Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電信工程學研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/63289
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor周俊廷
dc.contributor.authorChun-Yen Chenen
dc.contributor.author陳俊延zh_TW
dc.date.accessioned2021-06-16T16:32:58Z-
dc.date.available2014-01-16
dc.date.copyright2013-01-16
dc.date.issued2012
dc.date.submitted2012-12-03
dc.identifier.citation[1] http://www.spatial.cs.umn.edu/Courses/Fall11/8715/papers/IM7_ steiniger.pdf
[2] Chen, G. and Kotz, D. “A Survey of Context-Aware Mobile Computing Re- search.” Technical Report, Dept. of Computer Science, Dartmouth College, 2000.
[3] Dey, A.K. “Understanding and Using Context. Personal and Ubiquitous Com- puting,” 5(1): 47, 2001.
[4] Nivala, A-M., and Sarjakoski, L.T., 2003b. “An Approach to Intelligent Maps: Context Awareness,” In: The 2nd Workshop on ’HCI in Mobile Guides’, in adjunction to: MobileHCI’03, 5th International Conference on Human Computer Interaction with Mobile Devices and Services, September 8th, 2003, Udine, Italy.
[5] R. Gross and A. Acquisti, “Information revelation and privacy in online social networks,” in WPES ’05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 2005.
[6] A. R. Beresford and F. Stajano, “location privacy in pervasive computing,” pp. 110, Oct. 2010.
[7] V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, “k- Anonymity,” pp. 136, Dec. 2008.
[8] M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking,” MobiSys ’03: Proceedings of the 1st international conference on Mobile systems, applications and services, May. 2003.
44
REFERENCES 45
[9] G. Zhong, I. Goldberg, and U. Hengartner, “Louis, Lester and Pierre: three protocols for location privacy,” in PET’07: Proceedings of the 7th international conference on Privacy enhancing technologies, 2007.
[10] C. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, “An Obfuscation-Based Approach for Protecting Location Privacy,” Dependable and Secure Computing, IEEE Transactions on, vol. 8, no. 1, pp. 1327, 2011.
[11] H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication tech- nique using dummies for location-based services,” Pervasive Services, 2005. ICPS ’05. Proceedings. International Conference on, pp. 8897, 2005.
[12] http://www.kowoma.de/en/gps/errors.htm
[13] http://www.google.com
[14] B. Hoh and M. Gruteser, “Protecting Location Privacy Through Path Confu- sion,” presented at the Security and Privacy for Emerging Areas in Communi- cations Networks, 2005. SecureComm 2005. First International Conference on, 2005, pp. 194205.
[15] J. Domingo-Ferrer, “Microaggregation for database and location privacy,” In Etzion, O., Kuflik, T., Motro, A., eds.: Next Generation Information Technolo- gies and Systems-NGITS. Volume 4032 of LNCS., Springer Berlin / Heidelberg (2006) 106 116
[16] C. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, “An Obfuscation-Based Approach for Protecting Location Privacy,” Dependable and Secure Computing, IEEE Transactions on, vol. 8, no. 1, pp. 1327, 2011.
[17] H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication tech- nique using dummies for location-based services,” Pervasive Services, 2005. ICPS ’05. Proceedings. International Conference on, pp. 8897, 2005.
[18] G. Zhong, I. Goldberg, and U. Hengartner, “Louis, Lester and Pierre: three protocols for location privacy,” in PET’07: Proceedings of the 7th international conference on Privacy enhancing technologies, 2007.
[19] http://www.kowoma.de/en/gps/errors.htm
[20] J. B. MacQueen, “Some methods for classification and analysis of multivariate observations,” In Procedings of the Fifth Berkeley Symposium on Math, Statis- tics, and Probability, Vol. 1 (1967), pp. 281-297
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/63289-
dc.description.abstract由於定位技術在智慧型手機上的普及,越來越多搭配定位技術的應用服務被開發並且使用在手機上,我們稱這種應用服務為-定位型服務 (LBS)。在這篇論文中,我們針對一種基於一種稱之為網路型定位服務 (Network-based Localization),所產生的隱私問題做討論。這種定位服務會先偵測周遭的無線網路基地台或是手機基地台,然後向位置提供者 (Location Provider) 拿到基地台所在的位置後,去算得自己所在的位置。為了要討論定位型服務的隱私問題,我們先將定位型服務分類為兩類:具身分資訊的定位型服務與匿名定位型服務。
具身分資訊的定位型服務必須同時將自己的身分資訊以及自己所在的位置送給服務提供者,由於會透漏使用者的真實身分 我們認為具有身分資訊的定位型應用服務面臨了兩種不同的隱私威脅:(1) 服務提供者 (Service Provider) 可能會將這些同時包含身分以及位置資訊的訊息洩漏給其他第三方。(2) 可能會有駭客入侵資料庫,竊取這些包含身分以及定位資訊。因為這些因素,這種應用服務在普及的同時,使用者開始擔心起這種服務的隱私問題。 不僅如此,我們還指出,即使送出的是匿名的定位型服務訊息,還是可以藉由一些方法,可以還原這些身分或是其他的資訊。
在這篇論文中,我們提出利用分群演算法的方式,去找出匿名定位訊息的隱私資訊。(1) 從位置提供者 (Location Provider)所取得公開的無線網路基地台與手機基地台位置的資訊後,將拿取到的當地所有搜集到的位置訊息,去重建這些訊息是由哪些基地台所計算出來。(2) 利用每個所有定位結果所使用的基地台差異性與分群演算法,就能將原本完全是匿名的定位資訊分成不同的群集。 (3) 根據在同樣的群集中具有隱私資訊的定位訊息,就能將其他匿名的定位資訊也重建回他們的隱私資訊,藉由此,匿名的定位型服務事實上也有淺在的隱私危險存在。
因此,在論文的最後,由於定位資訊同時有可能會被儲存在服務提供者 (Service Provider) 或是 位置提供者 (Location Provider),因此針對這兩種不一樣的角色,我們提供了不同的方法,在能維持一樣服務品質下,保護使用者的隱私權。
zh_TW
dc.description.abstractAndroid handheld device are popular in recent years. Different kinds of location- based services (LBSs) are developed to provide users with benefits. LBSs take advan- tage of different positioning technologies and provide multiple applications. There are two kinds of positioning Application Programmer Interfaces (APIs) on Android plat- form devices: GPS provider and network provider. Network provider is implemented with network-based localization technology. This technology allows devices to deter- mine their locations and requesting LBSs in both outdoor and indoor environments. Nevertheless, network-based localization results contain extra information which re- veal privacy information to attackers. In this paper, we first point out these privacy threats. Some effects of network-based localization results are found and evaluated. Second, a specifically attacking strategy is proposed to re-identify LBS messages. The attacking results show that location privacy is a significant problems. Finally, a privacy protection scheme is developed to solve the privacy issue of network-based localization.en
dc.description.provenanceMade available in DSpace on 2021-06-16T16:32:58Z (GMT). No. of bitstreams: 1
ntu-101-R99942110-1.pdf: 5150541 bytes, checksum: 060266dee19edb0d85f5c60af36887a5 (MD5)
Previous issue date: 2012
en
dc.description.tableofcontentsABSTRACT ................................... ii LISTOFTABLES ............................... iv LISTOFFIGURES .............................. v
CHAPTER1 INTRODUCTION ..................... 1
1.1 Anintroductiontolocation-basedservices. . . . . . . . . . . . . . . 1
1.2 Themainproblemandobjectives ................... 2
1.3 Relatedwork............................... 5
1.3.1 Trustedthirdpartybasedsolutions . . . . . . . . . . . . . . 5
1.3.2 Trustedthirdpartyfreesolutions ............... 8
1.4 Thesisorganization ........................... 9
CHAPTER2 LOCALIZATIONMODEL ................ 10 2.1 GPSlocalizationmodel ......................... 10 2.2 CellTowerLocalization......................... 11 2.3 WifiAPLocalization .......................... 13
CHAPTER3 LBSATTACKINGMODEL ............... 17
3.1 Attacking algorithm for continuous localization results . . . . . . . . 17 3.1.1 Minimum distance Identification algorithm . . . . . . . . . . 18
3.1.2 Spatial-Temporal Identification algorithm . . . . . . . . . . . 19
3.1.3 Attacking algorithm based on space and time . . . . . . . . . 19
3.2 Attacking model for discrete localization results . . . . . . . . . . . 19 3.2.1 clusteringalgorithm....................... 21 3.2.2 Effectsofdiscretelocalizationresults . . . . . . . . . . . . . 24
CHAPTER4 LBSPRIVACYPROTECTION............. 38 CHAPTER 5 CONCLUSIONS AND FUTURE WORK . . . . . . . 42
dc.language.isoen
dc.subject使用無線網路基地台的網路型定位服務zh_TW
dc.subject位置隱私權zh_TW
dc.subject定位型服務zh_TW
dc.subjectuser behavior.en
dc.subjectLocation Privacyen
dc.subjectLocation-based Serviceen
dc.title網路型定位服務的隱私問題zh_TW
dc.titleLocation Privacy of Network-based Localizationen
dc.typeThesis
dc.date.schoolyear101-1
dc.description.degree碩士
dc.contributor.oralexamcommittee魏宏宇,謝宏昀,陳彥仰
dc.subject.keyword位置隱私權,定位型服務,使用無線網路基地台的網路型定位服務,zh_TW
dc.subject.keywordLocation Privacy,Location-based Service,user behavior.,en
dc.relation.page53
dc.rights.note有償授權
dc.date.accepted2012-12-04
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電信工程學研究所zh_TW
顯示於系所單位:電信工程學研究所

文件中的檔案:
檔案 大小格式 
ntu-101-1.pdf
  未授權公開取用
5.03 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved