Disclosure of Invention
The invention provides a user position information protection method and system, which are used for solving the defects of high communication cost, high calculation cost of user equipment, high correlation degree between user personal data and position data information and unbalanced user position privacy and service quality in the prior art.
In a first aspect, the present invention provides a method for protecting user location information, including:
the method comprises the steps that a user obtains authentication information and receives a first query request sent by the user;
responding to the first query request, determining an anonymous zone by utilizing a zone self-adaptive anonymization algorithm, and sending an encrypted query request generated according to the anonymous zone to a location service provider;
and receiving the encrypted position interest point information which is acquired by the position service provider through certificate issuing mechanism authentication, and forwarding the encrypted position interest point information to the user so that the user can acquire target position information according to the encrypted position interest point information.
According to the user location information protection method provided by the invention, the user obtains authentication information, and receives a first query request sent by the user, and the method comprises the following steps:
the user sends a position request to the position service provider and registers with the certificate issuing mechanism, and the user receives a pseudonym, a certificate and a secret key which are issued by the certificate issuing mechanism and contain a certificate term;
and receiving the first query request sent by the user based on the position mapping table.
According to the method for protecting user location information provided by the invention, the receiving the first query request sent by the user based on the location mapping table comprises the following steps:
acquiring a position coordinate value of any user, calculating a hash value of the position coordinate value of any user, and performing modulo operation on the number of anonymous servers to acquire a serial number of any anonymous server;
constructing the position mapping table based on the random anonymous server serial number and the random user position coordinate value;
And the user determines a receiving anonymous server according to the position mapping table, and the receiving anonymous server receives the pseudonym, the certificate deadline, the query request content, the query radius and the anonymity level sent by the user.
According to the method for protecting user location information provided by the invention, in response to the first query demand, an anonymous area is determined by using an area adaptive anonymization algorithm, and an encrypted query request generated according to the anonymous area is sent to a location service provider, which comprises the following steps:
Receiving the first query requirement, if the fact that the same pseudonym exists as the user within the certificate period is judged, sending a first mark to the user, and generating the anonymous region based on the region self-adaptive anonymization algorithm;
Otherwise, caching the first query requirement, sending a second mark to the user, receiving the second query requirement sent by the user, wherein the second query requirement comprises the second mark and a user query position, and caching the user query position, the pseudonym and the certificate deadline after associating;
And integrating the pseudonym, the certificate deadline, the query request content, the query radius and the anonymous zone to obtain an integrated query request, and encrypting the integrated query request by adopting a public key of the location service provider to obtain an encrypted query request.
According to the user location information protection method provided by the invention, the anonymous zone is generated based on the zone self-adaptive anonymization algorithm, and the method comprises the following steps:
receiving the first query requirement carrying the user query position sent by the user;
Generating a query area based on the user query location and the query radius;
obtaining the minimum number of users and the minimum request content quantity of the query area according to historical statistical experience;
Respectively determining that all users with the distance smaller than or equal to the query radius are first user neighborhoods of the users and all users with the distance larger than the query radius are second user neighborhoods of the users;
if the first user neighborhood is judged to be greater than or equal to the minimum user number and the second user neighborhood is judged to be greater than or equal to the minimum request content number, the query area is a dense area of people, otherwise, the query area is a sparse area of people;
Dividing the query area into n multiplied by n cells, if the query area is the population density area, arranging the positions of each cell in a descending order according to the current request times, determining k-1 positions closest to the user query position numbers in an ordered list, and generating the anonymous area by adopting a k-anonymity algorithm with the user query position;
And if the query region is the population sparse region, adopting a virtual position algorithm to arrange the positions of each cell in a descending order according to the historical query probability, determining k-1 positions closest to the user query position numbers in an ordered list, and adopting the k-anonymizing algorithm to generate the anonymized region.
According to the method for protecting user location information provided by the invention, the receiving the encrypted location interest point information which is acquired by the location service provider through certification of the certificate issuing authority forwards the encrypted location interest point information to the user, and the method comprises the following steps:
The location service provider receives the encrypted inquiry request, decrypts the encrypted inquiry request by adopting a private key, verifies the pseudonym through the certificate issuing mechanism, and receives the key sent by the certificate issuing mechanism;
the location service provider obtains location interest point information in a service database according to the anonymous area, the query request content and the query radius, and symmetrically encrypts the location interest point information by adopting the secret key to obtain the encrypted location interest point information;
And receiving the encryption position interest point information sent by the position service provider, and forwarding the encryption position interest point information to the user.
In a second aspect, the present invention provides a method for protecting user location information, including:
Acquiring authentication information and sending a first query request to an anonymous server;
after the anonymous server generates an anonymous zone by utilizing a zone self-adaptive anonymous algorithm and sends an encryption inquiry request generated according to the anonymous zone to a location service provider, the anonymous server receives encryption location interest point information which is acquired by the location service provider according to certificate issuing authority authentication;
and receiving the encryption position interest point information forwarded by the anonymous server from the position service provider, and decrypting the encryption position interest point information to obtain target position information.
According to the user location information protection method provided by the invention, the authentication information is obtained, and a first query request is sent to an anonymous server, comprising the following steps:
Sending a location request to the location service provider, registering with the certificate issuing authority, and receiving a pseudonym, a certificate and a secret key which are issued by the certificate issuing authority and contain a certificate term by the user;
and sending the first query request determined based on the location mapping table to the anonymous server.
In a third aspect, the present invention further provides a user location information protection system, including:
The receiving module is used for receiving a first query request sent by a user after the user acquires authentication information;
the anonymizing module is used for responding to the first query request, determining an anonymizing area by utilizing an area self-adaptive anonymizing algorithm, and sending an encrypted query request generated according to the anonymizing area to a position service provider;
And the forwarding module is used for receiving the encrypted position interest point information which is acquired by the position service provider through certificate issuing authority authentication and forwarding the encrypted position interest point information to the user so that the user can acquire target position information according to the encrypted position interest point information.
In a fourth aspect, the present invention further provides a user location information protection system, including:
The sending module is used for obtaining authentication information and sending a first query request to the anonymous server;
the acquisition module is used for generating an anonymous region by the anonymous server through a region self-adaptive anonymous algorithm, and receiving the encrypted position interest point information which is acquired by the position service provider according to certificate issuing authority authentication after sending an encrypted query request generated according to the anonymous region to the position service provider;
And the processing module is used for receiving the encrypted position interest point information forwarded by the anonymous server from the position service provider, decrypting the encrypted position interest point information and obtaining target position information.
In a fifth aspect, the present invention further provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements any one of the above-mentioned user location information protection methods when executing the program.
In a sixth aspect, the present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a user location information protection method as described in any of the above.
In a seventh aspect, the present invention also provides a computer program product comprising a computer program which, when executed by a processor, implements a user location information protection method as described in any of the above.
According to the user position information protection method and system, the user personal data and the position data are decoupled, so that the safety is improved when inference attack is resisted, the communication cost and the calculation cost of the user terminal are reduced, and the balance between the user position privacy and the service quality is effectively realized.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Aiming at a plurality of defects in the prior art of User position information protection, the invention provides a novel User position information protection method facing a mobile social network, which is realized based on a TTP architecture of a deployed multi-anonymizer, as shown in figure 1, the architecture mainly comprises four entities, namely a User, a certificate issuing mechanism (CERTIFICATE AUTHORITY, CA), an anonymizing server group (Multiple Anonymizers, MAs) and a position service provider LSP, wherein the anonymizing server MAs are positioned between the User and the position service provider LSP, and N anonymizers are shared. By adopting the framework, the performance bottleneck caused by single-point faults is solved, and the information transmission performance is improved.
The User may be an operating device with wireless communication, computing and storage capabilities, but more importantly with positioning functions, and performs various functions such as location prediction, selection of virtual locations, caching and refinement of query results.
The certificate issuing authority CA, whose main function is to register different users and LSPs, is fully trusted, and in the model of the present invention, CA can also issue pseudonyms and corresponding certificates, keys to users.
The anonymous server group MAs are semi-trusted entities and can be deployed on intermediate nodes of a network, the main functions of the MAs are to forward inquiry requests and results between users and LSP, the MAs can execute anonymization to confuse the exact positions of the users, and in the model of the invention, the MAs can also perform the functions of calculation, local caching, random number generation and the like.
Location service provider LSP-LSPs are online location service solution providers such as Twitter, foursquare or Google Maps, operating some of the models of the present invention with location service related resources, LSPs are considered to be an honest but curious entity that may reveal sensitive user information as well.
In summary, in this model, the certificate issuing authority CA and the User are considered to be fully trusted entities, and furthermore, assuming that both communication channels between CA and User and between CA and LSP are secure and MAs cannot collusion with LSP, existing security authentication techniques, such as two-factor authentication and multi-factor authentication, can be used to ensure that the User and LSP are authenticated at the CA.
Fig. 2 is a flow chart of a user location information protection method provided by the present invention, where a corresponding execution body is an anonymous server MAs, as shown in fig. 2, including:
Step 101, obtaining authentication information by a user, and receiving a first query request sent by the user;
step 102, responding to the first query request, determining an anonymous zone by utilizing a zone self-adaptive anonymization algorithm, and sending an encrypted query request generated according to the anonymous zone to a location service provider;
Step 103, receiving the encrypted position interest point information acquired by the position service provider through certificate issuing authority authentication, and forwarding the encrypted position interest point information to the user so that the user can acquire target position information according to the encrypted position interest point information.
Specifically, when a user accesses a network, corresponding authentication information is obtained after registration and authentication, the anonymous server receives a first query request initiated by the user, calculates a corresponding anonymous region according to a region self-adaptive anonymous algorithm according to the first query request, adds other information of the user on the basis of the anonymous region to generate an encryption query request, sends the encryption query request to a location service provider, decrypts the encryption query request, verifies the validity of the user information through a certificate issuing mechanism, symmetrically encrypts location interest points in a service database according to the verified information, sends the encrypted location interest point information to the anonymous server, and then forwards the encrypted location interest point information to the user, and the user selects a location interest point required by the user according to the location of the user to obtain target location information.
The invention adopts distributed transmission based on a centralized architecture and a staged encryption communication mode, and combines an area self-adaptive anonymization scheme, thereby solving the problems of high communication cost, high calculation cost of user equipment, high correlation degree of personal data and position data information of the user and the like in the traditional scheme.
Based on the above embodiment, step 101 includes:
the user sends a position request to the position service provider and registers with the certificate issuing mechanism, and the user receives a pseudonym, a certificate and a secret key which are issued by the certificate issuing mechanism and contain a certificate term;
and receiving the first query request sent by the user based on the position mapping table.
Wherein the receiving the first query request sent by the user based on the location mapping table includes:
acquiring a position coordinate value of any user, calculating a hash value of the position coordinate value of any user, and performing modulo operation on the number of anonymous servers to acquire a serial number of any anonymous server;
constructing the position mapping table based on the random anonymous server serial number and the random user position coordinate value;
And the user determines a receiving anonymous server according to the position mapping table, and the receiving anonymous server receives the pseudonym, the certificate deadline, the query request content, the query radius and the anonymity level sent by the user.
Specifically, when a User uses a single point LBS service for the first time, the User must register with the certificate authority CA. The registered user can obtain the pseudonym and the corresponding certificate and the own secret key, and can apply for and update the pseudonym and the secret key to the CA for multiple times according to the requirement, wherein the multiple applications refer to that the application can be carried out again if the validity period of the certificate is exceeded.
If the user applies for or updates a pseudonym at the jth time, i.e., any time, the CA will issue a pseudonym to the userAnd corresponding certificateThe certificate deadline is T, and simultaneously, secret keys are distributed to usersThe pseudonym, certificate and key here are all valid for a time T, and the pseudonym is specifiedThe method is unique in time T, and the phenomenon of homonymy does not exist.
Further, by constructing the location mapping table, query requests at different locations are mapped to different anonymous servers. Assuming that N anonymous servers a 1,A2,...,AN are present, by calculating the hash value of the location coordinates (x+y), modulo-operating N to obtain the sequence number of the anonymous server i (l=1, 2..n), the query request issued by the location (x+y) is mapped to the corresponding anonymous server a l.
Al=Hash(x+y)modN,(1≤l≤N)
In order to ensure the security, the invention respectively sends the User information and the position information to the anonymous server A l, and the User firstly sends a query request which does not contain the position, namely a first query request, to the anonymous server, and is recorded as
Where Q is the query request content of the user, R is the query radius, and k is the user-defined anonymity level.
The invention splits the traditional position triples { identity, location, time } and sends the identity and location twice, breaks the association between the user information and the position, and effectively resists inference attack.
Based on any of the above embodiments, step 102 includes:
Receiving the first query requirement, if the fact that the same pseudonym exists as the user within the certificate period is judged, sending a first mark to the user, and generating the anonymous region based on the region self-adaptive anonymization algorithm;
Otherwise, caching the first query requirement, sending a second mark to the user, receiving the second query requirement sent by the user, wherein the second query requirement comprises the second mark and a user query position, and caching the user query position, the pseudonym and the certificate deadline after associating;
And integrating the pseudonym, the certificate deadline, the query request content, the query radius and the anonymous zone to obtain an integrated query request, and encrypting the integrated query request by adopting a public key of the location service provider to obtain an encrypted query request.
Wherein the generating the anonymous zone based on the zone adaptive anonymization algorithm comprises:
receiving the first query requirement carrying the user query position sent by the user;
Generating a query area based on the user query location and the query radius;
obtaining the minimum number of users and the minimum request content quantity of the query area according to historical statistical experience;
Respectively determining that all users with the distance smaller than or equal to the query radius are first user neighborhoods of the users and all users with the distance larger than the query radius are second user neighborhoods of the users;
if the first user neighborhood is judged to be greater than or equal to the minimum user number and the second user neighborhood is judged to be greater than or equal to the minimum request content number, the query area is a dense area of people, otherwise, the query area is a sparse area of people;
Dividing the query area into n multiplied by n cells, if the query area is the population density area, arranging the positions of each cell in a descending order according to the current request times, determining k-1 positions closest to the user query position numbers in an ordered list, and generating the anonymous area by adopting a k-anonymity algorithm with the user query position;
And if the query region is the population sparse region, adopting a virtual position algorithm to arrange the positions of each cell in a descending order according to the historical query probability, determining k-1 positions closest to the user query position numbers in an ordered list, and adopting the k-anonymizing algorithm to generate the anonymized region.
Specifically, as shown in fig. 3, when the anonymizing server a l receives the query request from the User, it searches the local cache list, and whether there is a pseudonym in TIf so, a first mark is sent to the user and is generally set to be 1, meanwhile, the query position of the user in the validity period is generated into an anonymous zone Region according to R, k required by the user, and if not, the information is sent to the userCached locally and sends a second token, typically a random number M (M.noteq.1), to the user, who receives M and sends a second query
Anonymous server A l receivesThen, the query position Location and the pseudonym of the user are determinedCertificate deadlines T are associated and cached locally.
The anonymizing server A l generates anonymizing area Region according to the Location and R, k of the user request, combines the Region with other user information to form a new query request, encrypts with the public key PK S of the LSP, and then sends the encrypted query request message MSG A2S to the LSP.
It should be noted that, the anonymizing server generates an anonymizing area Region by adopting an area self-adaptive anonymizing scheme based on the distance between users and the requested content:
first, the anonymous server receives the query request information sent by the user u i
Generating a region Reg, u i epsilon Reg by the anonymous server according to the position Location and the query radius R sent by the user u i;
the anonymous server obtains a minimum number of users MinU and a minimum number of requested content MinC for the region Reg based on historical experience;
the anonymizer calculates R neighborhood (first neighborhood) and theta neighborhood (second neighborhood) of the user u i, and all users satisfying the distance to u i not more than R in Reg are called R neighborhood of u i and are represented by N R(ui), namely:
NR(ui)={uj∈Reg|dist(ui,uj)≤R}
All users whose Reg satisfies the condition that the request content is different from u i are called θ neighborhood of u i, denoted by N θ(ui), namely:
Nθ(ui)={uj∈Reg|boolean(ui,uj)=false}
where boolean () is a boolean value that indicates whether the user's requested content is the same.
