[go: up one dir, main page]

CN115200603B - Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage - Google Patents

Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage Download PDF

Info

Publication number
CN115200603B
CN115200603B CN202211106644.XA CN202211106644A CN115200603B CN 115200603 B CN115200603 B CN 115200603B CN 202211106644 A CN202211106644 A CN 202211106644A CN 115200603 B CN115200603 B CN 115200603B
Authority
CN
China
Prior art keywords
anonymous
route
service provider
camouflage
lbs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211106644.XA
Other languages
Chinese (zh)
Other versions
CN115200603A (en
Inventor
王轩
金磊
蒋琳
刘洋
漆舒汉
姚霖
罗文坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute Of Technology shenzhen Shenzhen Institute Of Science And Technology Innovation Harbin Institute Of Technology
Original Assignee
Harbin Institute Of Technology shenzhen Shenzhen Institute Of Science And Technology Innovation Harbin Institute Of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute Of Technology shenzhen Shenzhen Institute Of Science And Technology Innovation Harbin Institute Of Technology filed Critical Harbin Institute Of Technology shenzhen Shenzhen Institute Of Science And Technology Innovation Harbin Institute Of Technology
Priority to CN202211106644.XA priority Critical patent/CN115200603B/en
Publication of CN115200603A publication Critical patent/CN115200603A/en
Application granted granted Critical
Publication of CN115200603B publication Critical patent/CN115200603B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/26Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 specially adapted for navigation in a road network
    • G01C21/34Route searching; Route guidance
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/26Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 specially adapted for navigation in a road network
    • G01C21/34Route searching; Route guidance
    • G01C21/3453Special cost functions, i.e. other than distance or default speed limit of road segments
    • G01C21/3492Special cost functions, i.e. other than distance or default speed limit of road segments employing speed data or traffic data, e.g. real-time or historical
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Navigation (AREA)

Abstract

本发明公开了一种基于同态加密和匿名伪装的导航服务隐私保护方法及装置,方法包括:LBS服务商进行同态加密方案的初始化;用户利用匿名伪装算法分别生成出匿名伪装区域;用户根据匿名伪装区域的路网信息,随机选取出发点附近满足伪装距离L的出发地伪装点和目的地伪装点,同步规划出真实出发地到伪装出发地的路线;云服务商规划出一组候选路线,同时向LBS服务商请求实时路况信息;云服务商对候选路线组的开销进行进一步计算,利用全同态加密的比较运算,将密文比较结果传输给LBS服务商;从候选路线组中选取最佳路线并在本地将和伪装区域内的路线连接,生成最终的出行路线。本发明采用全同态加密和匿名伪装技术实现高质量的导航服务隐私保护。

Figure 202211106644

The invention discloses a navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage. The method includes: an LBS service provider initializes a homomorphic encryption scheme; users use anonymous camouflage algorithms to generate anonymous camouflage areas; The road network information of the anonymous camouflaged area randomly selects the camouflaged point of departure and the camouflaged point of the destination that meet the camouflage distance L near the departure point, and simultaneously plans the route from the real departure point to the camouflaged departure point; the cloud service provider plans a set of candidate routes, At the same time, request real-time road condition information from the LBS service provider; the cloud service provider further calculates the cost of the candidate route group, uses the comparison operation of fully homomorphic encryption, and transmits the ciphertext comparison result to the LBS service provider; selects the most The optimal route is connected locally with the route in the camouflage area to generate the final travel route. The invention adopts fully homomorphic encryption and anonymous camouflage technology to realize high-quality navigation service privacy protection.

Figure 202211106644

Description

基于同态加密和匿名伪装的导航服务隐私保护方法及装置Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage

技术领域technical field

本发明属于导航服务的技术领域,具体涉及一种基于同态加密和匿名伪装的导航服务隐私保护方法及装置。The invention belongs to the technical field of navigation services, and in particular relates to a navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage.

背景技术Background technique

为了实现导航服务的隐私保护,前人提出了许多方案,这些方案对出发地、目的地、导航路线的隐私推断具有鲁棒性。这些方案通过采用现有技术(如数据加密)或利用路线规划问题的特定结构来实现所需的鲁棒性。现有技术中导航服务常见的隐私保护方案有以下几种:In order to achieve the privacy protection of navigation services, many schemes have been proposed by predecessors, and these schemes are robust to the privacy inference of origin, destination, and navigation routes. These schemes achieve the required robustness by adopting existing techniques such as data encryption or exploiting the specific structure of the route planning problem. Common privacy protection schemes for navigation services in the prior art are as follows:

(1)隐私信息检索(PIR):PIR保证查询用户在向服务器上的数据库提交查询请求,在用户查询隐私信息不被泄漏的条件下完成查询,即在过程中服务器不知道用户具体查询信息及检索出的数据项。利用这项技术,用户本身客户端上需要有路网的结构图,通过PIR访问路径的权重,在本地客户端上生成导航路线。然而,这种方法需要服务提供商的充分合作,以支持该协议。基于隐私信息检索的导航服务隐私方案,主要有以下两点缺点:1、隐私信息检索技术在耗时上开销巨大,并且随着路况的更新,LBS(Location-Based Service)服务商需要耗费大量精力维护数据库;2、该方案需要LBS服务商的高度配合来搭建一个通用的隐私保护查询框架,对于LBS服务商的配合程度较高;3、该方案需要用户在本地客户端做路径规划计算,需要承载较大的地图框架数据。(1) Privacy Information Retrieval (PIR): PIR ensures that query users submit query requests to the database on the server, and complete the query under the condition that the user query privacy information is not leaked, that is, the server does not know the user's specific query information and information during the process. The retrieved data item. Using this technology, the user needs to have a structural diagram of the road network on his own client, access the weight of the path through PIR, and generate a navigation route on the local client. However, this approach requires the full cooperation of the service provider to support the protocol. The navigation service privacy scheme based on privacy information retrieval has the following two main disadvantages: 1. The privacy information retrieval technology is time-consuming and expensive, and with the update of road conditions, LBS (Location-Based Service) service providers need to spend a lot of energy Maintain the database; 2. This solution requires a high degree of cooperation from LBS service providers to build a general privacy protection query framework, which has a high degree of cooperation with LBS service providers; 3. This solution requires users to do path planning calculations on the local client. Hosts larger map frame data.

(2)分布式方案:该方案是基于将完整的路线进行分段请求的思想,通过将一整条路线进行分段,将不同段的出发地、目的地的分别交由不同LBS服务商进行请求,最后将请求的结果分别返回给用户,用户再将所有路线进行聚合,生成最后的导航路线。基于分布式的导航服务隐私保护,主要有以下两点缺点:1、需要多个独立的、互不串谋的LBS 服务商进行对多段路线请求进行分布式计算,条件严苛;2、各LBS服务商只处理自己获得请求,对于每一段来说只是局部最优路线,在用户本地聚合后所获得的路线并非全局最优路线,会牺牲掉一部分的服务质量。(2) Distributed solution: This solution is based on the idea of segmenting the complete route into segments. By segmenting the entire route, the origin and destination of different segments are assigned to different LBS service providers. request, and finally return the results of the request to the user, and the user aggregates all the routes to generate the final navigation route. Privacy protection based on distributed navigation services has the following two main disadvantages: 1. Multiple independent and non-colluding LBS service providers are required to perform distributed calculations on multi-segment route requests, and the conditions are strict; 2. Each LBS The service provider only processes its own request, which is only a local optimal route for each segment. The route obtained after the user's local aggregation is not the global optimal route, which will sacrifice part of the service quality.

发明内容Contents of the invention

本发明的主要目的在于克服现有技术的缺点与不足,提供一种基于同态加密和匿名伪装的导航服务隐私保护方法及装置,在实现导航服务的隐私保护同时,也能够利用LBS服务商的实时路况数据,提高服务质量,为用户生成安全优质的导航路线。The main purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art, and provide a navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage. While realizing the privacy protection of navigation services, it is also possible to use the LBS service provider's Real-time traffic data, improve service quality, and generate safe and high-quality navigation routes for users.

为了达到上述目的,本发明采用以下技术方案:In order to achieve the above object, the present invention adopts the following technical solutions:

第一方面,本发明提供了一种基于同态加密和匿名伪装的导航服务隐私保护方法,包括下述步骤:In the first aspect, the present invention provides a navigation service privacy protection method based on homomorphic encryption and anonymous masquerading, comprising the following steps:

由LBS服务商进行同态加密方案的初始化、生成公钥pk、私钥sk和评估密钥evk,然后将初始化参数params、公钥pk和评估密钥evk发送给云服务商进行初始化;The LBS service provider initializes the homomorphic encryption scheme, generates the public key pk, private key sk, and evaluation key evk, and then sends the initialization parameters params, public key pk, and evaluation key evk to the cloud service provider for initialization;

用户利用匿名伪装算法分别生成出匿名伪装区域,并向云服务商请求该匿名伪装区域,云服务商收到匿名伪装区域请求后,将该匿名伪装区域的路网信息传输给用户;所述匿名伪装区域包括出发地匿名伪装区域和目的地匿名伪装区域;所述匿名伪装算法是基于K-匿名算法进行改造,将K-匿名算法前置条件满足的K个在线用户改变成随机生成的K个坐标;The user uses an anonymous camouflage algorithm to generate an anonymous camouflage area respectively, and requests the anonymous camouflage area from the cloud service provider, and the cloud service provider transmits the road network information of the anonymous camouflage area to the user after receiving the anonymous camouflage area request; The masquerading area includes the anonymous masquerading area of the departure place and the anonymous masquerading area of the destination; the anonymous masquerading algorithm is transformed based on the K-anonymous algorithm, and the K online users whose preconditions of the K-anonymous algorithm are satisfied are changed into randomly generated K coordinate;

用户根据匿名伪装区域的路网信息,随机选取出发点附近满足伪装距离L的出发地伪装点和目的地伪装点,并将该出发地伪装点和目的地伪装点发送给云服务商;同时根据匿名伪装区域的路网信息,同步规划出真实出发地到伪装出发地的路线;According to the road network information of the anonymous masquerading area, the user randomly selects the departure masquerading point and the destination masquerading point that meet the masquerading distance L near the departure point, and sends the departure masquerading point and destination masquerading point to the cloud service provider; at the same time, according to the anonymous The road network information of the camouflaged area, synchronously planning the route from the real departure point to the disguised departure point;

云服务商收到出发地伪装点和目的地伪装点后,规划出一组候选路线{w 1,…,w n },其中w 1,…,w n 分别代表一条候选路线,同时向LBS服务商请求候选路线涉及路网区域R的实时路况信息,LBS服务商将路网区域R的实时路况信息利用全同态公钥加密后传输给云服务商;After receiving the masquerading point at the departure point and the masquerading point at the destination, the cloud service provider plans a set of candidate routes { w 1 ,..., w n }, where w 1 ,..., w n represent a candidate route and serve LBS at the same time The provider requests that the candidate route involves the real-time traffic information of the road network area R, and the LBS service provider encrypts the real-time traffic information of the road network area R with a fully homomorphic public key and transmits it to the cloud service provider;

云服务商收到路网区域R加密后的实时路况信息,并根据实时路况信息,对之前的候选路线组的开销进行进一步计算,得到密文后的路线开销,利用全同态加密的比较运算,将每条路线相互比较,将密文比较结果传输给LBS服务商;The cloud service provider receives the encrypted real-time road condition information in the road network area R, and further calculates the cost of the previous candidate route group according to the real-time road condition information, obtains the route cost after the ciphertext, and uses the comparison operation of fully homomorphic encryption , compare each route with each other, and transmit the ciphertext comparison result to the LBS service provider;

LBS服务商收到密文比较结果,利用私钥sk进行解密,并对比较结果进行排序,获得最佳路径的序号,将该序号传输给用户;用户收到序号,将从候选路线组{w 1,…,w n }中选取的最佳路线在本地和伪装区域内的路线连接,生成最终的出行路线。The LBS service provider receives the ciphertext comparison result, decrypts it with the private key sk, sorts the comparison results, obtains the serial number of the best path, and transmits the serial number to the user ; 1 ,…, w n } the best route selected in the local and camouflaged area to generate the final travel route.

作为优选的技术方案,所述匿名伪装算法具体为:As a preferred technical solution, the anonymous camouflage algorithm is specifically:

用户拥有出发地经纬度坐标S,目的地经纬度坐标D,设定伪装距离L、伪装等级K;The user has the latitude and longitude coordinates S of the departure point, the latitude and longitude coordinates D of the destination, and sets the camouflage distance L and camouflage level K;

用户基于伪装距离L和伪装等级K,在半径L处生成K-1个随机坐标。Based on the camouflage distance L and camouflage level K, the user generates K-1 random coordinates at a radius L.

作为优选的技术方案,所述根据匿名伪装区域的路网信息,同步规划出真实出发地到伪装出发地的路线,具体为:As a preferred technical solution, according to the road network information of the anonymous camouflage area, the route from the real departure point to the disguised departure point is planned synchronously, specifically:

在本地加载地图后,采取调用用户系统内部的常规路径规划算法,分别生成从真实出发地到伪装出发地以及从伪装目的地到真实目的地的两条导航路线。After the map is loaded locally, the conventional path planning algorithm inside the user system is called to generate two navigation routes from the real departure point to the fake departure point and from the fake destination to the real destination.

作为优选的技术方案,所述候选路线通过下述方法进行规划:As a preferred technical solution, the candidate route is planned by the following method:

根据路径规划的策略要求,生成一条距离最短的路线,再根据道路的限速生成一条用时最短的路线,这是两条基础路线;According to the strategic requirements of path planning, generate a route with the shortest distance, and then generate a route with the shortest time according to the speed limit of the road, these are the two basic routes;

增加定制化的策略,策略包括避免收费、费用最少、不走高速路或不走快速路,进而生成多条定制路线;Add customized strategies, including avoiding tolls, minimizing fees, not taking expressways or expressways, and then generating multiple customized routes;

在用户允许的前提下,云服务商在服务结束后进行路线的优化,具体流程如下:Under the premise of the user's permission, the cloud service provider will optimize the route after the end of the service. The specific process is as follows:

当用户允许时,收集并存储所有请求的路径规划{伪装出发地S,伪装目的地D,发起时间T}三元组集合;When the user allows it, collect and store all requested path planning {disguised origin S, disguised destination D, initiation time T} triplet set;

在第二天的同一时间T,由云服务商请求LBS服务商进行{伪装出发地S,伪装目的地D}的路径规划,生成导航路线;At the same time T on the second day, the cloud service provider requests the LBS service provider to plan the route of {disguised origin S, disguised destination D} to generate a navigation route;

在收到LBS服务商的路线后,对比自己根据策略选出的路线,找出不同之处,找出首次出现分叉后的地图节点,标记为中继点;After receiving the route from the LBS service provider, compare the route selected by yourself according to the strategy, find out the difference, find out the map node after the first bifurcation, and mark it as a relay point;

在下一次涉及到该范围内的路线时,将该中继点加入路径规划,生成多组经过中继点的导航路线{伪装出发地,中继点1,伪装目的地},…,{伪装出发点,中继点n,伪装目的地}。When the route within this range is involved next time, the relay point will be added to the route planning to generate multiple sets of navigation routes passing through the relay point {pretend origin, relay point 1, camouflage destination}, ..., {pretend departure point , relay point n, masquerade destination}.

作为优选的技术方案,所述LBS服务商将路网区域R的实时路况信息利用全同态公钥加密传输给云服务商,具体为:As a preferred technical solution, the LBS service provider transmits the real-time road condition information of the road network area R to the cloud service provider using fully homomorphic public key encryption, specifically:

所述LBS服务商收到来自云服务商的路网区域R的实况地图信息请求,LBS服务商将对应地图数据结构中每条边edge的路况权重加密,整个地图的其他数据结构不会进行加密,再将路网区域R的实时路况地图数据结构传送给云服务商,由云服务商解析使用。The LBS service provider receives the live map information request from the road network area R of the cloud service provider, and the LBS service provider encrypts the road condition weight of each edge in the corresponding map data structure, and other data structures of the entire map will not be encrypted , and then transmit the real-time traffic map data structure of the road network area R to the cloud service provider for analysis and use by the cloud service provider.

作为优选的技术方案,所述根据实时路况信息,对之前的候选路线组的开销进行进一步计算,得到密文后的路线开销,具体为:As a preferred technical solution, according to the real-time road condition information, the cost of the previous candidate route group is further calculated to obtain the route cost after the ciphertext, specifically:

云服务商收到来自LBS服务商的权重信息后,将自己生成的候选路线组{w 1,…,w n }中的每一条路线都进行开销计算,所述开销计算具体为:每一条候选路线由多条边edge连接起来,将第i条边edge i 的距离长度利用公钥加密为密文长度信息enc(edge i .len),再获取来自LBS服务商的地图数据中这条边edge i 的密文权重信息enc(edge i .weight),将enc(edge i .len)和enc(edge i .weight)做密文乘法运算,得到该条边edge i 的开销,再将每条边的密文乘法结果累加起来,得到该条候选路线;After the cloud service provider receives the weight information from the LBS service provider, it calculates the cost of each route in the candidate route group { w 1 ,..., w n } generated by itself. The cost calculation is specifically: each candidate The route is connected by multiple edges , and the distance length of the i -th edge edge i is encrypted with a public key into the ciphertext length information enc ( edge i . len ), and then this edge in the map data from the LBS service provider is obtained The ciphertext weight information enc ( edge i . weight ) of i , the ciphertext multiplication of enc ( edge i . len ) and enc ( edge i . weight ) is performed to obtain the cost of the edge edge i , and then each edge The ciphertext multiplication results are accumulated to obtain the candidate route;

计算完所有路线后,得到最终每条路线的开销结果。After all routes are calculated, the final cost result of each route is obtained.

作为优选的技术方案,所述LBS服务商收到密文比较结果,利用私钥sk进行解密,并对比较结果进行排序,获得最佳路径的序号,具体为:As a preferred technical solution, the LBS service provider receives the ciphertext comparison result, uses the private key sk to decrypt, and sorts the comparison results to obtain the serial number of the best path, specifically:

根据隐私要求不同,当隐私等级为K时,对于当前候选路线数目N>2K时,采取“淘汰制”:According to different privacy requirements, when the privacy level is K, when the number of current candidate routes N>2K, the "elimination system" is adopted:

(1)候选路线组中的候选路线两两采用密文比较算法进行密文比较运算,得到N/2个比较结果密文,将比较结果密文传输给LBS服务商进行解密;(1) Two pairs of candidate routes in the candidate route group use the ciphertext comparison algorithm to perform ciphertext comparison operations to obtain N/2 comparison result ciphertexts, and transmit the comparison result ciphertexts to the LBS service provider for decryption;

(2)LBS服务商解密后得到N/2个比较结果明文,再将比较结果明文传输云服务商,云服务商将开销过大的路线进行剔除;(2) The LBS service provider decrypts and obtains N/2 comparison result plaintexts, and then transmits the comparison results in plaintext to the cloud service provider, and the cloud service provider eliminates routes with excessive costs;

(3)令N=N/2,如果N>2K,重复(1)-(2)步骤的过程,如果N<=2K,执行第(4)步;(3) Let N=N/2, if N>2K, repeat the process of steps (1)-(2), if N<=2K, execute step (4);

(4)将候选路线组中候选路线的开销,每条候选路线依次与其他候选路线比较一次,得到

Figure 399731DEST_PATH_IMAGE001
个比较结果密文,构造开销的比较结果序列;(4) Comparing the cost of candidate routes in the candidate route group, each candidate route is compared with other candidate routes in turn to obtain
Figure 399731DEST_PATH_IMAGE001
A comparison result ciphertext, constructing an overhead comparison result sequence;

(5)LBS服务商在解密

Figure 877723DEST_PATH_IMAGE001
个开销的比较结果序列后,根据明文比较结果,对N条候选路线进行排序,获得开销最小候选路线的序号。(5) The LBS service provider is decrypting
Figure 877723DEST_PATH_IMAGE001
After the comparison result sequences of the costs, the N candidate routes are sorted according to the plaintext comparison results, and the serial number of the candidate route with the minimum cost is obtained.

第二方面,本发明还提供了一种基于同态加密和匿名伪装的导航服务隐私保护系统,包括预处理模块、伪装区域生成模块、伪装点选取模块、路径规划模块、路线开销计算模块以及路径生成模块;In the second aspect, the present invention also provides a navigation service privacy protection system based on homomorphic encryption and anonymous masquerading, including a preprocessing module, a masquerading area generation module, a masquerading point selection module, a path planning module, a route cost calculation module and a path Generate modules;

所述预处理模块,用于由LBS服务商进行同态加密方案的初始化、生成公钥pk、私钥sk和评估密钥evk,然后将初始化参数params、公钥pk和评估密钥evk发送给云服务商进行初始化;The preprocessing module is used to initialize the homomorphic encryption scheme by the LBS service provider, generate the public key pk, the private key sk and the evaluation key evk, and then send the initialization parameter params, the public key pk and the evaluation key evk to The cloud service provider initializes;

所述伪装区域生成模块,用于用户利用匿名伪装算法分别生成出匿名伪装区域,并向云服务商请求该匿名伪装区域,云服务商收到匿名伪装区域请求后,将该匿名伪装区域的路网信息传输给用户;所述匿名伪装区域包括出发地匿名伪装区域和目的地匿名伪装区域;所述匿名伪装算法是基于K-匿名算法进行改造,将K-匿名算法前置条件满足的K个在线用户改变成随机生成的K个坐标;The camouflage area generating module is used for the user to generate an anonymous camouflage area using an anonymous camouflage algorithm, and request the anonymous camouflage area to the cloud service provider. After the cloud service provider receives the anonymous camouflage area request, the path of the anonymous camouflage area The network information is transmitted to the user; the anonymous camouflage area includes the anonymous camouflage area of departure and the destination anonymous camouflage area; the anonymous camouflage algorithm is transformed based on the K-anonymity algorithm, and K Online users change to randomly generated K coordinates;

所述伪装点选取模块,用于用户根据匿名伪装区域的路网信息,随机选取出发点附近满足伪装距离L的出发地伪装点和目的地伪装点,并将该出发地伪装点和目的地伪装点发送给云服务商;同时根据匿名伪装区域的路网信息,同步规划出真实出发地到伪装出发地的路线;The masquerading point selection module is used for the user to randomly select a departure masquerading point and a destination masquerading point satisfying the masquerading distance L near the departure point according to the road network information of the anonymous masquerading area, and set the departure masquerading point and destination masquerading point Send it to the cloud service provider; at the same time, according to the road network information of the anonymous camouflage area, the route from the real departure point to the fake departure point is planned synchronously;

所述路径规划模块,用于云服务商收到出发地伪装点和目的地伪装点后,规划出一组候选路线{w 1,…,w n },其中w 1,…,w n 分别代表一条候选路线,同时向LBS服务商请求候选路线涉及路网区域R的实时路况信息,LBS服务商将路网区域R的实时路况信息利用全同态公钥加密后传输给云服务商;The path planning module is used for the cloud service provider to plan a set of candidate routes { w 1 ,..., w n } after receiving the departure masquerading point and the destination masquerading point, where w 1 ,..., w n represent A candidate route, and at the same time request the LBS service provider for the real-time road condition information of the road network area R involved in the candidate route, and the LBS service provider encrypts the real-time road condition information of the road network area R with a fully homomorphic public key and transmits it to the cloud service provider;

所述路线开销计算模块,用于云服务商收到路网区域R加密后的实时路况信息,并根据实时路况信息,对之前的候选路线组的开销进行进一步计算,得到密文后的路线开销,利用全同态加密的比较运算,将每条路线相互比较,将密文比较结果传输给LBS服务商;The route cost calculation module is used for the cloud service provider to receive the encrypted real-time road condition information of the road network area R, and further calculate the cost of the previous candidate route group according to the real-time road condition information, and obtain the route cost after the ciphertext , use the comparison operation of fully homomorphic encryption to compare each route with each other, and transmit the ciphertext comparison result to the LBS service provider;

所述路径生成模块,用于LBS服务商收到密文比较结果,利用私钥sk进行解密,并对比较结果进行排序,获得最佳路径的序号,将该序号传输给用户;用户收到序号,将从候选路线组{w 1,…,w n }中选取的最佳路线在本地和伪装区域内的路线连接,生成最终的出行路线。The path generation module is used for the LBS service provider to receive the ciphertext comparison result, use the private key sk to decrypt, and sort the comparison results to obtain the serial number of the best path, and transmit the serial number to the user; the user receives the serial number , connect the best route selected from the candidate route group { w 1 ,…, w n } in the local area and the route in the camouflage area to generate the final travel route.

第三方面,本发明还提供了一种电子设备,所述电子设备包括:In a third aspect, the present invention also provides an electronic device, the electronic device comprising:

至少一个处理器;以及,at least one processor; and,

与所述至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein,

所述存储器存储有可被所述至少一个处理器执行的计算机程序指令,所述计算机程序指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行所述的基于同态加密和匿名伪装的导航服务隐私保护方法。The memory stores computer program instructions executable by the at least one processor, the computer program instructions are executed by the at least one processor, so that the at least one processor can perform the homomorphic encryption based and anonymous masquerading navigation service privacy protection method.

第四方面,本发明还提供了一种计算机可读存储介质,存储有程序,所述程序被处理器执行时,实现所述的基于同态加密和匿名伪装的导航服务隐私保护方法。In a fourth aspect, the present invention also provides a computer-readable storage medium storing a program, and when the program is executed by a processor, the method for protecting navigation service privacy based on homomorphic encryption and anonymous masquerade is implemented.

本发明与现有技术相比,具有如下优点和有益效果:Compared with the prior art, the present invention has the following advantages and beneficial effects:

1.LBS服务商在之前的方案中需要较高的配合度,现在只需要利用全同态加密,加密自己的商业数据,解密云服务商发送过来的密文比较结果即可,更利于LBS服务商进行改造。1. The LBS service provider needs a high degree of cooperation in the previous scheme. Now it only needs to use fully homomorphic encryption to encrypt its own business data and decrypt the ciphertext comparison results sent by the cloud service provider, which is more conducive to the LBS service provider. remodel.

2. 之前的分布式技术方案,返回给用户的路线非全局最优路线(非实时路况),本发明中基于云服务商中的路网图即可一组候选路线,其中包含非实时路况下的全局最优路线,并利用实时路况数据进一步优化,得到实时路况下的一条开销较小的路线方案。2. In the previous distributed technical solution, the route returned to the user is not the global optimal route (non-real-time road conditions). In this invention, a group of candidate routes can be obtained based on the road network diagram in the cloud service provider, including the route under non-real-time road conditions. The global optimal route is further optimized by using real-time traffic data to obtain a less expensive route scheme under real-time traffic conditions.

3.安全性高。之前的方案需要抵御LBS服务商之间的串谋,本发明即使有LBS服务商和云计算平台有串谋,经过伪装后的出发地点也会给LBS服务商的推导带来极大的难度,同时因为导航服务时效性极强,即使被穷举也会因为过长时间推算,而失去意义。3. High security. The previous scheme needs to resist the collusion between LBS service providers. In the present invention, even if there is a conspiracy between the LBS service provider and the cloud computing platform, the disguised starting point will bring great difficulty to the derivation of the LBS service provider. At the same time, because the navigation service is extremely time-sensitive, even if it is exhaustive, it will lose its meaning due to too long calculation.

附图说明Description of drawings

为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present application. For those skilled in the art, other drawings can also be obtained based on these drawings without creative effort.

图1为本发明实施例基于同态加密和匿名伪装的导航服务隐私保护方法的流程图;Fig. 1 is the flowchart of the navigation service privacy protection method based on homomorphic encryption and anonymous masquerading according to an embodiment of the present invention;

图2为本发明实施例基于同态加密和匿名伪装的导航服务隐私保护系统的方框图。Fig. 2 is a block diagram of a navigation service privacy protection system based on homomorphic encryption and anonymous masquerading according to an embodiment of the present invention.

图3为本发明实施例电子设备的结构图。FIG. 3 is a structural diagram of an electronic device according to an embodiment of the present invention.

具体实施方式Detailed ways

为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to enable those skilled in the art to better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

在本申请中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本申请所描述的实施例可以与其它实施例相结合。Reference in this application to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The occurrences of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described in this application can be combined with other embodiments.

同态加密:同态加密是一种加密算法,允许对密文进行特定形式的代数运算后,对结果密文进行解密,可以得到对明文进行相同运算的结果,借助同态加密,能够在保护隐私不泄露的同时实现对数据的运算。Homomorphic encryption: Homomorphic encryption is an encryption algorithm that allows specific forms of algebraic operations on the ciphertext, and then decrypts the resulting ciphertext to obtain the result of the same operation on the plaintext. With the help of homomorphic encryption, it is possible to protect Realize the operation of the data while keeping the privacy confidential.

匿名伪装:匿名伪装是指对身份的匿名和对位置的伪装,以达到对于请求者和位置进行混淆的目的。Anonymous masquerading: Anonymous masquerading refers to the anonymity of the identity and the disguise of the location, so as to confuse the requester and the location.

导航服务:用于查找将对象从出发地转移到目的地的一系列有效路径,此专利特指城市道路网规划导航问题。Navigation service: It is used to find a series of effective paths to transfer objects from the origin to the destination. This patent specifically refers to the problem of urban road network planning and navigation.

导航服务隐私保护方案的实现 是将隐私保护技术应用到导航服务中去,因此路径规划的效率、效果、安全性等与所采用的隐私保护方案密切相关。隐私信息检索、分布式计算等常见的导航服务隐私保护方案在在计算时间开销和生成的导航路线质量上都有其缺陷所在,同时针对导航服务中最重要的实时路况数据的参与并没有说明。LBS服务商的实时路况数据作为重要商业数据,交给在第三方的平台计算时需要进行加密处理,防止商业数据泄露,丧失其因数据服务带来的独有商业地位。本发明希望在实现导航服务的隐私保护同时,也能够利用LBS服务商的实时路况数据,提高服务质量,为用户生成安全优质的导航路线。The realization of navigation service privacy protection scheme is to apply privacy protection technology to navigation service, so the efficiency, effect and security of path planning are closely related to the adopted privacy protection scheme. Common navigation service privacy protection schemes such as privacy information retrieval and distributed computing have their shortcomings in terms of computing time overhead and the quality of generated navigation routes. At the same time, there is no explanation for the participation of the most important real-time traffic data in navigation services. The real-time traffic data of the LBS service provider, as important commercial data, needs to be encrypted when it is calculated on a third-party platform to prevent commercial data leakage and lose its unique commercial status brought about by data services. The present invention hopes that while realizing the privacy protection of the navigation service, the real-time road condition data of the LBS service provider can also be used to improve the service quality and generate safe and high-quality navigation routes for users.

本发明引入第三方半诚实云服务,第三方半诚实云服务拥有城市的路网数据包括路网节点之间的距离信息。通过对LBS服务商的路况数据进行全同态加密和对用户的位置请求进行匿名伪装后,再利用第三方半诚实云服务计算出最佳的路线,为用户提供出行隐私保护。同态加密技术能够在极高的安全性下对密文进行特定的算术运算,非常适合用于加密LBS服务商的商业路况数据。The present invention introduces a third-party semi-honest cloud service, and the third-party semi-honest cloud service owns road network data of cities including distance information between road network nodes. After fully homomorphically encrypting the LBS service provider's traffic data and anonymously disguising the user's location request, the third-party semi-honest cloud service is used to calculate the best route to provide users with travel privacy protection. Homomorphic encryption technology can perform specific arithmetic operations on ciphertext with extremely high security, which is very suitable for encrypting commercial traffic data of LBS service providers.

本发明所使用的全同态加密方案为CKKS方案。CKKS方案是由Cheon等人于2017年提出,支持对浮点数和复数的加密,非常适合用于路况数据的运算场景。CKKS同态加密方案包含8个主要的函数,以下是其详细的定义:The fully homomorphic encryption scheme used in the present invention is the CKKS scheme. The CKKS scheme was proposed by Cheon et al. in 2017. It supports the encryption of floating-point numbers and complex numbers, and is very suitable for computing scenarios of traffic data. The CKKS homomorphic encryption scheme contains 8 main functions, the following are their detailed definitions:

1、KeyGen(λ):输入安全参数λ,生成密文模数q L ,然后由λ和q L 生成整数h、P和实数σ。然后以h为汉明重量,从{-1,0,1} N 选取一个向量作为s,从R qL 中选取a,从R P·qL 中选取a',以σ 2 为高斯分布的方差生成两个随机数e和e';根据上述参数,生成私钥sk、公钥pk和评估密钥evk:1. KeyGen(λ): Input security parameter λ, generate ciphertext modulus q L , and then generate integer h, P and real number σ by λ and q L . Then take h as the Hamming weight, select a vector from {-1,0,1} N as s, select a from R qL , select a' from R P qL , and use σ 2 as the variance of Gaussian distribution to generate Two random numbers e and e'; according to the above parameters, generate private key sk, public key pk and evaluation key evk:

Figure 454198DEST_PATH_IMAGE002
Figure 454198DEST_PATH_IMAGE002

Figure 911724DEST_PATH_IMAGE003
Figure 911724DEST_PATH_IMAGE003

Figure 522834DEST_PATH_IMAGE004
Figure 522834DEST_PATH_IMAGE004

2、Ecd(z,Δ):输入一个消息向量

Figure 440237DEST_PATH_IMAGE005
和比例因子Δ,输出一个对应的明文多项式mR。2. Ecd(z,Δ): Input a message vector
Figure 440237DEST_PATH_IMAGE005
and scaling factor Δ, output a corresponding plaintext polynomial mR .

3、Dcd(m,Δ):输入一个明文多项式mR和比例因子Δ,输出对应的

Figure 300746DEST_PATH_IMAGE006
。3. Dcd(m,Δ): Input a plaintext polynomial mR and scale factor Δ, and output the corresponding
Figure 300746DEST_PATH_IMAGE006
.

4、Enc(m, pk):输入明文多项式m和公钥pk,首先从{-1,0,1} N 中选取向量v,然后以σ 2 为高斯分布的方差生成两个随机数e1和e2,输出密文:4. Enc(m, pk): Input plaintext polynomial m and public key pk, first select vector v from {-1,0,1} N , and then generate two random numbers e 1 with σ 2 as the variance of Gaussian distribution and e 2 , output ciphertext:

Figure 827542DEST_PATH_IMAGE007
Figure 827542DEST_PATH_IMAGE007

5、Dec(c,sk):输入密文c=(b,a)和私钥sk,输出明文m':5. Dec(c, sk): Input ciphertext c = ( b, a ) and private key sk, output plaintext m':

Figure 57273DEST_PATH_IMAGE008
Figure 57273DEST_PATH_IMAGE008

6、Add(c1,c2):输入两个密文c1和c2,输出密文之和 cadd6. Add(c 1 ,c 2 ): Input two ciphertexts c 1 and c 2 , and output the sum of ciphertexts c add :

Figure 378533DEST_PATH_IMAGE009
Figure 378533DEST_PATH_IMAGE009

7、Mult(c1,c2,evk):输入两个密文c 1=(b 1 ,a 1)和c 2=(b 2 ,a 2),设d=(d 0,d 1,d 2)=(b 1 b 2,a 1 b 2+a 2 b 1,a 1 a 2)modq l ,d表示两个密文的乘积,输出d的重线性化形式:7. Mult(c 1 ,c 2 ,evk): Input two ciphertexts c 1 =( b 1 , a 1 ) and c 2 =( b 2 , a 2 ), set d=( d 0 , d 1 , d 2 )=( b 1 b 2 , a 1 b 2 + a 2 b 1 , a 1 a 2 ) modq l , d represents the product of two ciphertexts, and outputs the relinearized form of d:

Figure 726337DEST_PATH_IMAGE010
Figure 726337DEST_PATH_IMAGE010

其中

Figure 292710DEST_PATH_IMAGE011
运算符表示舍入到最近的整数。in
Figure 292710DEST_PATH_IMAGE011
operator indicates rounding to the nearest integer.

8、

Figure 143991DEST_PATH_IMAGE012
:输入一个密文c,将其密文模数由q l 变为
Figure 901732DEST_PATH_IMAGE013
,一般用在密文乘法之后的线性化步骤中:8,
Figure 143991DEST_PATH_IMAGE012
: Input a ciphertext c, change its ciphertext modulus from q l to
Figure 901732DEST_PATH_IMAGE013
, generally used in the linearization step after ciphertext multiplication:

Figure 205674DEST_PATH_IMAGE014
Figure 205674DEST_PATH_IMAGE014

在本发明中,第三方半诚实云服务会在计算一组路线后,与全同态加密后的商业路况数据进行聚合运算,生成该组路线的密文下的路线开销。接着对不同的密文路线开销进行全同态比较运算,选出最优路线。假如密文直接做减法,再让LBS服务商解密后,根据差值来确定比较结果,那么LBS服务商有可能利用差值推算路线。所以必须实现全同态的比较运算,最终密文下的比较结果只是1或0或-1,即大于、相等、小于,从而让LBS服务商无法推断路线。In the present invention, after calculating a group of routes, the third-party semi-honest cloud service will perform an aggregation operation with the fully homomorphically encrypted commercial traffic data to generate the route cost under the ciphertext of the group of routes. Then, a fully homomorphic comparison operation is performed on different ciphertext route costs to select the optimal route. If the ciphertext is subtracted directly, and the LBS service provider decrypts it, and then determines the comparison result based on the difference, then the LBS service provider may use the difference to calculate the route. Therefore, a fully homomorphic comparison operation must be implemented. In the end, the comparison result under the ciphertext is only 1 or 0 or -1, that is, greater than, equal to, or less than, so that the LBS service provider cannot infer the route.

CKKS全同态支持的密文下的加法、乘法运算,因此它更擅长多项式计算,而不擅长逻辑运算包括比较。但是可以通过多项式逼近实现比较运算,来补足这方面的弱点。由于符号函数和比较函数实际在计算上是等价的,即

Figure 41650DEST_PATH_IMAGE015
。本发明利用符号函数的复合多项式逼近来实现比较运算,通过寻找合适的有理函数f,对f的多次复合,即
Figure 747438DEST_PATH_IMAGE016
来接近符号函数,从而实现高效CKKS的全同态比较运算。对f的分析可以得到以下核心性质:1、f(-x)=- f(x);2、 f(1)=1;3、
Figure 144921DEST_PATH_IMAGE017
;求解得到以下f的函数:
Figure 670580DEST_PATH_IMAGE018
,通过合适的复合计算即可逼近符号函数。CKKS fully homomorphic supports addition and multiplication operations under ciphertext, so it is better at polynomial calculations than logical operations including comparisons. However, the comparison operation can be realized by polynomial approximation to make up for this weakness. Since the sign function and the comparison function are actually computationally equivalent, that is
Figure 41650DEST_PATH_IMAGE015
. The present invention utilizes the compound polynomial approximation of sign function to realize comparison operation, by searching for suitable rational function f , to the multiple compound of f , namely
Figure 747438DEST_PATH_IMAGE016
To approach the sign function, so as to realize the fully homomorphic comparison operation of efficient CKKS. The analysis of f can get the following core properties: 1. f (- x )=- f ( x ); 2. f (1)=1; 3.
Figure 144921DEST_PATH_IMAGE017
; Solve to get the following function of f:
Figure 670580DEST_PATH_IMAGE018
, the symbolic function can be approximated by a suitable compound calculation.

匿名伪装算法:在实际导航过程中,用户所发送的出发地目的地,往往并不是路网图中的节点,而是根据出发地、目的地的经纬度定位。LBS服务商根据收到经纬度在路网图中找到最近的节点,从而在两节点之间进行路径规划。本发明根据此特性,提出匿名伪装算法:本算法基于K-匿名算法进行改造,本质上将算法前置条件满足的K个在线用户改变成随机生成的K个坐标:Anonymous camouflage algorithm: In the actual navigation process, the departure destination sent by the user is often not a node in the road network graph, but is positioned according to the latitude and longitude of the departure place and destination. The LBS service provider finds the nearest node in the road network graph according to the received latitude and longitude, so as to plan the path between the two nodes. According to this characteristic, the present invention proposes an anonymous camouflage algorithm: this algorithm is transformed based on the K-anonymity algorithm, and essentially changes the K online users whose preconditions of the algorithm are met into randomly generated K coordinates:

1.用户拥有出发地经纬度坐标S,目的地经纬度坐标D,设定伪装距离L,伪装等级K。1. The user has the longitude and latitude coordinates S of the departure point, the longitude and latitude coordinates D of the destination, sets the camouflage distance L, and the camouflage level K.

2.用户基于伪装距离L和伪装等级K,在半径L处生成K个随机地点。2. Based on the camouflage distance L and camouflage level K, the user generates K random locations at a radius L.

3.例如对于出发地,用户利用K-匿名算法f(S,K,L)得到匿名伪装矩形区域的四个经纬度坐标。3. For example, for the departure place, the user uses the K-anonymity algorithm f(S, K, L) to obtain the four latitude and longitude coordinates of the anonymous masquerading rectangular area.

可以理解的是,用户利用这四个经纬度坐标向第三方云服务发出请求,获取四个坐标构成矩形区域内的路网信息。用户获取匿名伪装区域并随机构建伪装节点。该算法生成的伪装区域,即使算法公开,服务商反推导用户原来经纬度定位信息的难度极高,且导航服务时效性较强It can be understood that the user uses these four latitude and longitude coordinates to send a request to the third-party cloud service to obtain the road network information within the rectangular area formed by the four coordinates. Users obtain anonymous masquerading areas and randomly build masquerading nodes. For the camouflaged area generated by this algorithm, even if the algorithm is made public, it is extremely difficult for the service provider to deduce the user’s original latitude and longitude positioning information, and the navigation service is time-sensitive

基于上述全同态加密方案和逻辑运算补充,再加上匿名伪装技术,本发明LBS服务商、云服务商和用户的具体内容为:Based on the above-mentioned fully homomorphic encryption scheme and logical operation supplements, coupled with anonymous camouflage technology, the specific content of the LBS service provider, cloud service provider and users of the present invention is:

LBS服务商:本系统中LBS服务商拥有庞大的实时路况数据,负责生成全同态加密的密钥,加密LBS服务商的实时路况数据交付给云服务商进行运算。另外还负责将密文比较结果解密后,将最优路径选取的次序传输给用户。LBS service provider: In this system, the LBS service provider has huge real-time traffic data and is responsible for generating a fully homomorphic encryption key, encrypting the real-time traffic data of the LBS service provider and delivering it to the cloud service provider for calculation. In addition, it is also responsible for decrypting the comparison result of the ciphertext, and then transmitting the order of optimal path selection to the user.

云服务商:第三方的半诚实云计算服务平台,拥有地图路网的基本信息,负责初步生成一组候选路线,通过LBS服务商传输过来的加密路况信息,进一步计算每条路线的精准开销。之后将密文下的路线开销利用全同态加密的比较运算,分别进行比较,将每组比较结果交由LBS服务商进行解密。同时也将生成的候选路线传输给用户。Cloud service provider: The third-party semi-honest cloud computing service platform, which has the basic information of the map road network, is responsible for initially generating a set of candidate routes, and further calculates the precise cost of each route through the encrypted road condition information transmitted by the LBS service provider. Afterwards, the route overhead under the ciphertext is compared separately using the comparison operation of fully homomorphic encryption, and each group of comparison results is handed over to the LBS service provider for decryption. At the same time, the generated candidate routes are also transmitted to the user.

用户:用户负责对地点进行伪装,将伪装后的地点,向云服务商发起请求,收到云服务商生成的候选路线组,随即收到LBS服务商提供的最佳路线序号,自行选取最佳路线。User: The user is responsible for disguising the location, sending a request to the cloud service provider for the disguised location, receiving the candidate route group generated by the cloud service provider, and then receiving the best route number provided by the LBS service provider, and selecting the best route by himself. route.

如图1所示,本实施例基于同态加密和匿名伪装的导航服务隐私保护方法,包括下述具体步骤:As shown in Figure 1, the navigation service privacy protection method based on homomorphic encryption and anonymous masquerading in this embodiment includes the following specific steps:

S1、由LBS服务商进行同态加密方案的初始化、生成公钥pk、私钥sk和评估密钥evk,然后将初始化参数params、公钥pk和评估密钥evk发送给云服务商进行初始化。S1. The LBS service provider initializes the homomorphic encryption scheme, generates the public key pk, private key sk, and evaluation key evk, and then sends the initialization parameters params, public key pk, and evaluation key evk to the cloud service provider for initialization.

进一步的,云服务商采用CKKS全同态加密方案进行相关加密参数的初始化,流程如下:Furthermore, the cloud service provider uses the CKKS fully homomorphic encryption scheme to initialize relevant encryption parameters, and the process is as follows:

KeyGen(λ):输入安全参数λ,生成密文模数q L ,然后由λ和q L 生成整数h、P和实数σ。然后以h为汉明重量,从{-1,0,1} N 选取一个向量作为s,从R qL 中选取a,从R P·qL 中选取a',以σ 2 为高斯分布的方差生成两个随机数e和e';根据上述参数,生成私钥sk、公钥pk和评估密钥evk:KeyGen(λ): Input security parameter λ, generate ciphertext modulus q L , and then generate integer h, P and real number σ by λ and q L . Then take h as the Hamming weight, select a vector from {-1,0,1} N as s, select a from R qL , select a' from R P qL , and use σ 2 as the variance of Gaussian distribution to generate Two random numbers e and e'; according to the above parameters, generate private key sk, public key pk and evaluation key evk:

Figure 47597DEST_PATH_IMAGE002
Figure 47597DEST_PATH_IMAGE002

Figure 342312DEST_PATH_IMAGE003
Figure 342312DEST_PATH_IMAGE003

Figure 176276DEST_PATH_IMAGE004
Figure 176276DEST_PATH_IMAGE004

S2、用户利用匿名伪装算法分别生成出发地匿名伪装区域和目的地匿名伪装区域,并向云服务商请求这片区域。S2. The user uses the anonymous masquerading algorithm to generate the departure anonymous masquerading area and the destination anonymous masquerading area respectively, and requests this area from the cloud service provider.

进一步的,所述匿名伪装算法具体为:Further, the anonymous masquerading algorithm is specifically:

用户拥有出发地经纬度坐标S,目的地经纬度坐标D,设定伪装距离L、伪装等级K;The user has the latitude and longitude coordinates S of the departure point, the latitude and longitude coordinates D of the destination, and sets the camouflage distance L and camouflage level K;

用户基于伪装距离L和伪装等级K,在半径L处生成K-1个随机坐标。Based on the camouflage distance L and camouflage level K, the user generates K-1 random coordinates at a radius L.

更进一步的,本实施例利用Kalnis在07年发表的文章中基于K-匿名概念发布了生成匿名空间区域的算法,该算法即使公布生成方法,对于匿名空间的获取方也难以计算出生成者的坐标位置。Furthermore, this embodiment utilizes Kalnis’s article published in 2007 to publish an algorithm for generating anonymous space regions based on the concept of K-anonymity. Even if the algorithm publishes the generation method, it is difficult for the acquirer of the anonymous space to calculate the generator’s coordinate location.

S3、云服务收到匿名伪装区域请求,将该片区域的路网信息传输给用户。S3. The cloud service receives the anonymous masquerading area request, and transmits the road network information of the area to the user.

S4、用户根据匿名伪装区域的路网信息,随机选取出发点附近满足伪装距离l的出发地目的地伪装点,发送给云服务商。同时根据匿名伪装区域的路网信息,同步规划出真实出发地到伪装出发地的路线。S4. According to the road network information of the anonymous masquerading area, the user randomly selects a masquerading point near the departure point that satisfies the masquerading distance l, and sends it to the cloud service provider. At the same time, according to the road network information of the anonymous camouflage area, the route from the real departure point to the disguised departure point is planned synchronously.

进一步的,所述根据匿名伪装区域的路网信息,同步规划出真实出发地到伪装出发地的路线,具体为:Further, according to the road network information of the anonymous camouflage area, the route from the real departure point to the disguised departure point is planned synchronously, specifically:

因为所生成的匿名伪装区域存储在用户端且地图范围较小,在本地加载地图后,采取调用用户系统内部的常规路径规划算法,分别生成从真实出发地到伪装出发地以及从伪装目的地到真实目的地的两条导航路线。Because the generated anonymous masquerading area is stored on the user end and the map range is small, after the map is loaded locally, the routine path planning algorithm inside the user system is called to generate the route from the real departure point to the masquerading departure point and from the masquerading destination to the Two navigation routes to real destinations.

S5、云服务商收到伪装后的出发地,目的地并为该请求,规划处一组候选路线{w 1,…,w n };同时向LBS服务商请求候选路线涉及路网区域R的实时路况信息。S5. The cloud service provider receives the disguised origin and destination and plans a group of candidate routes { w 1 ,..., w n } for the request; at the same time, it requests the LBS service provider for the candidate routes involving the road network area R Real-time traffic information.

进一步的,候选路线通过下述方式规划:Further, candidate routes are planned in the following way:

首先,根据路径规划的策略要求,生成一条距离最短的路线,再根据道路的限速生成一条用时最短的路线,这是两条基础路线;First, according to the strategic requirements of path planning, a route with the shortest distance is generated, and then a route with the shortest time is generated according to the speed limit of the road. These are the two basic routes;

其次,增加定制化的策略,策略包括避免收费、费用最少、不走高速路或不走快速路,进而生成多条路线;Secondly, add customized strategies, including avoiding tolls, minimizing fees, not taking expressways or expressways, and then generating multiple routes;

此外,在用户允许的前提下,云服务商在服务结束后进行路线的优化,具体流程如下:In addition, under the premise of the user's permission, the cloud service provider will optimize the route after the end of the service. The specific process is as follows:

当用户允许时,收集并存储所有请求的路径规划{伪装出发地S,伪装目的地D,发起时间T}三元组集合;When the user allows it, collect and store all requested path planning {disguised origin S, disguised destination D, initiation time T} triplet set;

在第二天的同一时间T,由云服务商请求LBS服务商进行{伪装出发地S,伪装目的地D}的路径规划,生成导航路线;At the same time T on the second day, the cloud service provider requests the LBS service provider to plan the route of {disguised origin S, disguised destination D} to generate a navigation route;

在收到LBS服务商的路线后,对比自己根据策略选出的路线,找出不同之处,找出首次出现分叉后的地图节点,标记为中继点;After receiving the route from the LBS service provider, compare the route selected by yourself according to the strategy, find out the difference, find out the map node after the first bifurcation, and mark it as a relay point;

在下一次涉及到该范围内的路线时,将该中继点加入路径规划,如{伪装出发地,中继点1,伪装目的地},…,{伪装出发点,中继点n,伪装目的地},生成的多组经过中继点的导航路线。When it comes to the route within this range next time, add this relay point to the route planning, such as {pretend origin, relay point 1, camouflage destination}, ..., {pretend departure point, relay point n, camouflage destination }, the generated sets of navigation routes passing through relay points.

S6、LBS服务商将区域R的实时路况信息进行利用全同态公钥加密传输给云服务商。S6. The LBS service provider encrypts and transmits the real-time road condition information of the region R to the cloud service provider using a fully homomorphic public key.

进一步的,所述LBS服务商将路网区域R的实时路况信息利用全同态公钥加密传输给云服务商,具体为:Further, the LBS service provider transmits the real-time road condition information of the road network area R to the cloud service provider using fully homomorphic public key encryption, specifically:

所述LBS服务商收到来自云服务商的路网区域R的实况地图信息请求,LBS服务商将对应地图数据结构中每条边edge的路况权重加密,整个地图的其他数据结构不会进行加密,再将路网区域R的实时路况地图数据结构传送给云服务商,由云服务商解析使用。The LBS service provider receives the live map information request from the road network area R of the cloud service provider, and the LBS service provider encrypts the road condition weight of each edge in the corresponding map data structure, and other data structures of the entire map will not be encrypted , and then transmit the real-time traffic map data structure of the road network area R to the cloud service provider for analysis and use by the cloud service provider.

S7、云服务商收到路网区域R加密后的实时路况信息,并根据实时路况信息,对之前的候选路线组的开销进行进一步计算,得到密文后的路线开销,利用全同态加密的比较运算,将每条路线相互比较,将密文比较结果传输给LBS服务商。S7. The cloud service provider receives the encrypted real-time road condition information in the road network area R, and according to the real-time road condition information, further calculates the cost of the previous candidate route group, obtains the route cost after the ciphertext, and uses the fully homomorphic encryption Comparison operation, compare each route with each other, and transmit the ciphertext comparison result to the LBS service provider.

进一步的,云服务商收到来自LBS服务商的权重信息后,将自己生成的候选路线组{w 1,…,w n }中的每一条候选路线都进行开销计算,所述开销的计算方法为:依次取出路线w i (一条路线由多条边edge连接起来),依次将第i条边edge i 的距离长度进行利用公钥加密为密文长度信息enc(edge i .len),再获取来自LBS服务商的地图数据结构中这条边edge i 的密文权重信息enc(edge i .weight),两者做密文乘法运算enc(edge i .len)*enc(edge i .weight),得到该段edge i 的开销;再将每条边edge的密文乘法结果累加起来,即可得到路线w i 的开销

Figure 923652DEST_PATH_IMAGE019
。Further, after the cloud service provider receives the weight information from the LBS service provider, it calculates the cost of each candidate route in the candidate route group { w 1 ,..., w n } generated by itself. The cost calculation method It is: sequentially take out the route w i (a route is connected by multiple edges ), sequentially encrypt the distance length of the i- th edge edge i with a public key into the ciphertext length information enc ( edge i . len ), and then obtain The ciphertext weight information enc ( edge i . weight ) of this edge edge i in the map data structure from the LBS service provider, the two do the ciphertext multiplication enc ( edge i . len )* enc ( edge i . weight ), Get the cost of edge i in this segment; then add up the ciphertext multiplication results of each edge to get the cost of route w i
Figure 923652DEST_PATH_IMAGE019
.

计算完所有路线后,随后可以得到最终每条路线的开销结果(密文状态)。After all the routes are calculated, the final cost result (ciphertext state) of each route can then be obtained.

S8、LBS服务商收到密文比较结果,利用私钥进行解密,并对比较结果进行排序,获得最佳路径的序号,将该序号传输给用户。S8. The LBS service provider receives the ciphertext comparison result, decrypts it with the private key, sorts the comparison results, obtains the serial number of the best path, and transmits the serial number to the user.

密文比较算法:

Figure 602895DEST_PATH_IMAGE020
,分别代表小于,等于,大于。比较结果必须在在解密后次才能得出。Ciphertext comparison algorithm:
Figure 602895DEST_PATH_IMAGE020
, representing less than, equal to, and greater than, respectively. The comparison result must be obtained after decryption.

进一步的,所述LBS服务商收到密文比较结果,利用私钥sk进行解密,并对比较结果进行排序,获得最佳路径的序号,具体为:Further, the LBS service provider receives the ciphertext comparison result, uses the private key sk to decrypt, and sorts the comparison results to obtain the serial number of the best path, specifically:

根据隐私要求不同,当隐私等级为K时,对于当前候选路线组数目N>2K时,采取“淘汰制”:According to different privacy requirements, when the privacy level is K, when the number of current candidate route groups N>2K, the "elimination system" is adopted:

(1)候选路线组中的候选路线两两采用密文比较算法进行密文比较运算,得到N/2个比较结果密文,将比较结果序列

Figure 250652DEST_PATH_IMAGE021
传输给LBS服务商进行解密;(1) The candidate routes in the candidate route group use the ciphertext comparison algorithm to perform ciphertext comparison operation in pairs, and obtain N/2 comparison result ciphertexts, and compare the result sequence
Figure 250652DEST_PATH_IMAGE021
Transmission to the LBS service provider for decryption;

(2)LBS服务商解密后得到N/2个比较结果明文,再将比较结果明文传输云服务商,云服务商将开销过大的路线进行剔除;(2) The LBS service provider decrypts and obtains N/2 comparison result plaintexts, and then transmits the comparison results in plaintext to the cloud service provider, and the cloud service provider eliminates routes with excessive costs;

(3)令N=N/2,如果N>2K,重复(1)-(2)步骤的过程;如果N<=2K,执行第(4)步;(3) Let N=N/2, if N>2K, repeat the process of steps (1)-(2); if N<=2K, execute step (4);

(4)将路线组中路线开销,每条路线比较一次,可以得到

Figure 989938DEST_PATH_IMAGE001
个比较结果密文,构造结果序列
Figure 755769DEST_PATH_IMAGE022
;(4) Comparing the cost of the routes in the route group with each route once, we can get
Figure 989938DEST_PATH_IMAGE001
A comparison result ciphertext, construct the result sequence
Figure 755769DEST_PATH_IMAGE022
;

(5)LBS服务商在解密

Figure 504282DEST_PATH_IMAGE001
个比较结果序列后,根据明文比较结果,对N条路线进行排序,获得开销最小路线的序号。(5) The LBS service provider is decrypting
Figure 504282DEST_PATH_IMAGE001
After comparison result sequences, sort the N routes according to the plaintext comparison results, and obtain the serial number of the route with the least cost.

S9、用户收到序号,将从候选路线组{w 1,…,w n }中选取的最佳路线在本地和伪装区域内的路线连接,生成最终的出行路线。S9. After receiving the serial number, the user connects the best route selected from the candidate route group { w 1 ,..., w n } in the local area and the route in the camouflaged area to generate a final travel route.

本发明借助于全同态加密技术支持密文加法和密文乘法的特性,实现了对LBS服务商的加密数据整合后进一步提高路线规划的服务质量,也能保证LBS服务商的商业数据的机密性。另外利用匿名伪装算法保证用户的出行地点得到伪装,对第三方半诚实的云服务商的实现伪装效果,增加第三方半诚实云服务反向追踪的难度。同时云服务商只作为计算的中间平台,负责完成整个系统中的计算任务。The present invention supports the characteristics of ciphertext addition and ciphertext multiplication by means of fully homomorphic encryption technology, realizes the integration of the encrypted data of the LBS service provider, and further improves the service quality of route planning, and can also ensure the confidentiality of the commercial data of the LBS service provider sex. In addition, the anonymous camouflage algorithm is used to ensure that the user's travel location is camouflaged, and the camouflage effect is realized for the third-party semi-honest cloud service provider, which increases the difficulty of reverse tracking of the third-party semi-honest cloud service. At the same time, the cloud service provider only acts as an intermediate platform for computing and is responsible for completing the computing tasks in the entire system.

需要说明的是,对于前述的各方法实施例,为了简便描述,将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其它顺序或者同时进行。It should be noted that for the foregoing method embodiments, for the sake of simplicity of description, they are expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the described action sequence, because Certain steps may be performed in other orders or simultaneously in accordance with the present invention.

基于与上述实施例中的基于同态加密和匿名伪装的导航服务隐私保护方法相同的思想,本发明还提供了基于同态加密和匿名伪装的导航服务隐私保护系统,该系统可用于执行上述基于同态加密和匿名伪装的导航服务隐私保护方法。为了便于说明,基于同态加密和匿名伪装的导航服务隐私保护系统实施例的结构示意图中,仅仅示出了与本发明实施例相关的部分,本领域技术人员可以理解,图示结构并不构成对装置的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。Based on the same idea as the navigation service privacy protection method based on homomorphic encryption and anonymous masquerade in the above embodiments, the present invention also provides a navigation service privacy protection system based on homomorphic encryption and anonymous masquerade, which can be used to implement the above-mentioned method based on Homomorphic encryption and anonymous masquerade privacy protection method for navigation services. For the convenience of description, in the schematic structural diagram of the embodiment of the navigation service privacy protection system based on homomorphic encryption and anonymous masquerade, only the parts related to the embodiment of the present invention are shown. Those skilled in the art can understand that the illustrated structure does not constitute Definitions of devices may include more or fewer components than shown, or combinations of certain components, or different arrangements of components.

请参阅图2,在本申请的另一个实施例中,提供了一种基于同态加密和匿名伪装的导航服务隐私保护系统100,该系统包括预处理模块101、伪装区域生成模块102、伪装点选取模块103、路径规划模块104、路线开销计算模块105以及路径生成模块106;Please refer to Fig. 2, in another embodiment of the present application, a navigation service privacy protection system 100 based on homomorphic encryption and anonymous masquerade is provided, the system includes a preprocessing module 101, a masquerading area generating module 102, a masquerading point Selection module 103, path planning module 104, route cost calculation module 105 and path generation module 106;

所述预处理模块101,用于由LBS服务商进行同态加密方案的初始化、生成公钥pk、私钥sk和评估密钥evk,然后将初始化参数params、公钥pk和评估密钥evk发送给云服务商进行初始化;The preprocessing module 101 is used to initialize the homomorphic encryption scheme by the LBS service provider, generate the public key pk, the private key sk and the evaluation key evk, and then send the initialization parameters params, the public key pk and the evaluation key evk Initialize the cloud service provider;

所述伪装区域生成模块102,用于用户利用匿名伪装算法分别生成出匿名伪装区域,并向云服务商请求该匿名伪装区域,云服务商收到匿名伪装区域请求后,将该匿名伪装区域的路网信息传输给用户;所述匿名伪装区域包括出发地匿名伪装区域和目的地匿名伪装区域;所述匿名伪装算法是基于K-匿名算法进行改造,将K-匿名算法前置条件满足的K个在线用户改变成随机生成的K个坐标;The masquerading area generation module 102 is used for the user to generate an anonymous masquerading area using an anonymous masquerading algorithm, and request the anonymous masquerading area to the cloud service provider. After the cloud service provider receives the anonymous masquerading area request, the anonymous masquerading area The road network information is transmitted to the user; the anonymous camouflage area includes the anonymous camouflage area of departure and the anonymous camouflage area of the destination; the anonymous camouflage algorithm is transformed based on the K-anonymity algorithm, and the K-anonymity algorithm precondition is satisfied K Online users change to randomly generated K coordinates;

所述伪装点选取模块103,用于用户根据匿名伪装区域的路网信息,随机选取出发点附近满足伪装距离L的出发地伪装点和目的地伪装点,并将该出发地伪装点和目的地伪装点发送给云服务商;同时根据匿名伪装区域的路网信息,同步规划出真实出发地到伪装出发地的路线;The masquerading point selection module 103 is used for the user to randomly select a departure masquerading point and a destination masquerading point satisfying the masquerading distance L near the departure point according to the road network information of the anonymous masquerading area, and masquerading the departure masquerading point and destination Points are sent to the cloud service provider; at the same time, according to the road network information of the anonymous camouflage area, the route from the real departure point to the disguised departure point is planned synchronously;

所述路径规划模块104,用于云服务商收到出发地伪装点和目的地伪装点后,规划出一组候选路线{w 1,…,w n },同时向LBS服务商请求候选路线涉及路网区域R的实时路况信息,LBS服务商将路网区域R的实时路况信息利用全同态公钥加密后传输给云服务商;The path planning module 104 is used for the cloud service provider to plan a set of candidate routes { w 1 ,..., w n } after receiving the departure masquerade point and the destination masquerade point, and at the same time request the LBS service provider for the candidate routes For the real-time traffic information of the road network area R, the LBS service provider encrypts the real-time traffic information of the road network area R with a fully homomorphic public key and transmits it to the cloud service provider;

所述路线开销计算模块105,用于云服务商收到路网区域R加密后的实时路况信息,并根据实时路况信息,对之前的候选路线组的开销进行进一步计算,得到密文后的路线开销,利用全同态加密的比较运算,将每条路线相互比较,将密文比较结果传输给LBS服务商;The route cost calculation module 105 is used for the cloud service provider to receive the encrypted real-time road condition information of the road network area R, and further calculate the cost of the previous candidate route group according to the real-time road condition information, and obtain the route after the ciphertext Overhead, use the comparison operation of fully homomorphic encryption to compare each route with each other, and transmit the ciphertext comparison result to the LBS service provider;

所述路径生成模块106,用于LBS服务商收到密文比较结果,利用私钥sk进行解密,并对比较结果进行排序,获得最佳路径的序号,将该序号传输给用户;用户收到序号,将从候选路线组{w 1,…,w n }中选取的最佳路线在本地和伪装区域内的路线连接,生成最终的出行路线。The path generation module 106 is used for the LBS service provider to receive the ciphertext comparison result, use the private key sk to decrypt, and sort the comparison results to obtain the sequence number of the best path, and transmit the sequence number to the user; The sequence number connects the best route selected from the candidate route group { w 1 ,..., w n } in the local area and the route in the camouflage area to generate the final travel route.

需要说明的是,本发明的基于同态加密和匿名伪装的导航服务隐私保护系统与本发明的基于同态加密和匿名伪装的导航服务隐私保护方法一一对应,在上述基于同态加密和匿名伪装的导航服务隐私保护方法的实施例阐述的技术特征及其有益效果均适用于基于同态加密和匿名伪装的导航服务隐私保护的实施例中,具体内容可参见本发明方法实施例中的叙述,此处不再赘述,特此声明。It should be noted that the navigation service privacy protection system based on homomorphic encryption and anonymous masquerading of the present invention corresponds to the navigation service privacy protection method based on homomorphic encryption and anonymous masquerading of the present invention. The technical features and beneficial effects described in the embodiment of the disguised navigation service privacy protection method are applicable to the embodiment of the navigation service privacy protection based on homomorphic encryption and anonymous masquerading. For details, please refer to the description in the method embodiment of the present invention , which will not be repeated here, and is hereby declared.

此外,上述实施例的基于同态加密和匿名伪装的导航服务隐私保护系统的实施方式中,各程序模块的逻辑划分仅是举例说明,实际应用中可以根据需要,例如出于相应硬件的配置要求或者软件的实现的便利考虑,将上述功能分配由不同的程序模块完成,即将所述基于同态加密和匿名伪装的导航服务隐私保护系统的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分功能。In addition, in the implementation of the navigation service privacy protection system based on homomorphic encryption and anonymous masquerading in the above-mentioned embodiments, the logical division of each program module is only an example. Or considering the convenience of software implementation, the above-mentioned function distribution is completed by different program modules, that is, the internal structure of the navigation service privacy protection system based on homomorphic encryption and anonymous masquerading is divided into different program modules to complete the above-described full or partial functionality.

请参阅图3,在一个实施例中,提供了一种实现基于同态加密和匿名伪装的导航服务隐私保护方法的电子设备,所述电子设备200可以包括第一处理器201、第一存储器202和总线,还可以包括存储在所述第一存储器202中并可在所述第一处理器201上运行的计算机程序,如导航服务隐私保护程序203。Please refer to FIG. 3 , in one embodiment, an electronic device for implementing a navigation service privacy protection method based on homomorphic encryption and anonymous masquerade is provided, and the electronic device 200 may include a first processor 201 and a first memory 202 and bus, may also include a computer program stored in the first memory 202 and operable on the first processor 201, such as a navigation service privacy protection program 203.

其中,所述第一存储器202至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、移动硬盘、多媒体卡、卡型存储器(例如:SD或DX存储器等)、磁性存储器、磁盘、光盘等。所述第一存储器202在一些实施例中可以是电子设备200的内部存储单元,例如该电子设备200的移动硬盘。所述第一存储器202在另一些实施例中也可以是电子设备200的外部存储设备,例如电子设备200上配备的插接式移动硬盘、智能存储卡(Smart Media Card,SMC)、安全数字(SecureDigital,SD)卡、闪存卡(Flash Card)等。进一步地,所述第一存储器202还可以既包括电子设备200的内部存储单元也包括外部存储设备。所述第一存储器202不仅可以用于存储安装于电子设备200的应用软件及各类数据,例如导航服务隐私保护程序203的代码等,还可以用于暂时地存储已经输出或者将要输出的数据。Wherein, the first memory 202 includes at least one type of readable storage medium, and the readable storage medium includes a flash memory, a mobile hard disk, a multimedia card, a card-type memory (for example: SD or DX memory, etc.), a magnetic memory, Disk, CD, etc. The first storage 202 may be an internal storage unit of the electronic device 200 in some embodiments, such as a mobile hard disk of the electronic device 200 . The first memory 202 may also be an external storage device of the electronic device 200 in other embodiments, such as a plug-in mobile hard disk equipped on the electronic device 200, a smart memory card (Smart Media Card, SMC), a secure digital ( SecureDigital, SD) card, flash memory card (Flash Card), etc. Further, the first memory 202 may also include both an internal storage unit of the electronic device 200 and an external storage device. The first memory 202 can not only be used to store application software and various data installed in the electronic device 200, such as the code of the navigation service privacy protection program 203, etc., but also can be used to temporarily store data that has been output or will be output.

所述第一处理器201在一些实施例中可以由集成电路组成,例如可以由单个封装的集成电路所组成,也可以是由多个相同功能或不同功能封装的集成电路所组成,包括一个或者多个中央处理器(Central Processing unit,CPU)、微处理器、数字处理芯片、图形处理器及各种控制芯片的组合等。所述第一处理器201是所述电子设备的控制核心(Control Unit),利用各种接口和线路连接整个电子设备的各个部件,通过运行或执行存储在所述第一存储器202内的程序或者模块,以及调用存储在所述第一存储器202内的数据,以执行电子设备200的各种功能和处理数据。In some embodiments, the first processor 201 may be composed of an integrated circuit, for example, may be composed of a single packaged integrated circuit, or may be composed of multiple integrated circuits with the same function or different functions packaged, including one or A combination of multiple central processing units (Central Processing unit, CPU), microprocessors, digital processing chips, graphics processors and various control chips, etc. The first processor 201 is the control core (Control Unit) of the electronic device, which uses various interfaces and lines to connect various components of the entire electronic device, and runs or executes programs stored in the first memory 202 or modules, and call data stored in the first memory 202 to execute various functions of the electronic device 200 and process data.

图3仅示出了具有部件的电子设备,本领域技术人员可以理解的是,图3示出的结构并不构成对所述电子设备200的限定,可以包括比图示更少或者更多的部件,或者组合某些部件,或者不同的部件布置。FIG. 3 only shows an electronic device with components. Those skilled in the art can understand that the structure shown in FIG. 3 does not constitute a limitation to the electronic device 200, and may include fewer or more components, or combinations of certain components, or different arrangements of components.

所述电子设备200中的所述第一存储器202存储的导航服务隐私保护程序203是多个指令的组合,在所述第一处理器201中运行时,可以实现:The navigation service privacy protection program 203 stored in the first memory 202 in the electronic device 200 is a combination of multiple instructions. When running in the first processor 201, it can realize:

由LBS服务商进行同态加密方案的初始化、生成公钥pk、私钥sk和评估密钥evk,然后将初始化参数params、公钥pk和评估密钥evk发送给云服务商进行初始化;The LBS service provider initializes the homomorphic encryption scheme, generates the public key pk, private key sk, and evaluation key evk, and then sends the initialization parameters params, public key pk, and evaluation key evk to the cloud service provider for initialization;

用户利用匿名伪装算法分别生成出匿名伪装区域,并向云服务商请求该匿名伪装区域,云服务商收到匿名伪装区域请求后,将该匿名伪装区域的路网信息传输给用户;所述匿名伪装区域包括出发地匿名伪装区域和目的地匿名伪装区域;所述匿名伪装算法是基于K-匿名算法进行改造,将K-匿名算法前置条件满足的K个在线用户改变成随机生成的K个坐标;The user uses an anonymous camouflage algorithm to generate an anonymous camouflage area respectively, and requests the anonymous camouflage area from the cloud service provider, and the cloud service provider transmits the road network information of the anonymous camouflage area to the user after receiving the anonymous camouflage area request; The masquerading area includes the anonymous masquerading area of the departure place and the anonymous masquerading area of the destination; the anonymous masquerading algorithm is transformed based on the K-anonymous algorithm, and the K online users whose preconditions of the K-anonymous algorithm are satisfied are changed into randomly generated K coordinate;

用户根据匿名伪装区域的路网信息,随机选取出发点附近满足伪装距离L的出发地伪装点和目的地伪装点,并将该出发地伪装点和目的地伪装点发送给云服务商;同时根据匿名伪装区域的路网信息,同步规划出真实出发地到伪装出发地的路线;According to the road network information of the anonymous masquerading area, the user randomly selects the departure masquerading point and the destination masquerading point that meet the masquerading distance L near the departure point, and sends the departure masquerading point and destination masquerading point to the cloud service provider; at the same time, according to the anonymous The road network information of the camouflaged area, synchronously planning the route from the real departure point to the disguised departure point;

云服务商收到出发地伪装点和目的地伪装点后,规划出一组候选路线{w 1,…,w n },同时向LBS服务商请求候选路线涉及路网区域R的实时路况信息,LBS服务商将路网区域R的实时路况信息利用全同态公钥加密后传输给云服务商;After the cloud service provider receives the departure masquerading point and the destination masquerading point, it plans a group of candidate routes { w 1 ,..., w n }, and at the same time requests the LBS service provider for the real-time traffic information of the road network area R involved in the candidate route, The LBS service provider encrypts the real-time road condition information of the road network area R with a fully homomorphic public key and transmits it to the cloud service provider;

云服务商收到路网区域R加密后的实时路况信息,并根据实时路况信息,对之前的候选路线组的开销进行进一步计算,得到密文后的路线开销,利用全同态加密的比较运算,将每条路线相互比较,将密文比较结果传输给LBS服务商;The cloud service provider receives the encrypted real-time road condition information in the road network area R, and further calculates the cost of the previous candidate route group according to the real-time road condition information, obtains the route cost after the ciphertext, and uses the comparison operation of fully homomorphic encryption , compare each route with each other, and transmit the ciphertext comparison result to the LBS service provider;

LBS服务商收到密文比较结果,利用私钥sk进行解密,并对比较结果进行排序,获得最佳路径的序号,将该序号传输给用户;用户收到序号,将从候选路线组{w 1,…,w n }中选取的最佳路线在本地和伪装区域内的路线连接,生成最终的出行路线。The LBS service provider receives the ciphertext comparison result, decrypts it with the private key sk, sorts the comparison results, obtains the serial number of the best path, and transmits the serial number to the user ; 1 ,…, w n } the best route selected in the local and camouflaged area to generate the final travel route.

进一步地,所述电子设备200集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个非易失性计算机可读取存储介质中。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)。Further, if the integrated modules/units of the electronic device 200 are realized in the form of software function units and sold or used as independent products, they may be stored in a non-volatile computer-readable storage medium. The computer-readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, and a read-only memory (ROM, Read-Only Memory) .

本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一非易失性计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM (DRAM)、同步DRAM (SDRAM)、双数据率SDRAM (DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be realized through computer programs to instruct related hardware, and the programs can be stored in a non-volatile computer-readable storage medium When the program is executed, it may include the processes of the embodiments of the above-mentioned methods. Wherein, any references to memory, storage, database or other media used in the various embodiments provided in the present application may include non-volatile and/or volatile memory. Nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory. Volatile memory can include random access memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Chain Synchlink DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above embodiments can be combined arbitrarily. To make the description concise, all possible combinations of the technical features in the above embodiments are not described. However, as long as there is no contradiction in the combination of these technical features, they should be It is considered to be within the range described in this specification.

上述实施例为本发明较佳的实施方式,但本发明的实施方式并不受上述实施例的限制,其他的任何未背离本发明的精神实质与原理下所作的改变、修饰、替代、组合、简化,均应为等效的置换方式,都包含在本发明的保护范围之内。The above-mentioned embodiment is a preferred embodiment of the present invention, but the embodiment of the present invention is not limited by the above-mentioned embodiment, and any other changes, modifications, substitutions, combinations, Simplifications should be equivalent replacement methods, and all are included in the protection scope of the present invention.

Claims (10)

1. The navigation service privacy protection method based on homomorphic encryption and anonymous camouflage is characterized by comprising the following steps:
initializing a homomorphic encryption scheme by an LBS server, generating a public key pk, a private key sk and an evaluation key evk, and then sending an initialization parameter params, the public key pk and the evaluation key evk to the cloud server for initialization;
the method comprises the steps that users respectively generate anonymous disguised regions by using an anonymous disguising algorithm, the anonymous disguised regions are requested from a cloud service provider, and the cloud service provider transmits road network information of the anonymous disguised regions to the users after receiving the anonymous disguising region requests; the anonymous disguised area comprises a departure place anonymous disguised area and a destination anonymous disguised area; the anonymous camouflage algorithm is reconstructed based on a K-anonymous algorithm, and K online users meeting the precondition of the K-anonymous algorithm are changed into K coordinates generated randomly;
the user randomly selects a departure place pseudo-assembly point and a destination pseudo-assembly point which are close to a departure point and meet the pseudo-assembly distance L according to the road network information of the anonymous pseudo-assembly area, and sends the departure place pseudo-assembly point and the destination pseudo-assembly point to a cloud service provider; synchronously planning a route from a real departure place to a camouflage departure place according to the road network information of the anonymous camouflage area;
after receiving the pseudo-erection point of the departure place and the pseudo-erection point of the destination, the cloud service provider plans a group of candidate routesw 1 ,…,w n Therein ofw 1 ,…,w n Respectively represent a candidate route and simultaneously go to LBS clothesThe service provider requests the candidate route to relate to the real-time road condition information of the road network region R, and the LBS service provider encrypts the real-time road condition information of the road network region R by using the fully homomorphic public key and transmits the encrypted information to the cloud service provider;
the cloud service provider receives the encrypted real-time road condition information of the road network region R, further calculates the cost of the previous candidate route group according to the real-time road condition information to obtain the cost of the route after the ciphertext, compares each route by using comparison operation of homomorphic encryption, and transmits a ciphertext comparison result to the LBS service provider;
the LBS facilitator receives the ciphertext comparison result, decrypts by using the private key sk, sequences the comparison result, obtains the sequence number of the optimal path, and transmits the sequence number to the user; the user receiving the serial number will check from the candidate route groupw 1 ,…,w n And connecting the selected optimal route in the local area with the route in the camouflage area to generate a final travel route.
2. The navigation service privacy protection method based on homomorphic encryption and anonymous camouflage according to claim 1, wherein the anonymous camouflage algorithm is specifically:
the user has a starting place longitude and latitude coordinate S and a destination longitude and latitude coordinate D, and sets a camouflage distance L and a camouflage level K;
the user generates K-1 random coordinates at radius L based on the camouflage distance L and the camouflage level K.
3. The navigation service privacy protection method based on homomorphic encryption and anonymous camouflage according to claim 1, wherein a route from a real departure place to a camouflage departure place is synchronously planned according to road network information of an anonymous camouflage area, and specifically comprises the following steps:
after the map is loaded locally, a conventional path planning algorithm in a user system is called to respectively generate two navigation routes from a real departure place to a camouflage departure place and from a camouflage destination to a real destination.
4. The navigation service privacy protection method based on homomorphic encryption and anonymous camouflage according to claim 1, wherein the candidate route is planned by the following method:
generating a route with the shortest distance according to the policy requirement of path planning, and generating a route with the shortest time according to the speed limit of a road, wherein the route is two basic routes;
adding a customized strategy, wherein the strategy comprises avoiding charging, minimizing cost, and not walking an expressway or an expressway, and further generating a plurality of customized routes;
on the premise that the user allows, the cloud service provider optimizes the route after the service is finished, and the specific flow is as follows:
when the user allows, collecting and storing all requested path planning { disguised starting place S, disguised destination D and initiation time T } triple sets;
at the same time T on the next day, the cloud service provider requests the LBS service provider to plan a path of the (disguised starting place S and disguised destination D) and generate a navigation route;
after receiving the route of the LBS service provider, comparing the route selected by the LBS service provider according to the strategy, finding out the difference, finding out the map node with the first bifurcation, and marking the map node as a relay point;
and when the next route in the anonymous disguised area is related, adding the relay point into the path planning to generate a plurality of groups of navigation routes passing through the relay point, wherein the navigation routes comprise a disguised starting place, a relay point 1 and a disguised destination, … and a disguised starting point, a relay point n and a disguised destination.
5. The navigation service privacy protection method based on homomorphic encryption and anonymous camouflage according to claim 1, wherein the LBS facilitator transmits the real-time road condition information of the road network region R to the cloud facilitator by using fully homomorphic public key encryption, and the method specifically comprises the following steps:
the LBS facilitator receives a live map information request of a road network region R from the cloud facilitator, and the LBS facilitator corresponds to each edge in the map data structureedgeThe road condition weight of the map is encrypted, and other data structures of the whole map are not addedAnd transmitting the real-time road condition map data structure of the road network region R to a cloud service provider, and analyzing and using by the cloud service provider.
6. The navigation service privacy protection method based on homomorphic encryption and anonymous camouflage according to claim 1, wherein the method further calculates the cost of the previous candidate route group according to the real-time road condition information to obtain the route cost after the ciphertext, and specifically comprises the following steps:
after receiving the weight information from the LBS facilitator, the cloud facilitator makes the candidate route group generated by the cloud facilitatorw 1 ,…,w n Performing overhead calculation on each route, wherein the overhead calculation specifically comprises the following steps: each candidate route is formed by a plurality of edgesedgeAre connected together toiEdgeedge i The distance length is encrypted into ciphertext length information by using a public keyenc(edge i .len) Then, the edge in the map data from the LBS facilitator is acquirededge i Ciphertext weight information ofenc(edge i .weight) Will beenc(edge i .len) Andenc(edge i .weight) Performing ciphertext multiplication to obtain the edgeedge i The ciphertext multiplication results of each edge are accumulated to obtain the candidate route;
and after all the routes are calculated, the final overhead result of each route is obtained.
7. The navigation service privacy protection method based on homomorphic encryption and anonymous camouflage according to claim 1, wherein the LBS facilitator receives the ciphertext comparison result, decrypts by using a private key sk, and sorts the comparison result to obtain the sequence number of the optimal path, specifically:
according to different privacy requirements, when the privacy level is K, and the number N of the current candidate routes is greater than 2K, adopting 'elimination':
(1) Every two candidate routes in the candidate route group adopt a ciphertext comparison algorithm to perform ciphertext comparison operation to obtain N/2 comparison result ciphertexts, and the comparison result ciphertexts are transmitted to an LBS service provider for decryption;
(2) The LBS service provider decrypts the data to obtain N/2 comparison result plaintexts, transmits the comparison result plaintexts to the cloud service provider, and eliminates the route with excessive cost;
(3) Making N = N/2, if N >2K, repeating the process of the steps (1) - (2), if N < =2K, executing the step (4);
(4) Comparing the cost of the candidate routes in the candidate route group with other candidate routes once in turn to obtain the cost of the candidate routes in the candidate route group
Figure 504424DEST_PATH_IMAGE001
Constructing a comparison result sequence of the overhead by using the comparison result ciphertext;
(5) LBS facilitator is decrypting
Figure 149032DEST_PATH_IMAGE001
After the comparison result sequence of the cost, the N candidate routes are sequenced according to the comparison result of the plaintext, and the serial number of the candidate route with the minimum cost is obtained.
8. The navigation service privacy protection system based on homomorphic encryption and anonymous camouflage is characterized by comprising a preprocessing module, a camouflage area generating module, a fake node selecting module, a path planning module, a route overhead calculating module and a path generating module;
the preprocessing module is used for initializing a homomorphic encryption scheme by an LBS (location based service) provider, generating a public key pk, a private key sk and an evaluation key evk, and then sending an initialization parameter params, the public key pk and the evaluation key evk to the cloud provider for initialization;
the disguise region generating module is used for generating anonymous disguise regions by a user respectively by using an anonymous disguise algorithm, requesting the anonymous disguise regions from a cloud service provider, and transmitting road network information of the anonymous disguise regions to the user after the cloud service provider receives the request of the anonymous disguise regions; the anonymous disguised area comprises a departure place anonymous disguised area and a destination anonymous disguised area; the anonymous camouflage algorithm is modified based on a K-anonymous algorithm, and K online users meeting the precondition of the K-anonymous algorithm are changed into K coordinates generated randomly;
the pseudo-mounting point selecting module is used for the user to randomly select a starting place pseudo-mounting point and a destination pseudo-mounting point which are close to the starting point and meet the pseudo-mounting distance L according to the road network information of the anonymous pseudo-mounting area, and the starting place pseudo-mounting point and the destination pseudo-mounting point are sent to a cloud service provider; synchronously planning a route from a real departure place to a camouflage departure place according to the road network information of the anonymous camouflage area;
the path planning module is used for planning a group of candidate routes, namely a hard start route, after the cloud facilitator receives the origin pseudo-assembly point and the destination pseudo-assembly pointw 1 ,…,w n Therein ofw 1 ,…,w n Respectively representing a candidate route, simultaneously requesting real-time road condition information of the candidate route related to a road network region R from an LBS service provider, encrypting the real-time road condition information of the road network region R by the LBS service provider by using a fully homomorphic public key, and transmitting the encrypted information to a cloud service provider;
the route overhead calculation module is used for the cloud service provider to receive the encrypted real-time road condition information of the road network region R, further calculate the overhead of the previous candidate route group according to the real-time road condition information to obtain the route overhead after the ciphertext, compare each route with each other by using comparison operation of the homomorphic encryption, and transmit the ciphertext comparison result to the LBS service provider;
the path generation module is used for the LBS service provider to receive the ciphertext comparison result, decrypt the ciphertext comparison result by using a private key sk, sort the comparison result to obtain the sequence number of the optimal path, and transmit the sequence number to the user; the user receiving the serial number will check from the candidate route groupw 1 ,…,w n And connecting the selected optimal route in the local area with the route in the camouflage area to generate a final travel route.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores computer program instructions executable by the at least one processor to cause the at least one processor to perform a navigation service privacy protection method based on homomorphic encryption and anonymous masquerading as recited in any one of claims 1-7.
10. A computer-readable storage medium storing a program, wherein the program, when executed by a processor, implements the navigation service privacy protection method based on homomorphic encryption and anonymous masquerading of any of claims 1-7.
CN202211106644.XA 2022-09-13 2022-09-13 Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage Active CN115200603B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211106644.XA CN115200603B (en) 2022-09-13 2022-09-13 Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211106644.XA CN115200603B (en) 2022-09-13 2022-09-13 Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage

Publications (2)

Publication Number Publication Date
CN115200603A CN115200603A (en) 2022-10-18
CN115200603B true CN115200603B (en) 2023-01-31

Family

ID=83573570

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211106644.XA Active CN115200603B (en) 2022-09-13 2022-09-13 Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage

Country Status (1)

Country Link
CN (1) CN115200603B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20240227854A9 (en) * 2022-10-20 2024-07-11 Industry-Academic Cooperation Foundation, Dankook University System for providing autonomous driving safety map service
CN116405545B (en) * 2022-12-18 2025-05-16 合肥工业大学 Secure navigation method and system supporting k unordered passing points
CN116170191B (en) * 2023-01-16 2025-05-30 西安电子科技大学 Homomorphic encryption-based position service task allocation method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6738808B1 (en) * 2000-06-30 2004-05-18 Bell South Intellectual Property Corporation Anonymous location service for wireless networks
CN105530609A (en) * 2015-12-16 2016-04-27 上海交通大学 Indoor positioning method with efficient privacy protection based on Wi-Fi fingerprint
WO2016201775A1 (en) * 2015-06-17 2016-12-22 中兴通讯股份有限公司 Method and device for protecting position information of mobile terminal
WO2017037151A1 (en) * 2015-09-03 2017-03-09 Commissariat A L'energie Atomique Et Aux Energies Alternatives Method for confidentially querying a location-based service by homomorphic cryptography
WO2017193783A1 (en) * 2016-05-10 2017-11-16 北京京东尚科信息技术有限公司 Method and device for protecting user location information
CN107831512A (en) * 2017-10-30 2018-03-23 南京大学 A kind of location privacy protection method of MSB AGPS positioning
CN109740376A (en) * 2018-12-21 2019-05-10 哈尔滨工业大学(深圳) Location privacy protection method, system, equipment and medium based on NN Query
CN110557375A (en) * 2019-08-01 2019-12-10 上海电力大学 k anonymous location privacy protection incentive method based on block chain intelligent contract
EP3671281A1 (en) * 2018-12-21 2020-06-24 European Space Agency Method and system for processing a gnss signal using homomorphic encryption
WO2022007889A1 (en) * 2020-07-08 2022-01-13 浙江工商大学 Searchable encrypted data sharing method and system based on blockchain and homomorphic encryption
WO2022082893A1 (en) * 2020-10-22 2022-04-28 香港中文大学(深圳) Privacy blockchain-based internet of vehicles protection method, and mobile terminal
CN115035720A (en) * 2022-06-10 2022-09-09 翁敏 Traffic road condition data acquisition and processing method and management system based on satellite positioning

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170053282A1 (en) * 2015-08-21 2017-02-23 Pitney Bowes Inc. Fraud risk score using location information while preserving privacy of the location information
WO2017038888A1 (en) * 2015-08-31 2017-03-09 三菱電機株式会社 Map information managing system
US12379225B2 (en) * 2020-11-03 2025-08-05 Rutgers, The State University Of New Jersey Safety-aware route recommendation system and method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6738808B1 (en) * 2000-06-30 2004-05-18 Bell South Intellectual Property Corporation Anonymous location service for wireless networks
WO2016201775A1 (en) * 2015-06-17 2016-12-22 中兴通讯股份有限公司 Method and device for protecting position information of mobile terminal
WO2017037151A1 (en) * 2015-09-03 2017-03-09 Commissariat A L'energie Atomique Et Aux Energies Alternatives Method for confidentially querying a location-based service by homomorphic cryptography
CN105530609A (en) * 2015-12-16 2016-04-27 上海交通大学 Indoor positioning method with efficient privacy protection based on Wi-Fi fingerprint
WO2017193783A1 (en) * 2016-05-10 2017-11-16 北京京东尚科信息技术有限公司 Method and device for protecting user location information
CN107831512A (en) * 2017-10-30 2018-03-23 南京大学 A kind of location privacy protection method of MSB AGPS positioning
CN109740376A (en) * 2018-12-21 2019-05-10 哈尔滨工业大学(深圳) Location privacy protection method, system, equipment and medium based on NN Query
EP3671281A1 (en) * 2018-12-21 2020-06-24 European Space Agency Method and system for processing a gnss signal using homomorphic encryption
CN110557375A (en) * 2019-08-01 2019-12-10 上海电力大学 k anonymous location privacy protection incentive method based on block chain intelligent contract
WO2022007889A1 (en) * 2020-07-08 2022-01-13 浙江工商大学 Searchable encrypted data sharing method and system based on blockchain and homomorphic encryption
WO2022082893A1 (en) * 2020-10-22 2022-04-28 香港中文大学(深圳) Privacy blockchain-based internet of vehicles protection method, and mobile terminal
CN115035720A (en) * 2022-06-10 2022-09-09 翁敏 Traffic road condition data acquisition and processing method and management system based on satellite positioning

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption;Chengjin Liu等;《IEEE INFOCOM WKSHPS: BigSecurity 2022: International Workshop on Security and Privacy in Big Data》;20220620;第1-6 *
Efficient Privacy-Preserving Scheme for Location Based Services in VANET System;FIFI FAROUK等;《IEEE Access》;20200408;第8卷;第60101-60116页 *

Also Published As

Publication number Publication date
CN115200603A (en) 2022-10-18

Similar Documents

Publication Publication Date Title
CN115200603B (en) Navigation service privacy protection method and device based on homomorphic encryption and anonymous camouflage
Zhang et al. A decentralized location privacy-preserving spatial crowdsourcing for internet of vehicles
Baza et al. A light blockchain-powered privacy-preserving organization scheme for ride sharing services
Wu et al. Privacy-preserving shortest path computation
Šeděnka et al. Privacy-preserving distance computation and proximity testing on earth, done right
Yu et al. lpRide: Lightweight and privacy-preserving ride matching over road networks in online ride hailing systems
Yu et al. PGRide: Privacy-preserving group ridesharing matching in online ride hailing services
Xie et al. A privacy-preserving online ride-hailing system without involving a third trusted server
CN107347096A (en) Location privacy protection method based on cloud server
CN115905633B (en) Privacy-protected graph similarity retrieval method and system
CN115767722B (en) Indoor positioning privacy protection method based on inner product function encryption in cloud environment
WO2019196397A1 (en) Big data computing method and system based on blockchain and fog computing
CN110730064A (en) Data fusion method based on privacy protection in crowd sensing network
Luo et al. P 2 Ride: Practical and privacy-preserving ride-matching scheme for ridesharing
Yang et al. Fine-grained outsourced data deletion scheme in cloud computing
Meng et al. Verifiable spatial range query over encrypted cloud data in VANET
CN115021890A (en) Method for addition homomorphic encryption and calculation of password accumulator
Li et al. Accurate, secure, and efficient semi-constrained navigation over encrypted city maps
CN111585756A (en) A certificateless cloud auditing method suitable for multi-copy-multi-cloud scenarios
CN112671543B (en) A publicly verifiable outsourced attribute-based encryption method based on blockchain
CN110569655A (en) A method and system for discovering group private information
CN119150313B (en) Data processing methods, apparatus, equipment and storage media
CN116723511B (en) Position management method and system for realizing privacy protection in Internet of vehicles and Internet of vehicles
CN109257167A (en) A kind of resource allocation methods for protecting privacy in mist calculating
Wang et al. A federated learning based privacy-preserving data sharing scheme for internet of vehicles

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant