Abstract
The existing location privacy protection methods only provide the privacy protection parameter k for users to choose to achieve their personalized privacy protection requirements, but users can not control the quality of service. To this end, this thesis proposes a user personalized location k anonymity privacy protection scheme with controllable service quality. The quality of service is quantified according to service similarity, and both it and the degree of privacy protection are used as user-controllable parameters, which meets the user’s more personalized privacy protection needs. At the same time, the background knowledge of historical query probability is quantified. The greedy strategy combined with the position entropy measurement mechanism is used to generate a k-anonymity set that can resist the attacker’s background knowledge inference attack, and a perturbation location is selected to complete the anonymity. The performance comparison experiment results show that this method can obtain very good privacy protection performance and efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, X.J., Gui, X.L., Wu, Z.D.: Privacy preservation for location-based services: a survey. J. Softw. 26, 2373–2395 (2015)
Sheng, W., Fenghua, L., Ben, N., et al.: Research progress on location privacy-preserving techniques. J. Commun. 37, 124–141 (2016)
World Wide Web Consortium (W3C). Platform for privacy preferences (P3P) project. http://www.w3.org/P3P. Accessed 6 May 2020
IETF. Geographic location/privacy (GeoPriv). http://datatracker.ietf.org/wg/geopriv/charter/. Accessed 6 May 2020
Sun, Y., Zhang, B., Zhao, B., et al.: Mix-zones optinal deployment for protecting location privacy in VANET. Peer-to-Peer Netw. Appl. 8, 1108–1121 (2015)
Wang, L., Meng, X.F.: Location privacy in big data era: a survey. J. Softw. 25, 693–712 (2014)
Di, C., Hao, L., Shilei, Z.: CSEP: circular shifting encryption protocols for location privacy protection. In: 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS). IEEE (2017)
Peng, T., Liu, Q., Wang, G., Xiang, Y.: Privacy preserving scheme for location and content protection in location-based services. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 26–38. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49148-6_3
He, W.: Research on LBS privacy protection technology in mobile social networks. In: Advanced Information Technology, Electronic and Automation Control Conference, pp. 73–76. IEEE (2017)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM Press, New York (2003)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. 34, 1–48 (2009)
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of the International Conference on Pervasive Services, pp. 88–97. IEEE, Piscataway (2005)
Rinku, D., Ramakrisha, T.: Exploiting service similarity for privacy in location based search queries. IEEE Trans. Parallel Distributer Syst. 25, 374–383 (2013)
Zhao, D., Zhang, K., Jin, Y., Wang, X., Hung, P.C.K., Ji, W.: EPLA: efficient personal location anonymity. In: Li, F., Shim, K., Zheng, K., Liu, G. (eds.) APWeb 2016. LNCS, vol. 9932, pp. 263–275. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45817-5_21
Lei, Z., Lili, Y., Jing, L., et al.: Location privacy protection algorithm based on correlation coefficient. In: Proceedings of the 4th International Conference on Control, Automation and Robotics (ICCAR), pp. 332–335. IEEE, Piscataway (2018)
Ben, N., Qinghua, L., Xiaoyan, Z., et al.: Achieving k-anonymity in privacy-aware location-based services. In: Proceedings of the 33th IEEE Conference on Computer Communications, pp. 754–762. IEEE, Piscataway (2014)
Jiang, T., Wang, H.J., Hu, Y.C.: Preserving location privacy in wireless LANs. In: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 246–257. ACM, New York (2007)
Xia, F., Yawei, L.: Dynamic Mix-zone scheme with joint-entropy based metric for privacy-perserving in IoV. J. Commun. 39, 76–85 (2018)
Ni, L., Tian, F., Ni, Q., Yan, Y., Zhang, J.: An anonymous entropy-based location privacy protection scheme in mobile social networks. EURASIP J. Wirel. Commun. Netw. 2019(1), 1–19 (2019). https://doi.org/10.1186/s13638-019-1406-4
Zhang, X.J., Gui, X.L., Jiang, J.H.: A user-centric location privacy-preserving method with differential perturbation for location-based services. J. Xi’an Jiaotong Univ. 50, 79–86 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, T., Yan, G., Cai, G., Wang, Q., Yang, M. (2020). User Personalized Location k Anonymity Privacy Protection Scheme with Controllable Service Quality. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-62223-7_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62222-0
Online ISBN: 978-3-030-62223-7
eBook Packages: Computer ScienceComputer Science (R0)