Skip to main content

User Personalized Location k Anonymity Privacy Protection Scheme with Controllable Service Quality

  • Conference paper
  • First Online:
Machine Learning for Cyber Security (ML4CS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12486))

Included in the following conference series:

  • 1184 Accesses

Abstract

The existing location privacy protection methods only provide the privacy protection parameter k for users to choose to achieve their personalized privacy protection requirements, but users can not control the quality of service. To this end, this thesis proposes a user personalized location k anonymity privacy protection scheme with controllable service quality. The quality of service is quantified according to service similarity, and both it and the degree of privacy protection are used as user-controllable parameters, which meets the user’s more personalized privacy protection needs. At the same time, the background knowledge of historical query probability is quantified. The greedy strategy combined with the position entropy measurement mechanism is used to generate a k-anonymity set that can resist the attacker’s background knowledge inference attack, and a perturbation location is selected to complete the anonymity. The performance comparison experiment results show that this method can obtain very good privacy protection performance and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, X.J., Gui, X.L., Wu, Z.D.: Privacy preservation for location-based services: a survey. J. Softw. 26, 2373–2395 (2015)

    MathSciNet  Google Scholar 

  2. Sheng, W., Fenghua, L., Ben, N., et al.: Research progress on location privacy-preserving techniques. J. Commun. 37, 124–141 (2016)

    Google Scholar 

  3. World Wide Web Consortium (W3C). Platform for privacy preferences (P3P) project. http://www.w3.org/P3P. Accessed 6 May 2020

  4. IETF. Geographic location/privacy (GeoPriv). http://datatracker.ietf.org/wg/geopriv/charter/. Accessed 6 May 2020

  5. Sun, Y., Zhang, B., Zhao, B., et al.: Mix-zones optinal deployment for protecting location privacy in VANET. Peer-to-Peer Netw. Appl. 8, 1108–1121 (2015)

    Article  Google Scholar 

  6. Wang, L., Meng, X.F.: Location privacy in big data era: a survey. J. Softw. 25, 693–712 (2014)

    Google Scholar 

  7. Di, C., Hao, L., Shilei, Z.: CSEP: circular shifting encryption protocols for location privacy protection. In: 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS). IEEE (2017)

    Google Scholar 

  8. Peng, T., Liu, Q., Wang, G., Xiang, Y.: Privacy preserving scheme for location and content protection in location-based services. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 26–38. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49148-6_3

    Chapter  Google Scholar 

  9. He, W.: Research on LBS privacy protection technology in mobile social networks. In: Advanced Information Technology, Electronic and Automation Control Conference, pp. 73–76. IEEE (2017)

    Google Scholar 

  10. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM Press, New York (2003)

    Google Scholar 

  11. Mokbel, M.F., Chow, C.Y., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. 34, 1–48 (2009)

    Google Scholar 

  12. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of the International Conference on Pervasive Services, pp. 88–97. IEEE, Piscataway (2005)

    Google Scholar 

  13. Rinku, D., Ramakrisha, T.: Exploiting service similarity for privacy in location based search queries. IEEE Trans. Parallel Distributer Syst. 25, 374–383 (2013)

    Google Scholar 

  14. Zhao, D., Zhang, K., Jin, Y., Wang, X., Hung, P.C.K., Ji, W.: EPLA: efficient personal location anonymity. In: Li, F., Shim, K., Zheng, K., Liu, G. (eds.) APWeb 2016. LNCS, vol. 9932, pp. 263–275. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45817-5_21

    Chapter  Google Scholar 

  15. Lei, Z., Lili, Y., Jing, L., et al.: Location privacy protection algorithm based on correlation coefficient. In: Proceedings of the 4th International Conference on Control, Automation and Robotics (ICCAR), pp. 332–335. IEEE, Piscataway (2018)

    Google Scholar 

  16. Ben, N., Qinghua, L., Xiaoyan, Z., et al.: Achieving k-anonymity in privacy-aware location-based services. In: Proceedings of the 33th IEEE Conference on Computer Communications, pp. 754–762. IEEE, Piscataway (2014)

    Google Scholar 

  17. Jiang, T., Wang, H.J., Hu, Y.C.: Preserving location privacy in wireless LANs. In: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 246–257. ACM, New York (2007)

    Google Scholar 

  18. Xia, F., Yawei, L.: Dynamic Mix-zone scheme with joint-entropy based metric for privacy-perserving in IoV. J. Commun. 39, 76–85 (2018)

    Google Scholar 

  19. Ni, L., Tian, F., Ni, Q., Yan, Y., Zhang, J.: An anonymous entropy-based location privacy protection scheme in mobile social networks. EURASIP J. Wirel. Commun. Netw. 2019(1), 1–19 (2019). https://doi.org/10.1186/s13638-019-1406-4

    Article  Google Scholar 

  20. Zhang, X.J., Gui, X.L., Jiang, J.H.: A user-centric location privacy-preserving method with differential perturbation for location-based services. J. Xi’an Jiaotong Univ. 50, 79–86 (2016)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guanghui Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, T., Yan, G., Cai, G., Wang, Q., Yang, M. (2020). User Personalized Location k Anonymity Privacy Protection Scheme with Controllable Service Quality. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62223-7_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62222-0

  • Online ISBN: 978-3-030-62223-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics