Skip to main content

An Enhanced Location-Data Differential Privacy Protection Method Based on Filter

  • Conference paper
  • First Online:
Smart Grid and Internet of Things (SGIoT 2021)

Abstract

Location based service (LBS) is the basic function and important application of Internet of things. The disclosure of location data which contains a lot of sensitive information will be a threat for individual. This paper proposed an enhanced location-data differential privacy protection method based on filter. Firstly, noise is added in location-data for differential privacy. Secondly, Kalman is used to predict, correct and optimize the Location-data after the addition of noise, which ensure the optimization to satisfy the differential privacy. Finally, released the processed data and carry out the location query service. Experimental results demonstrate that the proposed algorithm promotes Location-data utility and level of privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, L., Xiaofeng, M.: Location privacy preservation in big data era: a survey. J. Softw. 25(04), 693–712 (2014)

    Google Scholar 

  2. Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp. 486–503 (2006)

    Google Scholar 

  3. Kim, J.S., Li, K.J.: Location K-anonymity in indoor spaces. GeoInformatica 20(3), 415–451 (2016)

    Article  Google Scholar 

  4. Jagwani, P., Kaushik, S.: Privacy in location based services: Protection strategies, attack models and open challenges. In: International Conference on Information Science and Applications, pp. 12–21. Springer, Singapore (2017)

    Google Scholar 

  5. Wang, Y.-H., Zhang, H.-L., Yu, X.-Z.: Research on location privacy in mobile internet. J. Commun. 36(9), 1–14 (2015)

    Google Scholar 

  6. Chow, C.Y., Mokbel, M.F.: The new Casper: a privacy aware location-based database server. In: Proceedings of the 23rd IEEE International Conference on Data Engineering, pp. 1499–1500 (2007)

    Google Scholar 

  7. Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS’05, pp. 620–629 (2005)

    Google Scholar 

  8. Chen, L., Feng, Y.-X., Dai, G.-J.: Mobile phone based trajectory anonymization of continuous query LBS users. Appl. Res. Comput. 28(12), 4653–4656 (2011)

    Google Scholar 

  9. Zhang, S., Li, X., Tan, Z., Peng, T., Wang, G.: A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Futur. Gener. Comput. Syst. 94, 40–50 (2019)

    Article  Google Scholar 

  10. Zhao, P., et al.: ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J. 5(2), 1033–1042 (2018)

    Article  Google Scholar 

  11. Yifei, W., Luo Yonglong, Y., Qingying, L.Q., Wen, C.: A trajectory privacy protection method based on information entropy suppression. Comput. Appl. 38(11), 3252–3257 (2018)

    Google Scholar 

  12. Jie, W., Chunru, W., Jianfeng, M., Hongtao, L.: False location selection algorithm based on location semantics and query probability. J. Commun. 41(03), 53–61 (2020)

    Google Scholar 

  13. Hu, Z., Yang, J., Zhang, J.: Trajectory privacy protection method based on the time interval divided. Comput. Secur. 77, 488–499 (2018)

    Article  Google Scholar 

  14. Li, J., et al.: Mobile location privacy-preserving algorithm based on PSO optimization. J. Comput. Sci. 41(5), 1037–1051 (2018)

    Google Scholar 

  15. Pan, J., Liu, Y., Zhang, W.: Detection of dummy trajectories using convolutional neural networks. Secur. Commun. Netw. 2019, 8431074 (2019)

    Article  Google Scholar 

  16. Zheng, H., Xiaofeng, M.: A trajectory data publishing method satisfying differential privacy. J. Comput. Sci. 41(02), 400–412 (2018)

    Google Scholar 

  17. Yin, C., Xi, J., Sun, R., Wang, J.: Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans. Industr. Inf. 14(8), 3628–3636 (2017)

    Article  Google Scholar 

  18. Yan, Y., Gao, X., Mahmood, A., Feng, T., Xie, P.: Differential private spatial decomposition and location publishing based on unbalanced quadtree partition algorithm. IEEE Access 8, 104775–104787 (2020)

    Article  Google Scholar 

  19. Zhao, Y., et al.: Local differential privacy-based federated learning for internet of things. IEEE Internet Things J. 8(11), 8836–8853 (2020)

    Article  Google Scholar 

  20. Tian Feng, W., Laifeng, Z.L., Hai, L., Xiaolin, G.: A personalized differential privacy protection mechanism for trajectory data distribution. J. Comput. Sci. 44(04), 709–723 (2021)

    Google Scholar 

  21. Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), pp. 1–12. Venice, Italy (2006)

    Google Scholar 

  22. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14

    Chapter  Google Scholar 

  23. McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 94–103. Providence, RI, USA (2007)

    Google Scholar 

  24. Kalman, R.E.: A new approach to linear filtering and prediction problems. J. Basic Eng. 82, 35–45 (1960)

    Article  MathSciNet  Google Scholar 

  25. Liyue, F., Xiong, L.: Real-time aggregate monitoring with differential privacy. In: Proceedings of the 21st ACM International Conference on Information and knowledge management, pp. 2169–2173 (2012)

    Google Scholar 

  26. Fan, L., Li, X.: An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Trans. Knowl. Data Eng. 26(9), 2094–2106 (2014)

    Article  Google Scholar 

  27. Datatang. Social network users access geographic location data. http://www.datatang.com/data/43896. 27 Nov 2015

Download references

Acknowledgment

This work is partially supported by National Social Science Foundation of China (21BTQ079), Humanities and Social Sciences Project of the Ministry of Education (20YJAZH046) and Higher education research projects (2020GJZD02).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haiyan Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, S., Kang, H., Yu, D. (2022). An Enhanced Location-Data Differential Privacy Protection Method Based on Filter. In: Lin, YB., Deng, DJ., Yang, CT. (eds) Smart Grid and Internet of Things. SGIoT 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 447. Springer, Cham. https://doi.org/10.1007/978-3-031-20398-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20398-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20397-8

  • Online ISBN: 978-3-031-20398-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics