Çѱ¹°ø°£Á¤º¸ ÇÐȸÁö
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
P2P ȯ°æÀÇ À§Ä¡ ±â¹Ý ¼ºñ½º¿¡¼ ¿¬¼ÓÀûÀÎ ÁúÀÇ Ã³¸®¸¦ Áö¿øÇÏ´Â ±×¸®µå ±â¹Ý Cloaking ¿µ¿ª ¼³Á¤ ±â¹ý |
¿µ¹®Á¦¸ñ(English Title) |
Grid-based Cloaking Area Creation Scheme supporting Continuous Query Processing for Location-based Services of Peer-to-Peer Environment |
ÀúÀÚ(Author) |
±èÇüÀÏ
À̾Ƹ§
ÀåÀç¿ì
Hyeong Il Kim
Ah Reum Lee
Jae Woo Chang
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 18 NO. 03 PP. 0053 ~ 0062 (2010. 08) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù PDA, ÈÞ´ëÆù°ú °°Àº ¸ð¹ÙÀÏ ±â±â ¹× GPS¿Í °°Àº ¹«¼± Åë½Å ±â¼úÀÇ ¹ß´Þ·Î ÀÎÇÏ¿© À§Ä¡ ±â¹Ý ¼ºñ½ºÀÇ ÀÌ¿ëÀÌ È®»êµÇ¾ú´Ù. ÇÏÁö¸¸ ÀÌ·¯ÇÑ ¼ºñ½º´Â »ç¿ëÀÚÀÇ Á¤È®ÇÑ À§Ä¡Á¤º¸¸¦ °¡Áö°í LBS¼¹ö¿¡ ¿¬¼ÓÀûÀ¸·Î ÁúÀǸ¦ ¿äûÇϱ⠶§¹®¿¡, ½É°¢ÇÑ °³ÀÎ Á¤º¸ ´©ÃâÀÇ À§ÇùÀÌ µÉ ¼ö ÀÖ´Ù. µû¶ó¼ ¸ð¹ÙÀÏ »ç¿ëÀÚÀÇ ¾ÈÀüÇÏ°í Æí¸®ÇÑ À§Ä¡±â¹Ý ¼ºñ½º »ç¿ëÀ» À§ÇÑ °³ÀÎ Á¤º¸ º¸È£ ¹æ¹ýÀÌ ÇÊ¿äÇÏ´Ù. À̸¦ À§ÇØ º» ³í¹®¿¡¼´Â Peer-to-Peer ȯ°æÀÇ À§Ä¡±â¹Ý ¼ºñ½º¿¡¼ ¿¬¼ÓÀûÀÎ ÁúÀÇ Ã³¸®¸¦ Áö¿øÇÏ´Â ±×¸®µå ±â¹Ý Ŭ·ÎÅ·(Cloaking) ¿µ¿ª ¼³Á¤ ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈÇÏ´Â ±â¹ýÀº Peer-to-Peer ȯ°æ¿¡¼ ¿¬¼ÓÀûÀÎ À§Ä¡±â¹Ý ¼ºñ½º¸¦ Áö¿øÇϱâ À§ÇÏ¿©, Chord ÇÁ·ÎÅäÄÝÀ» »ç¿ëÇÏ¿© Ŭ·ÎÅ· ¿µ¿ªÀ» ¼³Á¤ÇÑ´Ù. ¸¶Áö¸·À¸·Î ¼º´ÉÆò°¡¸¦ ÅëÇؼ Á¦¾ÈÇÏ´Â ±â¹ýÀÌ ¼ºñ½º ½Ã°£¸é¿¡¼ ±âÁ¸ ¿¬±¸º¸´Ù ¿ì¼öÇÔÀ» º¸ÀδÙ. |
¿µ¹®³»¿ë (English Abstract) |
Recent development in wireless communication technology, like GPS, and mobile equipments, like PDA and cellular phone, make location-based services (LBSs) popular. However, because, users continuously request a query to a server in the LBSs by using their exact locations, privacy information could be in danger. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, we, in this paper, propose a grid-based cloaking area creation scheme supporting continuous LBSs in peer-to-peer environment. The proposed scheme creates a cloaking area by using Chord protocol, so as to support the continuous LBSs in peer-to-peer environment. Finally, we show from a performance analysis that our cloaking scheme outperforms the existing cloaking schemes, in terms of service time. |
Å°¿öµå(Keyword) |
°³ÀÎ Á¤º¸ º¸È£
¿¬¼Ó ÁúÀÇ Ã³¸®
À§Ä¡±â¹Ý ¼ºñ½º
Ŭ·ÎÅ· ±â¹ý
Peer-to-peer ȯ°æ
Privacy protection
Continuous Query Processing
Location-Based Services
Cloaking scheme
Peer-to-peer Environment
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|