Abstract
Location based service (LBS) is the basic function and important application of Internet of things. The disclosure of location data which contains a lot of sensitive information will be a threat for individual. This paper proposed an enhanced location-data differential privacy protection method based on filter. Firstly, noise is added in location-data for differential privacy. Secondly, Kalman is used to predict, correct and optimize the Location-data after the addition of noise, which ensure the optimization to satisfy the differential privacy. Finally, released the processed data and carry out the location query service. Experimental results demonstrate that the proposed algorithm promotes Location-data utility and level of privacy protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, L., Xiaofeng, M.: Location privacy preservation in big data era: a survey. J. Softw. 25(04), 693–712 (2014)
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp. 486–503 (2006)
Kim, J.S., Li, K.J.: Location K-anonymity in indoor spaces. GeoInformatica 20(3), 415–451 (2016)
Jagwani, P., Kaushik, S.: Privacy in location based services: Protection strategies, attack models and open challenges. In: International Conference on Information Science and Applications, pp. 12–21. Springer, Singapore (2017)
Wang, Y.-H., Zhang, H.-L., Yu, X.-Z.: Research on location privacy in mobile internet. J. Commun. 36(9), 1–14 (2015)
Chow, C.Y., Mokbel, M.F.: The new Casper: a privacy aware location-based database server. In: Proceedings of the 23rd IEEE International Conference on Data Engineering, pp. 1499–1500 (2007)
Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS’05, pp. 620–629 (2005)
Chen, L., Feng, Y.-X., Dai, G.-J.: Mobile phone based trajectory anonymization of continuous query LBS users. Appl. Res. Comput. 28(12), 4653–4656 (2011)
Zhang, S., Li, X., Tan, Z., Peng, T., Wang, G.: A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Futur. Gener. Comput. Syst. 94, 40–50 (2019)
Zhao, P., et al.: ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J. 5(2), 1033–1042 (2018)
Yifei, W., Luo Yonglong, Y., Qingying, L.Q., Wen, C.: A trajectory privacy protection method based on information entropy suppression. Comput. Appl. 38(11), 3252–3257 (2018)
Jie, W., Chunru, W., Jianfeng, M., Hongtao, L.: False location selection algorithm based on location semantics and query probability. J. Commun. 41(03), 53–61 (2020)
Hu, Z., Yang, J., Zhang, J.: Trajectory privacy protection method based on the time interval divided. Comput. Secur. 77, 488–499 (2018)
Li, J., et al.: Mobile location privacy-preserving algorithm based on PSO optimization. J. Comput. Sci. 41(5), 1037–1051 (2018)
Pan, J., Liu, Y., Zhang, W.: Detection of dummy trajectories using convolutional neural networks. Secur. Commun. Netw. 2019, 8431074 (2019)
Zheng, H., Xiaofeng, M.: A trajectory data publishing method satisfying differential privacy. J. Comput. Sci. 41(02), 400–412 (2018)
Yin, C., Xi, J., Sun, R., Wang, J.: Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans. Industr. Inf. 14(8), 3628–3636 (2017)
Yan, Y., Gao, X., Mahmood, A., Feng, T., Xie, P.: Differential private spatial decomposition and location publishing based on unbalanced quadtree partition algorithm. IEEE Access 8, 104775–104787 (2020)
Zhao, Y., et al.: Local differential privacy-based federated learning for internet of things. IEEE Internet Things J. 8(11), 8836–8853 (2020)
Tian Feng, W., Laifeng, Z.L., Hai, L., Xiaolin, G.: A personalized differential privacy protection mechanism for trajectory data distribution. J. Comput. Sci. 44(04), 709–723 (2021)
Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), pp. 1–12. Venice, Italy (2006)
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14
McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 94–103. Providence, RI, USA (2007)
Kalman, R.E.: A new approach to linear filtering and prediction problems. J. Basic Eng. 82, 35–45 (1960)
Liyue, F., Xiong, L.: Real-time aggregate monitoring with differential privacy. In: Proceedings of the 21st ACM International Conference on Information and knowledge management, pp. 2169–2173 (2012)
Fan, L., Li, X.: An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Trans. Knowl. Data Eng. 26(9), 2094–2106 (2014)
Datatang. Social network users access geographic location data. http://www.datatang.com/data/43896. 27 Nov 2015
Acknowledgment
This work is partially supported by National Social Science Foundation of China (21BTQ079), Humanities and Social Sciences Project of the Ministry of Education (20YJAZH046) and Higher education research projects (2020GJZD02).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, S., Kang, H., Yu, D. (2022). An Enhanced Location-Data Differential Privacy Protection Method Based on Filter. In: Lin, YB., Deng, DJ., Yang, CT. (eds) Smart Grid and Internet of Things. SGIoT 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 447. Springer, Cham. https://doi.org/10.1007/978-3-031-20398-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-20398-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20397-8
Online ISBN: 978-3-031-20398-5
eBook Packages: Computer ScienceComputer Science (R0)