silvestri. Protecting Location Privacy against Spatial Inferences:the PROBE Approach[C]//Proceedings of the2nd SIGSPATIAL ACM GIS2009InternationalWorkshop on Security and Privacy in GIS and LBS. ACM,2009:32-41.
    [28] T. Wang, L. Liu. From Data Privacy to Location Privacy[M]//Machine Learning in Cyber Trust.Springer US,2009:217-246.
    [29] C.Y. Chow, M.F. Mokbel. Trajectory Privacy in Location-Based Services and Data Publication[J].ACM SIGKDD Explorations Newsletter,2011,13(1):19-29.
    [30] H. Kido, Y. Yanagisawa, T. Satoh. An Anonymous Communication Technique Using Dummiesfor Location-Based Services[C]//IEEE International Conference on Pervasive Services,2005:88-97.
    [31] P. Shankar, V. Ganapathy, L. Iftode. Privately Querying Location-Based Services withSybilquery[C]//Proceedings of the11th International Conference on Ubiquitous Computing.ACM,2009:31-40.
    [32] A.R. Beresford, F. Stajano. Mix Zones: User Privacy in Location-Aware Services[C]//PerComWorkshops.2004:127-131.
    [33] B. Palanisamy, L. Liu. Mobimix: Protecting Location Privacy with Mix-Zones over RoadNetworks[C]//IEEE27th International Conference on Data Engineering,2011:494-505.
    [34] M. Gruteser, D. Grunwald. Anonymous Usage of Location-Based Services through Spatial andTemporal Cloaking[C]//Proceedings of the1st International Conference on Mobile Systems,Applications and Services. ACM,2003:31-42.
    [35] M.F. Mokbel, C.Y. Chow, W.G. Aref. The New Casper: Query Processing for Location Serviceswithout Compromising Privacy[C]//Proceedings of the32nd International Conference on VeryLarge Data Bases. VLDB Endowment,2006:763-774.
    [36] B. Gedik, L. Liu. Location Privacy in Mobile Systems: A Personalized AnonymizationModel[C]//International Conference on Distributed Computing Systems,2005:620-629.
    [37] B. Gedik, L. Liu. Protecting Location Privacy with Personalized K-Anonymity: Architecture andAlgorithms[J]. IEEE Transactions On Mobile Computing,2008,7(1):1-18.
    [38] C. Zhang, Y. Huang. Cloaking Locations for Anonymous Location based Services: A HybridApproach[J]. Geoinformatica,2009,13(2):159-182.
    [39] G. Ghinita, P. Kalnis, S. Skiadopoulos. Prive: Anonymous Location-Based Queries in DistributedMobile Systems[C]//Proceedings of the16th International Conference on World Wide Web. NewYork, NY, USA, ACM,2007:371-380.
    [40] N. Talukder, S.I. Ahamed. Preventing Multi-Query Attack in Location-Based Services[C]//Proceedings of the Third ACM Conference on Wireless Network Security. New York, NY, USA,ACM,2010:25-36.
    [41] B. Bamba, L. Liu, P. Pesti, et al. Supporting Anonymous Location Queries in MobileEnvironments with Privacygrid[C]//Proceeding of the17th International Conference on WorldWide Web. New York, NY, USA, ACM,2008:237-246.
    [42] N. Li, T. Li, S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity andl-Diversity[C]//Proceedings of the IEEE23rd International Conference on Data Engineering,2007:106-115.
    [43] A. Solanas, F. Sebé, J. Domingo-Ferrer. Micro-Aggregation-Based Heuristics for p-Sensitivek-Anonymity: One Step Beyond[C]//Proceedings of the2008International Workshop on Privacyand Anonymity in Information Society. New York, NY, USA, ACM,2008,61-69.
    [44] S. Mascetti, C. Bettini, X.S. Wang, et al. An algorithm to Preserve Historical k-Anonymity inLBS[C]//IEEE International Conference on Mobile Data Management. Los Alamitos, CA, USA,IEEE Computer Society,2009:172-181.
    [45] O. Abul, F. Bonchi, M. Nanni. Never Walk Alone: Uncertainty for Anonymity in Moving ObjectsDatabases[C]. IEEE24th International Conference on Data Engineering,2008:376-385.
    [46] G. Ghinita, P. Kalnis, S. Skiadopoulos. MOBIHIDE: a Mobile Peer-to-Peer System forAnonymous Location-Based Queries[C]//Proceedings of the10th International Conference onAdvances in Spatial and Temporal Databases. Springer-Verlag Berlin,2007:221-238.
    [47] C.Y. Chow, M.F. Mokbel, X. Liu. Spatial Cloaking for Anonymous Location-Based Services inMobile Peer-to-Peer Environments[J]. GeoInformatica,2011,15(2):351-380.
    [48] H. Hu, J. Xu. Non-Exposure Location Anonymity[C]//IEEE25th International Conference onData Engineering,2009:1120-1131.
    [49]黄毅,霍峥,孟小峰. CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985.
    [50]薛姣,刘向宇,杨晓春等.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,34(5):865-878.
    [51]彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011,33(5):1211-1216.
    [52]周傲英,杨彬,金澈清等.基于位置的服务:架构与进展[J].计算机学报,2011,34(7):1155-1171.
    [53]潘晓,郝兴,孟小峰.基于位置服务中的连续查询隐私保护研究[J].计算机研究与发展,2010,47(1):121-129.
    [54] R. Cheng, Y. Zhang, E. Bertino, S. Prabhakar. Preserving User Location Privacy in Mobile DataManagement Infrastructures[C]//6th Workshop on Privacy Enhancing Technologies. SpringerBerlin/Heidelberg,2006,4258:393-412.
    [55] M. Duckham, L. Kulik. A Formal Model of Obfuscation and Negotiation for LocationPrivacy[C]//Proceedings of the International Conference on Pervasive Computing,2005:152-170.
    [56] A. Gutscher. Coordinate Transformation-a Solution for the Privacy Problem of Location BasedServices?[C]//IEEE20th International Parallel and Distributed Processing Symposium,2006:7.
    [57] M.L. Yiu, C.S. Jensen, J. M ller, et al. Design and Analysis of a Ranking Approach to PrivateLocation-Based Services[J]. ACM Transactions on Database Systems,2011,36(2):1-42.
    [58] T. Hashem, L. Kulik, R. Zhang. Privacy Preserving Group Nearest Neighbor Queries[C]//Proceedings of the13th International Conference on Extending Database Technology. New York,USA, ACM Press,2010:489-500
    [59] G. Ghinita, M.L. Damiani, C. Silvestri, et al. Preventing Velocity-Based Linkage Attacks inLocation-Aware Applications[C]//Proceedings of the17th ACM SIGSPATIAL InternationalConference on Advances in Geographic Information Systems. ACM,2009:246-255.
    [60] J.G. Lee, J. Han, K. Y. Whang. Trajectory Clustering: a Partition-and-Group Framework[C]//Proceedings of the2007ACM SIGMOD International Conference on Management of Data.ACM,2007:593-604.
    [61] M. Terrovitis, N. Mamoulis. Privacy Preservation in the Publication of Trajectories[C]//9thInternational Conference on Mobile Data Management,2008:65-72.
    [62] B. Hoh, M. Gruteser, H. Xiong, et al. Preserving Privacy in GPS Traces via Uncertainty-AwarePath Cloaking[C]//Proceedings of the14th ACM Conference on Computer and communicationssecurity. ACM,2007:161-171.
    [63] B. Hoh, M. Gruteser, R. Herring, et al. Virtual Trip Lines for Distributed Privacy-PreservingTraffic Monitoring[C]//Proceedings of the6th International Conference on Mobile Systems,Applications, and Services. ACM,2008:15-28.
    [64] C.A. Ardagna, M. Cremonini, G. Gianini. Landscape-Aware Location-Privacy Protection inLocation-Based Services[J]. Journal of Systems Architecture,2009,55(4):243-254.
    [65] M.L. Damiani, E. Bertino, C. Silvestri. The PROBE Framework for the Personalized Cloaking ofPrivate Locations[J]. Transactions on Data Privacy,2010,3(2):123-148.
    [66] S. Mascetti, D. Freni, C. Bettini, et al. Privacy in Geo-Social Networks: Proximity Notificationwith Untrusted Service Providers and Curious Buddies[J]. The VLDB Journal—The InternationalJournal on Very Large Data Bases,2011,20(4):541-566.
    [67] G. Ghinita, P. Kalnis, A. Khoshgozaran, et al. Private Queries in Location Based Services:Anonymizers are not Necessary[C]//Proceedings of the2008ACM SIGMOD InternationalConference on Management of Data. ACM,2008:121-132.
    [68] G.F. Marias, C. Delakouridis, L. Kazatzopoulos, et al. Location Privacy through Secret SharingTechniques[C]//Sixth IEEE International Symposium on World of Wireless Mobile andMultimedia Networks,2005:614-620.
    [69] F. Dürr, P. Skvortsov, K. Rothermel. Position Sharing for Location Privacy in Non-TrustedSystems[C]//Proceedings of the9th IEEE International Conference on Pervasive Computing andCommunications,2011:189-196.
    [70] P. Skvortsov, F. Dürr, K. Rothermel. Map-Aware Position Sharing for Location Privacy inNon-Trusted Systems [M]//Pervasive Computing. Springer Berlin Heidelberg,2012:388-405.
    [71] M. Wernke, F. Dürr, K. Rothermel. PShare: Position Sharing for Location Privacy Based onMulti-Secret Sharing[C]//Proceedings of the10th IEEE International Conference on PervasiveComputing and Communications,2012:153-161.
    [72] C.W. Chan, C.C. Chang. A Scheme for Threshold Multi-Secret Sharing[J]. Applied Mathematicsand Computation,2005,166(1):1-14.
    [73] R. Shokri, G. Theodorakopoulos, J.Y. Le Boudec, et al. Quantifying Location Privacy[C]//IEEESymposium on Security and Privacy,2011:247-262.
    [74] M. Wernke, P. Skvortsov, F. Dürr, et al. A Classification of Location Privacy Attacks andApproaches[J]. Personal and Ubiquitous Computing,2014,18(1):163-175.
    [75] G. Ghinita, K. Zhao, D. Papadias, et al. A Reciprocal Framework for Spatial K-anonymity [J].Information Systems,2010,35(3):299-314.
    [76] A.R. Butz. Alternative Algorithm for Hilbert's Space-Filling Curve[J]. IEEE Transactions onComputers,1971, C-20(4):424-426.
    [77] A. Khoshgozaran, C. Shahabi. Blind Evaluation of Nearest Neighbor Queries Using SpaceTransformation to Preserve Location Privacy[M]//Advances in Spatial and Temporal Databases.Springer Berlin Heidelberg,2007:239-257.
    [78] B. Hoh, M. Gruteser. Protecting Location Privacy through Path Confusion[C]//Proceedings ofthe First International Conference on Security and Privacy for Emerging Areas inCommunications Networks,2005:194-205.
    [79] A. Khoshgozaran, C. Shahabi, H. Shirani-Mehr. Location Privacy: Going beyond K-anonymity,Cloaking and Anonymizers[J]. Knowledge and Information Systems,2011,26(3):435-465.
    [80] G. Ghinita, P. Kalnis, M. Kantarcioglu, et al. Approximate and Exact Hybrid Algorithms forPrivate Nearest-neighbor Queries with Database Protection[J]. GeoInformatica,2011,15(4):699-726.
    [81] K. Mouratidis, M.L. Yiu. Anonymous Query Processing in Road Networks[J]. IEEE Transactionon Knowledge and Data Engineering,2010,22(1):2-15.
    [82] C.Y. Chow, M.F. Mokbel, J. Bao. Query-Aware Location Anonymization for Road Networks[J].GeoInformatica,2011,15(3):571-607.
    [83] M. Datar, N. Immorlica, P. Indyk, et al. Locality-Sensitive Hashing Scheme Based on p-stableDistributions[C]//Proceedings of the Twentieth Annual Symposium on Computational Geometry.ACM,2004:253-262.
    [84] J. Broch, D.A. Maltz, D.B. Johnson, et al. A Performance Comparison of Multi-hop Wireless adhoc Network Routing Protocols[C]//Proceedings of the4th Annual ACM/IEEE InternationalConference on Mobile Computing and Networking. ACM,1998:85-97.
    [85] E. Hyyti, J. Virtamo. Random Waypoint Mobility Model in Cellular Networks[J]. WirelessNetworks,2007,13(2):177-188.
    [86] B. Gedik and L. Liu. A Customizable K-Anonymity Model for Protecting Location Privacy[C]//The25th International Conference on Distributed Computing Systems,2005:620-629.
    [87] G. Ghinita, P. Kalnis, and S. Skiadopoulos. Prive: Anonymous Location Based Queries inDistributed Mobile Systems[C]//Proceedings of the16th International Conference on WorldWide Web,2007:371-380.
    [88] M. Yiu, C. Jensen, X. Huang, et al. Spacetwist: Managing the Trade-offs among Location Privacy,Query Performance, and Query Accuracy in Mobile Services[C]//IEEE24th InternationalConference on Data Engineering,2008:366-375.
    [89] H. Federrath, A. Jerichow, A. Pfitzmann. MIXes in Mobile Communication Systems: LocationManagement with Privacy[C]//Information Hiding. Springer Berlin Heidelberg,1996:121-135.
    [90] D. Goldberg, M. Reed, P. Syverson. Onion Routing[J]. Communications of the ACM,1999,42(2):39-41.
    [91] P. Kamat, W. Xu, W. Trappe, et al. Temporal Privacy in Wireless Sensor Networks[C]//IEEE27th International Conference on Distributed Computing Systems,2007:23-23.
    [92] P. Kamat, Y. Zhang, W. Trappe, et al. Enhancing Source-Location Privacy in Sensor NetworkRouting[C]//Proceedings of25th IEEE International Conference on Distributed ComputingSystems,2005:599-608.
    [93] J. Kong and X. Hong. ANODR: Anonymous on Demand Routing with Untraceable Routes forMobile ad-hoc Networks[C]//Proceedings of the4th ACM International Symposium on Mobilead hoc Networking&Computing. ACM,2003:291-302.
    [94] A. Beresford. Location Privacy in Ubiquitous Computing[J]. IEEE Pervasive Computing,2005:612.
    [95] J. Hong, J. Landay. An Architecture for Privacy-Sensitive Ubiquitous Computing[C]//Proceedings of the2nd International Conference on Mobile Systems, Applications, and Services.ACM,2004:177-189.
    [96] W. Ku, R. Zimmermann, W. Peng, et al. Privacy Protected Query Processing on SpatialNetworks[C]//IEEE23rd International Conference on Data Engineering Workshop,2007:215-220.
    [97] H. Cho and C. Chung. An Efficient and Scalable Approach to CNN Queries in a RoadNetwork[C]//Proceedings of the31st International Conference on Very Large Data Bases. VLDBEndowment,2005:865-876.
    [98] H. Hu, J. Xu, D. Lee. A Generic Framework for Monitoring Continuous Spatial Queries overMoving Objects[C]//Proceedings of the2005ACM SIGMOD International Conference onManagement of Data. ACM,2005:479-490.
    [99] M. Kolahdouzan, C. Shahabi. Voronoi-Based k Nearest Neighbor Search for Spatial NetworkDatabases[C]//Proceedings of the Thirtieth International Conference on Very large Data Bases.VLDB Endowment,2004,30:840-851.
    [100] K. Mouratidis, M. Yiu, D. Papadias, et al. Continuous Nearest Neighbor Monitoring in RoadNetworks[C]//Proceedings of the32nd International Conference on Very Large Data Bases.VLDB Endowment,2006:43-54.
    [101] D. Papadias, J. Zhang, N. Mamoulis, et al. Query Processing in Spatial Network Databases[C]//Proceedings of the29th International Conference on Very Large Data Bases. VLDB Endowment,2003,29:802-813.
    [102] F. Li, D. Cheng, M. Hadjieleftheriou, et al. On Trip Planning Queries in Spatial Databases[M]//Advances in Spatial and Temporal Databases. Springer Berlin Heidelberg,2005:273-290.
    [103] T. Brinkhoff. A Framework for Generating Network-Based Moving Objects[J]. GeoInformatica,2002,6(2):153-180.
    [104] W.C. Peng, T.W. Wang, W.S. Ku, et al. A Cloaking Algorithm Based on Spatial Networks forLocation Privacy[C]//IEEE International Conference on Sensor Networks, Ubiquitous andTrustworthy Computing,2008:90-97.
    [105] T. Wang, L. Liu. Privacy-Aware Mobile Services over Road Networks[J]. Proceedings of theVLDB Endowment,2009,2(1):1042-1053.
    [106] J. Bao, H. Chen, W.S. Ku. Pros: a Peer-to-Peer System for Location Privacy Protection on RoadNetworks[C]//Proceedings of the17th ACM SIGSPATIAL International Conference onAdvances in Geographic Information Systems. ACM,2009:552-553.
    [107] H. Wang, R. Zimmermann. Snapshot Location-Based Query Processing on Moving Objects inRoad Networks[C]//Proceedings of the16th ACM SIGSPATIAL International Conference onAdvances in Geographic Information Systems. ACM,2008:50.
    [108] W.S. Ku, Y. Chen, R. Zimmermann. Privacy Protected Spatial Query Processing for AdvancedLocation Based Services[J]. Wireless Personal Communications,2009,51(1):53-65.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700