Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
À§Ä¡±â¹Ý¼ºñ½º¿¡¼ °³ÀÎÀÇ ±ËÀû Á¤º¸¸¦ º¸È£Çϱâ À§ÇÑ ±×¸®µå ±â¹Ý ±ËÀû Ŭ·ÎÅ· ±â¹ý |
¿µ¹®Á¦¸ñ(English Title) |
Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services |
ÀúÀÚ(Author) |
À±ÁöÇý
¼ÛµÎÈñ
äõ¿ø
¹Ú±¤Áø
Ji-hye Youn
Doo-hee Song
Tian-yuan Cai
Kwang-jin Park
À±ÁöÇý
¼ÛµÎÈñ
äõ¿ø
¹Ú±¤Áø
Ji-hye Youn
Doo-hee Song
Tian-yuan Cai
Kwang-jin Park
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 18 NO. 05 PP. 0031 ~ 0038 (2017. 09) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù LBS(Location-based Services)±â¼úÀÇ ¹ß´Þ·Î »ç¿ëÀÚÀÇ À§Ä¡¸¦ º¸È£ÇÏ´Â ¿¬±¸°¡ È°¹ßÈ÷ ÁøÇà µÇ°í ÀÖ´Ù. LBS¸¦ »ç¿ëÇϱâ À§Çؼ´Â »ç¿ëÀÚÀÇ Á¤È®ÇÑ À§Ä¡ µ¥ÀÌÅ͸¦ LBS ¼¹ö¿¡°Ô °ø°³ÇØ¾ß ÇÑ´Ù. ±×·¯³ª »ç¿ëÀÚÀÇ À§Ä¡¸¦ ¼¹ö¿¡°Ô °ø°³ÇÏ¸é ¼¹ö´Â »ç¿ëÀÚÀÇ À§Ä¡¸¦ ÆľÇÇÒ ¼ö ÀÖ´Ù. ¶ÇÇÑ »ç¿ëÀÚÀÇ À§Ä¡ µ¥ÀÌÅÍ°¡ Áö¼ÓÀûÀ¸·Î ¼¹ö¿¡°Ô °ø°³ µÈ´Ù¸é ÁúÀÇÀÚÀÇ À̵¿ ±ËÀû ¶ÇÇÑ ³ëÃâ µÉ ¼ö ÀÖ´Ù. À̸¦ ÇØ°áÇϱâ À§ÇØ º» ³í¹®¿¡¼´Â GTC (Grid-based Trajectory Cloaking) ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. GTC ±â¹ýÀº »ç¿ëÀÚ°¡ ¸ñÀûÁö ±îÁö °æ·Î¿Í »ç¿ëÀÚ°¡ ¿øÇÏ´Â ÇÁ¶óÀ̹ö½Ã ·¹º§ ¼öÁØ (UPL : User¡¯s desired Privacy Level)ÀÇ ±×¸®µå·Î ºÐÇÒ ÇÑ µÚ Ŭ·ÎÅ· ¿µ¿ªÀ» ¼³Á¤ÇØ ·£´ýÀ¸·Î ÁúÀÇÇÑ´Ù. GTC ±â¹ýÀº ¼øÂ÷ÀûÀÎ ±ËÀû k-À͸íȱâ¹ý º¸´Ù ÁúÀÇ Ã³¸® ºñ¿ëÀ» ÁÙ¿´°í Ãâ¹ßÁö¿Í µµÂøÁö¸¦ ¾Ë ¼ö ¾ø´Â ±ËÀûÀ» »ý¼ºÇØ ±ËÀû ³ëÃâ È®·üÀ» ÁÙ¿´´Ù. ½ÇÇè °á°ú¸¦ ÅëÇÏ¿© Á¦¾È ±â¹ýÀÇ ¿ì¼ö¼ºÀ» Áõ¸íÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Recently with the rapid development of LBS (Location-based Services) technology, approaches of protecting user's location have gained tremendous attentions. For using LBS, users need to forward their real locations to LBS server. However, if the user sends his/her real location to LBS server, the server will have the all the information about user in LBS. Moreover, if the user opens it to LBS server for a long time, the trajectory of user may be released. In this paper, we propose GTC (Grid-based Trajectory Cloaking) method to address the privacy issue. Different from existing approaches, firstly the GTC method sets the predicting trajectory and divides the map into 2n*2n grid. After that we will generate cloaking regions according to user's desired privacy level. Finally the user sends them to LBS server randomly. The GTC method can make the cost of process less than sequential trajectory k-anonymity. Because of confusing the departure and destination, LBS server could not know the user's trajectory any more. Thus, we significantly improve the privacy level. evaluation results further verify the effectiveness and efficiency of our GTC method.
|
Å°¿öµå(Keyword) |
À§Ä¡±â¹Ý ¼ºñ½º
±ËÀû Á¤º¸ º¸È£
Ŭ·ÎÅ·
·£´ýÇÑ ÁúÀÇ
Location-based services
Trajectory information protection
Cloaking
Random query
À§Ä¡±â¹Ý ¼ºñ½º
Ŭ·ÎÅ·
·£´ýÇÑ ÁúÀÇ
Location-based services
Trajectory information protection
Cloaking
Random query
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|