SlideShare a Scribd company logo
1 of 31
1
2/33
3
4
5
‫مهم‬ ‫های‬ ‫چالش‬
6
7
8
1
•‫می‬ ‫مطرح‬‫سیستم‬ ‫در‬ ‫گلوگاه‬‫عنوان‬ ‫به‬ ‫کننده‬ ‫گمنام‬‫شود‬
2
•‫شود‬ ‫می‬‫مطرح‬‫مطمئن‬‫سوم‬‫قسمت‬ ‫یک‬‫عنوان‬ ‫به‬‫کننده‬‫گمنام‬
3
•‫کل‬‫امنیت‬‫کننده‬ ‫گمنام‬ ‫در‬ ‫مشکل‬ ‫ایجاد‬‫ت‬‫ر‬‫صو‬ ‫در‬
‫افتد‬‫می‬ ‫خطر‬ ‫به‬‫سیستم‬
‫ش‬‫و‬‫ر‬ ‫چند‬‫ی‬ ‫س‬‫ر‬‫بر‬
9
1-‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬ ‫ی‬‫همکار‬ ‫طریق‬‫از‬‫مکان‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬ ‫اطالعات‬‫امن‬ ‫یابی‬‫ز‬‫با‬
2-‫سی‬ ‫از‬‫استفاده‬ ‫با‬‫مکان‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬‫در‬ ‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬ ‫ی‬ ‫خصوص‬‫حریم‬‫از‬ ‫حمایت‬‫ستم‬
‫ی‬‫فاز‬‫استنتاج‬
3-‫مکا‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬ ‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬‫امنیت‬ ‫ای‬‫ر‬‫ب‬‫مطمئن‬ ‫سوم‬ ‫قسمت‬ ‫ن‬‫بدو‬ ‫تکل‬‫و‬‫پر‬ ‫یک‬‫ن‬
10
1-‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬ ‫ی‬‫همکار‬ ‫طریق‬‫از‬‫مکان‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬ ‫اطالعات‬‫امن‬ ‫یابی‬‫ز‬‫با‬
11
12
13
14
2-‫سی‬ ‫از‬‫استفاده‬ ‫با‬‫مکان‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬‫در‬ ‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬ ‫ی‬ ‫خصوص‬‫حریم‬‫از‬ ‫حمایت‬‫ستم‬
‫ی‬‫فاز‬‫استنتاج‬
‫سیستم‬ ‫این‬ ‫بخش‬ ‫سه‬
15
1-‫سیار‬ ‫بر‬‫ر‬‫کا‬
2-‫مطمئن‬ ‫سوم‬ ‫قسمت‬
3-‫کننده‬ ‫ائه‬‫ر‬‫ا‬
‫امنیتی‬ ‫مهم‬ ‫بخش‬
16
2-‫مطمئن‬ ‫سوم‬‫قسمت‬
‫ی‬‫فاز‬‫استنتاج‬‫سیستم‬
‫اک‬‫ر‬‫اد‬‫مرکز‬
‫قوانین‬IF - THEN‫ای‬ ‫فاصله‬ ‫دقت‬ ‫به‬ ‫مکان‬ ‫تبدیل‬
‫کیفی‬ ‫ناحیه‬ ‫به‬ ‫ای‬ ‫فاصله‬ ‫دقت‬ ‫تبدیل‬
1-‫ی‬ ‫هندس‬‫مختصات‬
2-‫خیابان‬
3-‫بخش‬
4-‫ناحیه‬
5-‫کیفی‬ ‫مکان‬
17
‫ی‬ ‫تاکس‬‫انندگان‬‫ر‬ ‫برای‬‫مطالعه‬ ‫د‬‫ر‬‫مو‬ ‫یک‬
‫اننده‬‫ر‬‫یک‬‫مکان‬
‫الف‬)‫ی‬ ‫تاکس‬‫ترمینال‬ ‫اطراف‬
‫ب‬)‫ترمینال‬ ‫از‬‫ر‬‫دو‬
‫ج‬)‫شهر‬‫بیرون‬
‫سال‬‫ر‬‫ا‬ ‫مان‬‫ز‬
‫الف‬)‫صبح‬
‫ب‬)‫ظهر‬
‫ج‬)‫ظهر‬‫ز‬‫بعدا‬
‫د‬)‫غروب‬
‫ه‬)‫شب‬
18
19
‫سوم‬‫قسمت‬‫ن‬‫بدو‬ ‫تکل‬‫و‬‫پر‬ ‫یک‬
20
‫نط‬‫ن‬‫ن‬‫س‬‫ای‬ ‫نده‬‫ن‬‫ن‬‫ن‬‫فزای‬ ‫ت‬‫ر‬‫نو‬‫ن‬‫ن‬‫ص‬ ‫نه‬‫ن‬‫ن‬‫ب‬ ‫نه‬‫ن‬‫ن‬‫ک‬ ‫نت‬‫ن‬‫ن‬‫س‬‫ا‬ ‫نه‬‫ن‬‫ن‬‫ت‬‫رف‬ ‫نکک‬‫ن‬‫ن‬‫ش‬‫ل‬‫و‬‫نار‬‫ن‬‫ن‬‫م‬ ‫ندیو‬‫ن‬‫ن‬‫ن‬‫ی‬ ‫از‬ ‫ز‬‫و‬‫ر‬‫نو‬‫ن‬‫ن‬‫ی‬‫ا‬‫ح‬
‫دهد‬‫می‬ ‫افزایش‬ ‫ا‬‫ر‬‫بر‬‫ر‬‫کا‬ ‫امنیت‬.‫ر‬ ‫نو‬‫ی‬‫ا‬ ‫نود‬‫و‬‫مو‬ ‫نای‬‫ه‬‫ز‬‫و‬‫ر‬‫ز‬‫ا‬ ‫ی‬‫بسیار‬ ‫خالف‬ ‫بر‬‫ز‬‫و‬
‫اعتماد‬ ‫قابک‬ ‫سوم‬ ‫بخش‬ ‫یک‬ ‫اساس‬ ‫بر‬(TTP)‫کند‬ ‫نمی‬ ‫عمک‬
‫مدل‬ ‫این‬ ‫نیازهای‬
21
1-‫یرد‬ ‫می‬ ‫کمک‬ ‫دیگر‬ ‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬‫از‬‫ی‬‫ساز‬ ‫منام‬ ‫ای‬‫ر‬‫ب‬ ‫ز‬‫و‬‫ر‬ ‫ایو‬.
2-‫یافتن‬K-1‫است‬‫ی‬‫ر‬‫و‬‫ضر‬ ‫ی‬‫ساز‬‫منام‬ ‫عمک‬ ‫ای‬‫ر‬‫ب‬ ‫اه‬‫ر‬‫هم‬.
22
23
‫نجیره‬‫ز‬‫بر‬ ‫مبتنی‬‫پیام‬ ‫تبادل‬ ‫با‬ ‫نهایی‬‫شمای‬
24
‫شده‬‫ائه‬‫ر‬‫ا‬‫های‬‫ز‬‫و‬‫ر‬‫یابی‬‫ز‬‫ار‬
‫روش‬‫کاربرا‬ ‫از‬ ‫استفاده‬‫ن‬ ‫روش‬‫فازی‬ ‫استنتاج‬ ‫بدون‬ ‫پروتکل‬TTP
- + -
‫کنند‬ ‫گمنام‬ ‫از‬ ‫استفاده‬‫ه‬
‫واسط‬
- + - ‫اعمال‬‫کوئری‬ ‫زمان‬
- - - ‫کاربر‬ ‫مسیر‬ ‫اعمال‬
+ + + ‫دقت‬‫پاسخ‬
- - - ‫استقالل‬‫کاربر‬
- - - ‫کوئری‬ ‫کامل‬ ‫امنیت‬
25
‫مهم‬ ‫های‬ ‫ویژگی‬ ‫برای‬ ‫پیشنهادی‬ ‫بندی‬ ‫دسته‬
‫مطمئن‬‫سوم‬ ‫قسمت‬‫از‬ ‫استفاده‬‫عدم‬
‫بر‬‫ر‬‫کا‬‫حرکت‬‫مسیر‬ ‫گرفتن‬ ‫نظر‬ ‫در‬
‫ی‬‫کوئر‬‫سال‬‫ر‬‫ا‬‫مان‬‫ز‬‫نظرگرفتن‬‫در‬
‫شده‬ ‫ائه‬‫ر‬‫ا‬‫یس‬‫و‬‫سر‬‫کیفیت‬
‫هیچکس‬‫به‬‫اعتماد‬‫عدم‬
26
‫بر‬‫ر‬‫کا‬‫حرکت‬‫مسیر‬‫رفتن‬ ‫نظر‬ ‫در‬
27
‫بر‬‫ر‬‫کا‬‫حرکت‬‫مسیر‬‫رفتن‬ ‫نظر‬ ‫در‬
28
‫بر‬‫ر‬‫کا‬‫حرکت‬‫مسیر‬‫رفتن‬ ‫نظر‬ ‫در‬
1
•‫بود‬ ‫نخواهد‬ ‫ل‬‫قبو‬ ‫قابل‬ ‫مطمئن‬ ‫سوم‬ ‫قسمت‬‫از‬ ‫استفاده‬
2
•‫د‬‫ر‬‫دا‬‫ها‬‫یس‬‫و‬‫سر‬ ‫این‬‫در‬‫بر‬‫ر‬‫کا‬ ‫امنیت‬‫در‬ ‫مهمی‬‫نقش‬‫بر‬‫ر‬‫کا‬ ‫حرکت‬‫مسیر‬
3
•‫م‬‫گرفتن‬ ‫نظر‬‫در‬ ‫و‬‫سوم‬ ‫قسمت‬‫گرفتن‬ ‫نظر‬‫در‬ ‫ن‬‫بدو‬ ‫جدیدی‬ ‫ش‬‫و‬‫ر‬ ‫ائه‬‫ر‬‫ا‬‫سیر‬
‫حرکت‬
‫ی‬‫گیر‬ ‫نتیجه‬:
29
30
‫نی‬‫س‬‫ب‬ ‫که‬ ‫سد‬‫ر‬‫می‬ ‫نظر‬ ‫به‬ ‫شده‬‫ی‬ ‫س‬‫ر‬‫بر‬ ‫های‬‫ز‬‫و‬‫ر‬‫سایر‬‫و‬‫اینجا‬ ‫در‬ ‫شده‬ ‫ائه‬‫ر‬‫ا‬ ‫های‬ ‫ز‬‫و‬‫ر‬ ‫در‬‫از‬ ‫ی‬‫ار‬
‫با‬ ‫نته‬‫ن‬‫ش‬‫دا‬‫بران‬‫ر‬‫نا‬‫ن‬‫ک‬‫ی‬ ‫ن‬‫ن‬‫ب‬‫خصو‬ ‫نریم‬‫ن‬‫ح‬ ‫نر‬‫ن‬‫ف‬‫ح‬ ‫در‬‫ی‬ ‫ن‬‫ن‬‫س‬‫اسا‬ ‫نش‬‫ن‬‫د‬‫ن‬ ‫ند‬‫ن‬‫ن‬‫توان‬ ‫نی‬‫ن‬‫م‬ ‫نه‬‫ن‬‫ک‬ ‫نه‬‫ن‬‫ص‬‫ا‬ ‫نر‬‫ن‬‫ص‬‫عنا‬‫نه‬‫ن‬‫ب‬ ‫نند‬‫ن‬‫ش‬
‫نان‬‫ن‬‫م‬‫ز‬‫نا‬‫ن‬‫ی‬ ‫بر‬‫ر‬‫نا‬‫ن‬‫ک‬‫نت‬‫ن‬‫ک‬‫حر‬ ‫نیر‬‫س‬‫م‬ ‫نر‬‫ن‬‫ص‬‫عن‬ ‫نال‬‫ن‬‫ح‬‫م‬ ‫نوان‬‫ن‬‫ن‬‫ع‬ ‫نه‬‫ن‬‫ب‬ ‫ند‬‫ن‬‫ا‬ ‫نده‬‫ن‬،‫د‬ ‫نه‬‫ن‬‫ت‬‫رف‬ ‫نر‬‫ن‬‫ظ‬‫ن‬ ‫در‬‫نک‬‫ن‬‫م‬‫کا‬‫ر‬‫نو‬‫ط‬‫نال‬‫ن‬‫س‬‫ر‬‫ا‬
‫ی‬ ‫ن‬‫ب‬‫خصو‬ ‫نریم‬‫ح‬ ‫نرای‬‫ب‬ ‫ا‬‫ر‬‫ندی‬‫و‬ ‫نالالت‬،‫م‬ ‫تواند‬ ‫می‬ ‫ها‬ ‫ویژگی‬ ‫ایو‬ ‫به‬ ‫تووه‬ ‫عدم‬ ‫که‬ ‫ی‬‫کوئر‬‫بران‬‫ر‬‫نا‬‫ک‬
‫د‬‫ر‬‫بیاو‬ ‫بیار‬ ‫به‬
‫بندی‬ ‫جمع‬
31
1- Heechang Shin, J.V., Vijayalakshmi Atluri, Anonymization models for
directional location based
service environments. computers & s e c u rity 2 9 ( 2 0 1 0 ) 5 9 – 7 3,
2009: p. 15.
2. - Sˇaltenis S, J.C., Leutenegger S, Lopez M., Indexing the
positions of continuously moving objects. ACM Sigmod Record. 2000.
3. - Shmatikov V, W.M., Measuring relationship anonymity in mix
networks. 5th ACM workshop on privacy in electronic society., 2006.
4- A. Solanas, A.M.n.-B., Privacy protection in locationbased services
through a public-key privacy homomorphism. Fourth European PKI
Workshop: Theory and practice, Lecture Notes in Computer Science,
Springer, 2007. Fourth.
5.- R.L. Rivest, L.A., M.L. Dertouzos, On data banks and privacy
homomorphisms. Foundations of Secure Computation.
6.-Vacca, J.R., Public Key Infrastructure. Auerbach, 2004
‫اصلی‬ ‫اجع‬‫ر‬‫م‬

More Related Content

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

حفظ حریم خصوصی افراد در سرویس های مبتنی بر مکان

  • 1. 1
  • 3. 3
  • 4. 4
  • 5. 5
  • 7. 7
  • 8. 8 1 •‫می‬ ‫مطرح‬‫سیستم‬ ‫در‬ ‫گلوگاه‬‫عنوان‬ ‫به‬ ‫کننده‬ ‫گمنام‬‫شود‬ 2 •‫شود‬ ‫می‬‫مطرح‬‫مطمئن‬‫سوم‬‫قسمت‬ ‫یک‬‫عنوان‬ ‫به‬‫کننده‬‫گمنام‬ 3 •‫کل‬‫امنیت‬‫کننده‬ ‫گمنام‬ ‫در‬ ‫مشکل‬ ‫ایجاد‬‫ت‬‫ر‬‫صو‬ ‫در‬ ‫افتد‬‫می‬ ‫خطر‬ ‫به‬‫سیستم‬
  • 9. ‫ش‬‫و‬‫ر‬ ‫چند‬‫ی‬ ‫س‬‫ر‬‫بر‬ 9 1-‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬ ‫ی‬‫همکار‬ ‫طریق‬‫از‬‫مکان‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬ ‫اطالعات‬‫امن‬ ‫یابی‬‫ز‬‫با‬ 2-‫سی‬ ‫از‬‫استفاده‬ ‫با‬‫مکان‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬‫در‬ ‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬ ‫ی‬ ‫خصوص‬‫حریم‬‫از‬ ‫حمایت‬‫ستم‬ ‫ی‬‫فاز‬‫استنتاج‬ 3-‫مکا‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬ ‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬‫امنیت‬ ‫ای‬‫ر‬‫ب‬‫مطمئن‬ ‫سوم‬ ‫قسمت‬ ‫ن‬‫بدو‬ ‫تکل‬‫و‬‫پر‬ ‫یک‬‫ن‬
  • 10. 10 1-‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬ ‫ی‬‫همکار‬ ‫طریق‬‫از‬‫مکان‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬ ‫اطالعات‬‫امن‬ ‫یابی‬‫ز‬‫با‬
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14 2-‫سی‬ ‫از‬‫استفاده‬ ‫با‬‫مکان‬ ‫بر‬ ‫مبتنی‬ ‫های‬ ‫یس‬‫و‬‫سر‬‫در‬ ‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬ ‫ی‬ ‫خصوص‬‫حریم‬‫از‬ ‫حمایت‬‫ستم‬ ‫ی‬‫فاز‬‫استنتاج‬
  • 15. ‫سیستم‬ ‫این‬ ‫بخش‬ ‫سه‬ 15 1-‫سیار‬ ‫بر‬‫ر‬‫کا‬ 2-‫مطمئن‬ ‫سوم‬ ‫قسمت‬ 3-‫کننده‬ ‫ائه‬‫ر‬‫ا‬
  • 16. ‫امنیتی‬ ‫مهم‬ ‫بخش‬ 16 2-‫مطمئن‬ ‫سوم‬‫قسمت‬ ‫ی‬‫فاز‬‫استنتاج‬‫سیستم‬ ‫اک‬‫ر‬‫اد‬‫مرکز‬ ‫قوانین‬IF - THEN‫ای‬ ‫فاصله‬ ‫دقت‬ ‫به‬ ‫مکان‬ ‫تبدیل‬ ‫کیفی‬ ‫ناحیه‬ ‫به‬ ‫ای‬ ‫فاصله‬ ‫دقت‬ ‫تبدیل‬ 1-‫ی‬ ‫هندس‬‫مختصات‬ 2-‫خیابان‬ 3-‫بخش‬ 4-‫ناحیه‬ 5-‫کیفی‬ ‫مکان‬
  • 17. 17 ‫ی‬ ‫تاکس‬‫انندگان‬‫ر‬ ‫برای‬‫مطالعه‬ ‫د‬‫ر‬‫مو‬ ‫یک‬ ‫اننده‬‫ر‬‫یک‬‫مکان‬ ‫الف‬)‫ی‬ ‫تاکس‬‫ترمینال‬ ‫اطراف‬ ‫ب‬)‫ترمینال‬ ‫از‬‫ر‬‫دو‬ ‫ج‬)‫شهر‬‫بیرون‬ ‫سال‬‫ر‬‫ا‬ ‫مان‬‫ز‬ ‫الف‬)‫صبح‬ ‫ب‬)‫ظهر‬ ‫ج‬)‫ظهر‬‫ز‬‫بعدا‬ ‫د‬)‫غروب‬ ‫ه‬)‫شب‬
  • 18. 18
  • 19. 19
  • 20. ‫سوم‬‫قسمت‬‫ن‬‫بدو‬ ‫تکل‬‫و‬‫پر‬ ‫یک‬ 20 ‫نط‬‫ن‬‫ن‬‫س‬‫ای‬ ‫نده‬‫ن‬‫ن‬‫ن‬‫فزای‬ ‫ت‬‫ر‬‫نو‬‫ن‬‫ن‬‫ص‬ ‫نه‬‫ن‬‫ن‬‫ب‬ ‫نه‬‫ن‬‫ن‬‫ک‬ ‫نت‬‫ن‬‫ن‬‫س‬‫ا‬ ‫نه‬‫ن‬‫ن‬‫ت‬‫رف‬ ‫نکک‬‫ن‬‫ن‬‫ش‬‫ل‬‫و‬‫نار‬‫ن‬‫ن‬‫م‬ ‫ندیو‬‫ن‬‫ن‬‫ن‬‫ی‬ ‫از‬ ‫ز‬‫و‬‫ر‬‫نو‬‫ن‬‫ن‬‫ی‬‫ا‬‫ح‬ ‫دهد‬‫می‬ ‫افزایش‬ ‫ا‬‫ر‬‫بر‬‫ر‬‫کا‬ ‫امنیت‬.‫ر‬ ‫نو‬‫ی‬‫ا‬ ‫نود‬‫و‬‫مو‬ ‫نای‬‫ه‬‫ز‬‫و‬‫ر‬‫ز‬‫ا‬ ‫ی‬‫بسیار‬ ‫خالف‬ ‫بر‬‫ز‬‫و‬ ‫اعتماد‬ ‫قابک‬ ‫سوم‬ ‫بخش‬ ‫یک‬ ‫اساس‬ ‫بر‬(TTP)‫کند‬ ‫نمی‬ ‫عمک‬
  • 21. ‫مدل‬ ‫این‬ ‫نیازهای‬ 21 1-‫یرد‬ ‫می‬ ‫کمک‬ ‫دیگر‬ ‫ان‬‫ر‬‫ب‬‫ر‬‫کا‬‫از‬‫ی‬‫ساز‬ ‫منام‬ ‫ای‬‫ر‬‫ب‬ ‫ز‬‫و‬‫ر‬ ‫ایو‬. 2-‫یافتن‬K-1‫است‬‫ی‬‫ر‬‫و‬‫ضر‬ ‫ی‬‫ساز‬‫منام‬ ‫عمک‬ ‫ای‬‫ر‬‫ب‬ ‫اه‬‫ر‬‫هم‬.
  • 22. 22
  • 24. 24 ‫شده‬‫ائه‬‫ر‬‫ا‬‫های‬‫ز‬‫و‬‫ر‬‫یابی‬‫ز‬‫ار‬ ‫روش‬‫کاربرا‬ ‫از‬ ‫استفاده‬‫ن‬ ‫روش‬‫فازی‬ ‫استنتاج‬ ‫بدون‬ ‫پروتکل‬TTP - + - ‫کنند‬ ‫گمنام‬ ‫از‬ ‫استفاده‬‫ه‬ ‫واسط‬ - + - ‫اعمال‬‫کوئری‬ ‫زمان‬ - - - ‫کاربر‬ ‫مسیر‬ ‫اعمال‬ + + + ‫دقت‬‫پاسخ‬ - - - ‫استقالل‬‫کاربر‬ - - - ‫کوئری‬ ‫کامل‬ ‫امنیت‬
  • 25. 25 ‫مهم‬ ‫های‬ ‫ویژگی‬ ‫برای‬ ‫پیشنهادی‬ ‫بندی‬ ‫دسته‬ ‫مطمئن‬‫سوم‬ ‫قسمت‬‫از‬ ‫استفاده‬‫عدم‬ ‫بر‬‫ر‬‫کا‬‫حرکت‬‫مسیر‬ ‫گرفتن‬ ‫نظر‬ ‫در‬ ‫ی‬‫کوئر‬‫سال‬‫ر‬‫ا‬‫مان‬‫ز‬‫نظرگرفتن‬‫در‬ ‫شده‬ ‫ائه‬‫ر‬‫ا‬‫یس‬‫و‬‫سر‬‫کیفیت‬ ‫هیچکس‬‫به‬‫اعتماد‬‫عدم‬
  • 29. 1 •‫بود‬ ‫نخواهد‬ ‫ل‬‫قبو‬ ‫قابل‬ ‫مطمئن‬ ‫سوم‬ ‫قسمت‬‫از‬ ‫استفاده‬ 2 •‫د‬‫ر‬‫دا‬‫ها‬‫یس‬‫و‬‫سر‬ ‫این‬‫در‬‫بر‬‫ر‬‫کا‬ ‫امنیت‬‫در‬ ‫مهمی‬‫نقش‬‫بر‬‫ر‬‫کا‬ ‫حرکت‬‫مسیر‬ 3 •‫م‬‫گرفتن‬ ‫نظر‬‫در‬ ‫و‬‫سوم‬ ‫قسمت‬‫گرفتن‬ ‫نظر‬‫در‬ ‫ن‬‫بدو‬ ‫جدیدی‬ ‫ش‬‫و‬‫ر‬ ‫ائه‬‫ر‬‫ا‬‫سیر‬ ‫حرکت‬ ‫ی‬‫گیر‬ ‫نتیجه‬: 29
  • 30. 30 ‫نی‬‫س‬‫ب‬ ‫که‬ ‫سد‬‫ر‬‫می‬ ‫نظر‬ ‫به‬ ‫شده‬‫ی‬ ‫س‬‫ر‬‫بر‬ ‫های‬‫ز‬‫و‬‫ر‬‫سایر‬‫و‬‫اینجا‬ ‫در‬ ‫شده‬ ‫ائه‬‫ر‬‫ا‬ ‫های‬ ‫ز‬‫و‬‫ر‬ ‫در‬‫از‬ ‫ی‬‫ار‬ ‫با‬ ‫نته‬‫ن‬‫ش‬‫دا‬‫بران‬‫ر‬‫نا‬‫ن‬‫ک‬‫ی‬ ‫ن‬‫ن‬‫ب‬‫خصو‬ ‫نریم‬‫ن‬‫ح‬ ‫نر‬‫ن‬‫ف‬‫ح‬ ‫در‬‫ی‬ ‫ن‬‫ن‬‫س‬‫اسا‬ ‫نش‬‫ن‬‫د‬‫ن‬ ‫ند‬‫ن‬‫ن‬‫توان‬ ‫نی‬‫ن‬‫م‬ ‫نه‬‫ن‬‫ک‬ ‫نه‬‫ن‬‫ص‬‫ا‬ ‫نر‬‫ن‬‫ص‬‫عنا‬‫نه‬‫ن‬‫ب‬ ‫نند‬‫ن‬‫ش‬ ‫نان‬‫ن‬‫م‬‫ز‬‫نا‬‫ن‬‫ی‬ ‫بر‬‫ر‬‫نا‬‫ن‬‫ک‬‫نت‬‫ن‬‫ک‬‫حر‬ ‫نیر‬‫س‬‫م‬ ‫نر‬‫ن‬‫ص‬‫عن‬ ‫نال‬‫ن‬‫ح‬‫م‬ ‫نوان‬‫ن‬‫ن‬‫ع‬ ‫نه‬‫ن‬‫ب‬ ‫ند‬‫ن‬‫ا‬ ‫نده‬‫ن‬،‫د‬ ‫نه‬‫ن‬‫ت‬‫رف‬ ‫نر‬‫ن‬‫ظ‬‫ن‬ ‫در‬‫نک‬‫ن‬‫م‬‫کا‬‫ر‬‫نو‬‫ط‬‫نال‬‫ن‬‫س‬‫ر‬‫ا‬ ‫ی‬ ‫ن‬‫ب‬‫خصو‬ ‫نریم‬‫ح‬ ‫نرای‬‫ب‬ ‫ا‬‫ر‬‫ندی‬‫و‬ ‫نالالت‬،‫م‬ ‫تواند‬ ‫می‬ ‫ها‬ ‫ویژگی‬ ‫ایو‬ ‫به‬ ‫تووه‬ ‫عدم‬ ‫که‬ ‫ی‬‫کوئر‬‫بران‬‫ر‬‫نا‬‫ک‬ ‫د‬‫ر‬‫بیاو‬ ‫بیار‬ ‫به‬ ‫بندی‬ ‫جمع‬
  • 31. 31 1- Heechang Shin, J.V., Vijayalakshmi Atluri, Anonymization models for directional location based service environments. computers & s e c u rity 2 9 ( 2 0 1 0 ) 5 9 – 7 3, 2009: p. 15. 2. - Sˇaltenis S, J.C., Leutenegger S, Lopez M., Indexing the positions of continuously moving objects. ACM Sigmod Record. 2000. 3. - Shmatikov V, W.M., Measuring relationship anonymity in mix networks. 5th ACM workshop on privacy in electronic society., 2006. 4- A. Solanas, A.M.n.-B., Privacy protection in locationbased services through a public-key privacy homomorphism. Fourth European PKI Workshop: Theory and practice, Lecture Notes in Computer Science, Springer, 2007. Fourth. 5.- R.L. Rivest, L.A., M.L. Dertouzos, On data banks and privacy homomorphisms. Foundations of Secure Computation. 6.-Vacca, J.R., Public Key Infrastructure. Auerbach, 2004 ‫اصلی‬ ‫اجع‬‫ر‬‫م‬