博碩士論文 995202059 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:8 、訪客IP:3.236.18.161
姓名 張柔止(Jou-chih Chang)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱
(Exploring Spatial-Temporal Cloaking Against Correlation Attacks for Location-based Services)
相關論文
★  Dynamic Overlay Construction for Mobile Target Detection in Wireless Sensor Networks★ 車輛導航的簡易繞路策略
★ 使用傳送端電壓改善定位★ 利用車輛分類建構車載網路上的虛擬骨幹
★ Why Topology-based Broadcast Algorithms Do Not Work Well in Heterogeneous Wireless Networks?★ 針對移動性目標物的有效率無線感測網路
★ 適用於無線隨意網路中以關節點為基礎的分散式拓樸控制方法★ A Review of Existing Web Frameworks
★ 將感測網路切割成貪婪區塊的分散式演算法★ 無線網路上Range-free的距離測量
★ Inferring Floor Plan from Trajectories★ An Indoor Collaborative Pedestrian Dead Reckoning System
★ Dynamic Content Adjustment In Mobile Ad Hoc Networks★ 以影像為基礎的定位系統
★ 大範圍無線感測網路下分散式資料壓縮收集演算法★ 車用WiFi網路中的碰撞分析
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在現今的社會中,如行動電話、PDA、平板電腦等等行動裝置(mobile device)通常都搭配了GPS,這使得攜帶這些行動裝置的使用者們可以很方便地使用適地性服務(location-based services)的功能。在使用適地性服務時,使用者發送自己目前所在的位置以詢問POIs。但是,保持位置資訊的私密性是非常重要的。如果一個使用者無論走到哪裡都被持續地監控,他的行蹤可能會很容易地被人掌握。為了避免暴露使用者的行蹤,在適地性服務中位置資訊應該要受到妥善的保護。
我們利用遮蔽(cloaking) 的概念來保護使用者的位置資訊,伺服器端接受一個包含了使用者的區域位置,來取代原本使用者的確切位置。但是,傳統的遮蔽系統受到關連式攻擊(correlation attacks)的影響。藉由觀察遮蔽區域(cloaking region)中行動裝置的移動情形,敵人可以過濾出特定的使用者。為了提供更好的位置資訊保護,在這篇論文中,我們介紹了間諜遮蔽系統(spy-based cloaking system)。在我們的方法中,我們使用數個間諜來做為保護真正使用者的掩護。模擬結果顯示,雖然這個方法將造成較大的負擔,但是間諜遮蔽系統能夠提供更加完善的位置資訊隱私保護來抵禦關連式攻擊。
摘要(英) Nowadays, mobile devices are commonly embedded with GPS, such as cell phones, PDAs, and Tablet PCs. This allows people carrying in these mobile devices to enjoy the convenience of location-based services. In LBSs, a user commonly sends its own location to query for POIs. However, the privacy of the location information is very important. If a user whereabout is monitored continuously, his/her activities can be easily inferred. To avoid the exposure of the user’s activity, the location information should be protected in location-based services.
The concept of cloaking has been introduced to protect the user’s location information. In cloaking system, an area containing the user’s location is sent to the server for query instead of the user’s true location. However, the traditional cloaking systems suffer from correlation attacks. By observing the traffic of the cloaking region, an adversary can eventually identify a particular client. To provide better location privacy protection, in this thesis we introduce the spy-based cloaking system. In our system, a number of spies are used as the disguise to protect the true identity of the client. The simulation results show that, albeit the higher communication overhead, the proposed spy-based cloaking system is able to provide a much stronger location information privacy protection against correlation attacks.
關鍵字(中) ★ 行動裝置
★ 適地性服務
★ 遮蔽
★ 關連式攻擊
關鍵字(英)
論文目次 1 Introduction 1
2 Related Work 3
2.1 Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2 Spatial Cloaking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
3 Preliminary 7
3.1 System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Peer-to-peer Spatial Cloaking Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
3.3 Motivations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4 Proposed Techniques 13
4.1 Spy-based Spatial Cloaking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
4.2 Correlation Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
4.3 The Issue of Power Consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5 Performance Evaluation 21
5.1 Effect of Node Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
5.2 Effect of K-anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
5.3 Overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
6 Conclusion 30
參考文獻 [1] Foxs News. Man Accused of Stalking Ex-Girlfriend With GPS. http://www.foxnews.com/story/0,2933,131487,00.html. Sep 04, 2004.
[2] Mike Spreitzer and Marvin Theimer. Providing location information in a ubiquitous computing environment (panel session). In Proceedings of the fourteenth ACM symposium on Operating systems principles, pages 270V 283. ACM Press, 1993.
[3] Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, and Paul Webster. The anatomy of a context-aware application. In Mobile Computing and Networking, pages 59V68, 1999.
[4] Rui Jose and Nigel Davies. Scalable and flexible locationbased services for ubiquitous information access. In Proceedings of First International Symposium on Handheld
and Ubiquitous Computing, HUC99, pages 52V66. Springer Verlag, 1999.
[5] C. Bisdikian, J. Christensen, J. Davis II, M. Ebling, G. Hunt, W. Jerome, H. Lei, and S. Maes. Enabling location-based applications. In 1st Workshop on Mobile commerce, 2001.
[6] D. Chaum. Untraceable electronic mail, return addresses,and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
[7] D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2):39V41, 1999.
[8] M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security, 1(1):66V92, June 1998.
[9] A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46V55, 2003.
[10] M. Gruteser and D. Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, in USENIX MobiSys, pp. 31V42, 2003.
[11] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, The New Casper: Query Processing for Location Services without Compromising Privacy, in VLDB, pp. 763V774, 2006.
[12] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, Preventing Location-Based Identity Inference in Anonymous Spatial Queries, IEEE TKDE, to appear.
[13] B. Gedik and L. Liu, Location Privacy in Mobile Systems: A Personalized Anonymization Model, in ICDCS, pp. 620V629, 2005.
[14] Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: WCNC, pp. 1187V1192 (2005)
[15] T. Xu, Y. Cai. Location cloaking for safety protection of ad hoc networks, in: Proceedings of IEEE INFOCOM09, Rio de Janeiro, Brazil, 2009.
[16] H. Kido, Y. Yanagisawa, and T. Satoh, An Anonymous Communication Technique using Dummies for Location-based Services, in IEEE International Conference on Pervasive Services, p. 1248, 2005.
[17] C.-Y. Chow, M. F. Mokbel, and X. Liu, A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services, in GIS, pp. 171V 178, 2006.
[18] G. Ghinita, P. Kalnis, and S. Skiadopoulos, PRIV E: Anonymous Location-Based Queries in Distributed Mobile Systems, in WWW, pp. 371V380, 2007.
[19] G. Ghinita and P. Kalnis and S. Skiadopoulos, MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries, in SSTD, pp. 758V769, 2007.
[20] P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, 1998.
[21] http://www.netlab.tkk.fi/ esa/java/rwp/rwp-model.shtml
指導教授 孫敏德(Min-te Sun) 審核日期 2013-1-23
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明