The anonymization server further judges whether the Reg is a population sparse area or a population dense area, if the Reg simultaneously meets the conditions |N R(ui) |not less than MinU and |N θ(ui) |not less than MinC, the Reg is the population dense area, otherwise, the Reg is judged to be the population sparse area;
Dividing Reg into n multiplied by n cells, if Reg is population dense region, ordering the position of each cell in Reg according to the current requested times, selecting k-1 positions closest to the query position number of user in the sequence list, generating anonymous region together with the query position of user to realize k-anonymity, if Reg is population sparse region, adopting classical virtual position algorithm, ordering the position of each cell in Reg according to historical query probability, selecting k-1 virtual positions closest to the query position number of user in the sequence list to realize k-anonymity.
The k-anonymization technique employed was originally proposed by p.samarati and l.seweney in 1998 at database system principles conference (Symposium on Principles of Database Systems, PODS). The method is mainly used in a relational database, and private data which needs to be published in the database is processed in an anonymous mode. It requires a certain number (at least k) of records and these records are indistinguishable on the quasi-identifier in the published data. An attacker cannot identify the specific individual to whom private information belongs, thus protecting individual privacy, while k-anonymously specifies the maximum risk of information disclosure that a user can afford through the parameter k. In 2002, l.seweney proposed a k-anonymous privacy protection model. In 2003, marco Gruteser applied the k-anonymization method to LBS privacy protection at the earliest, and proposed a location k-anonymization model. The principle is that by generating an anonymous zone (Cloaking Region, CR) where there are at least k users, the anonymous zone is used as the real location of the users, and the anonymous zone is directly sent to the LBS service provider when the users submit the query request. The probability that the service provider recognizes a particular user in this way is not greater than 1/k. Since the idea of the k-anonymization method has higher security, many location privacy protection schemes are currently based on the method.
According to the invention, the densely populated areas and the sparsely populated areas are divided based on the user distance and the request content, different anonymizing schemes are adopted for different areas, and the different anonymizing schemes are adopted for different areas, so that effective anonymization, user privacy protection and simultaneously, the loss of service quality obtained by the user is reduced, the balance between the user position privacy and the service quality is better realized, and the defect that the traditional scheme has overlarge cost, certain LBS applicability is required to be sacrificed, and the LBS service is difficult to achieve the user satisfaction effect is overcome.
Based on any of the above embodiments, step 103 includes:
The location service provider receives the encrypted inquiry request, decrypts the encrypted inquiry request by adopting a private key, verifies the pseudonym through the certificate issuing mechanism, and receives the key sent by the certificate issuing mechanism;
the location service provider obtains location interest point information in a service database according to the anonymous area, the query request content and the query radius, and symmetrically encrypts the location interest point information by adopting the secret key to obtain the encrypted location interest point information;
And receiving the encryption position interest point information sent by the position service provider, and forwarding the encryption position interest point information to the user.
Specifically, as shown in fig. 3, after receiving the inquiry request message MSG A2S, the LSP uses its own private key SK S to decrypt and verify the validity of the user pseudonym by the CA, and if so, the CA sends the user key to the LSP
LSP requests content Q and query radius R based on anonymous zone Region, queries POIs in service database, and then uses user keySymmetrically encrypt these POIs to obtainThen, the LSP sends the result to anonymity server A l;
anonymous server A l receives the message Forwarding the message to a User, and receiving the message by the UserUsing its own keyDecrypting to obtain POIs required by the user.
In order to reduce communication expenditure and calculation expenditure, an encryption method is not adopted in the stage of sending a query request by a user, the safety of user information is enhanced by a dynamic pseudonym technology according to the position privacy protection scheme in the mobile social network scene, the use of necessary encryption means when { identity, location and time are sent simultaneously is avoided by separately sending identity and location, the transmission of a user key through a channel is avoided by distributing the key to an LSP by a CA, the risk of privacy leakage of the user when the channel is monitored is reduced, and the communication expenditure and calculation expenditure of the prior scheme are greatly reduced.
Fig. 4 is a second flowchart of a user location information protection method provided by the present invention, where a corresponding execution body is a user, as shown in fig. 4, and includes:
Step 201, acquiring authentication information and sending a first query request to an anonymous server;
Step 202, after the anonymous server generates an anonymous zone by utilizing a zone self-adaptive anonymous algorithm and sends an encrypted query request generated according to the anonymous zone to a location service provider, the anonymous server receives encrypted location interest point information which is acquired by the location service provider according to certificate issuing authority authentication;
And 203, receiving the encrypted position interest point information forwarded by the anonymous server from the position service provider, and decrypting the encrypted position interest point information to obtain target position information.
Specifically, when a user accesses a network, corresponding authentication information is obtained after registration and authentication, the anonymous server receives a first query request initiated by the user, calculates a corresponding anonymous region according to a region self-adaptive anonymous algorithm according to the first query request, adds other information of the user on the basis of the anonymous region to generate an encryption query request, sends the encryption query request to a location service provider, decrypts the encryption query request, verifies the validity of the user information through a certificate issuing mechanism, symmetrically encrypts location interest points in a service database according to the verified information, sends the encrypted location interest point information to the anonymous server, and then forwards the encrypted location interest point information to the user, and the user selects a location interest point required by the user according to the location of the user to obtain target location information.
The invention adopts distributed transmission based on a centralized architecture and a staged encryption communication mode, and combines an area self-adaptive anonymization scheme, thereby solving the problems of high communication cost, high calculation cost of user equipment, high correlation degree of personal data and position data information of the user and the like in the traditional scheme.
Based on any of the above embodiments, step 201 includes:
And sending a location request to the location service provider, registering with the certificate issuing authority, and receiving a pseudonym, a certificate and a secret key which are issued by the certificate issuing authority and contain a certificate term by the user.
And sending the first query request determined based on the location mapping table to the anonymous server.
Specifically, when a User uses a single point LBS service for the first time, the User must register with the certificate authority CA. The registered user can obtain the pseudonym and the corresponding certificate and the own secret key, and can apply for and update the pseudonym and the secret key to the CA for multiple times according to the requirement, wherein the multiple applications refer to that the application can be carried out again if the validity period of the certificate is exceeded.
If the user applies for or updates a pseudonym at the jth time, i.e., any time, the CA will issue a pseudonym to the userAnd corresponding certificateThe certificate deadline is T, and simultaneously, secret keys are distributed to usersThe pseudonym, certificate and key here are all valid for a time T, and the pseudonym is specifiedThe method is unique in time T, and the phenomenon of homonymy does not exist.
Further, by constructing the location mapping table, query requests at different locations are mapped to different anonymous servers. Assuming that N anonymous servers a 1,A2,...,AN are present, by calculating the hash value of the location coordinates (x+y), modulo-operating N to obtain the sequence number of the anonymous server i (l=1, 2..n), the query request issued by the location (x+y) is mapped to the corresponding anonymous server a l.
Al=Hash(x+y)modN,(1≤l≤N)
In order to ensure the security, the invention respectively sends the User information and the position information to the anonymous server A l, and the User firstly sends a query request which does not contain the position, namely a first query request, to the anonymous server, and is recorded as
Where Q is the query request content of the user, R is the query radius, and k is the user-defined anonymity level.
The invention splits the traditional position triples { identity, location, time } and sends the identity and location twice, breaks the association between the user information and the position, and effectively resists inference attack.
The user location information protection system provided by the invention is described below, and the user location information protection system described below and the user location information protection method described above can be referred to correspondingly.
Fig. 5 is a schematic diagram of a user location information protection system provided by the present invention, and as shown in fig. 5, the system includes a receiving module 51, an anonymizing module 52, and a forwarding module 53, where:
The receiving module 51 is configured to receive a first query request sent by a user after the user obtains authentication information;
The anonymizing module 52 is configured to determine an anonymizing area by using an area adaptive anonymizing algorithm in response to the first query request, and send an encrypted query request generated according to the anonymizing area to a location service provider;
the forwarding module 53 is configured to receive the encrypted location interest point information acquired by the location service provider through certification by the certificate issuing authority, and forward the encrypted location interest point information to the user, so that the user acquires target location information according to the encrypted location interest point information.
By decoupling the personal data and the position data of the user, the invention improves the safety when resisting inference attack, reduces the communication cost and the calculation cost of the user terminal, and effectively realizes the balance between the position privacy and the service quality of the user.
Fig. 6 is a second schematic structural diagram of the user location information protection system provided by the present invention, as shown in fig. 6, including a sending module 61, an obtaining module 62, and a processing module 63, where:
the sending module 61 is configured to obtain authentication information, and send a first query request to the anonymous server;
The obtaining module 62 is configured to generate an anonymous area by using an area adaptive anonymization algorithm, and after sending an encrypted query request generated according to the anonymous area to a location service provider, receive encrypted location interest point information that the location service provider passes the obtaining according to certificate issuing authority authentication by using the anonymous server;
The processing module 63 is configured to receive the encrypted location interest point information forwarded by the anonymity server from the location service provider, and decrypt the encrypted location interest point information to obtain the target location information.
By decoupling the personal data and the position data of the user, the invention improves the safety when resisting inference attack, reduces the communication cost and the calculation cost of the user terminal, and effectively realizes the balance between the position privacy and the service quality of the user.
Fig. 7 illustrates a physical schematic diagram of an electronic device, which may include a processor (processor) 710, a communication interface (Communications Interface) 720, a memory (memory) 730, and a communication bus 740, where the processor 710, the communication interface 720, and the memory 730 communicate with each other via the communication bus 740, as shown in fig. 7. The processor 710 may invoke logic instructions in the memory 730 to perform a method for protecting user location information, the method including obtaining authentication information for a user, receiving a first query request sent by the user, determining an anonymous zone using a zone-adaptive anonymity algorithm in response to the first query request, sending an encrypted query request generated from the anonymous zone to a location service provider, receiving encrypted location interest point information authenticated by the location service provider according to a certificate issuing authority, forwarding the encrypted location interest point information to the user for the user to obtain target location information according to the encrypted location interest point information.
Further, the logic instructions in the memory 730 described above may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand alone product. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. The storage medium includes a U disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
In another aspect, the present invention further provides a computer program product, where the computer program product includes a computer program, where the computer program is capable of being stored on a non-transitory computer readable storage medium, and where the computer program, when executed by a processor, is capable of executing a method for protecting user location information provided by the above methods, where the method includes obtaining authentication information for a user, receiving a first query request sent by the user, determining an anonymous zone using a zone adaptive anonymity algorithm in response to the first query request, sending an encrypted query request generated according to the anonymous zone to a location service provider, receiving encrypted location interest point information that the location service provider has passed the obtained encrypted location interest point information according to certificate issuing authority authentication, and forwarding the encrypted location interest point information to the user, where the user obtains target location information according to the encrypted location interest point information.
In yet another aspect, the present invention further provides a non-transitory computer readable storage medium having stored thereon a computer program, which when executed by a processor, implements a method for protecting user location information provided by the above methods, the method comprising obtaining authentication information for a user, receiving a first query request sent by the user, determining an anonymous zone using a zone-adaptive anonymity algorithm in response to the first query request, sending an encrypted query request generated according to the anonymous zone to a location service provider, receiving encrypted location interest point information obtained by the location service provider according to certificate issuing authority authentication, and forwarding the encrypted location interest point information to the user for the user to obtain target location information according to the encrypted location interest point information.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
It should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention, and not for limiting the same, and although the present invention has been described in detail with reference to the above-mentioned embodiments, it should be understood by those skilled in the art that the technical solution described in the above-mentioned embodiments may be modified or some technical features may be equivalently replaced, and these modifications or substitutions do not make the essence of the corresponding technical solution deviate from the spirit and scope of the technical solution of the embodiments of the present invention.