Abstract
Privacy protection has become one of the important issues for location-based services (LBS) nowadays. In order to meet the requirements of humanization, security and quick response, this paper proposes an improved personalized k-anonymous location privacy protection algorithm with fake position generation mechanism. Compared to the normal personalized k-anonymity algorithm, our improved algorithm has higher success rate of anonymity. By generating fake queries for the source queries that expire, our algorithm guarantees that no source query will be dropped, namely all the source queries can get anonymized. The experimental results show that the algorithm proposed by this paper is able to achieve better performance in terms of success rate of anonymity.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReference
Foursquare. https://foursquare.com/. Accessed April 2014
Google Latitude. https://www.google.com/latitude/. Accessed April 2014
Where, http://where.com. Accessed April 2014
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms, IEEE Trans. Mob. Comput. 7(1), 1–18, (2008)
Xiao, P., Zhen, X., Xiaofeng, M.: Survey of location privacy preserving. J. Comput. Sci. Front. 1(3), 268–281 (2007)
Xiao, Z., Meng, X., Xu, J.: Quality Aware Privacy Protection for Location—Based Services, pp. 434–446. Springer, Heidelberg (2007)
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location based services. In: IEEE International Conference on Pervasive Services, pp. 88–97 (2005)
Jang, M.Y., Jang, S.J., Chang, J.W.: A New KNN query processing algorithm enhancing privacy protection in location based services. In: IEEE First International Conference on Mobile Services, pp. 17–24 (2012)
Kalnis, P., Ghinita, G., Mouratidis, K., et al.: Preventing location based identify inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)
Samarati, P., Sweeney L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of IEEE Symposium on Research in Security and Privacy (1998)
Sweeney, L.: k-anonymity: a model for protecting privacy. IJUFKS, 10(5), 557–570 (2002)
Gruteser, M., Grunwald, D.: Anonymous usage of location based services through spatial and temporal cloaking. In: ACM/USENIX MobiSys (2003)
Kang, H.: The research and implementation of personalized k-anonymous location privacy protection technology based on the internet of things. J. Nanjing Univ. Posts Telecommun. (Natural Science Edition) TP393.08, 28(6), 78–82 (2012)
Beckmann, N., Kriegel, H.-P., Schneider, R., Seeger, B.: R±Tree: an efficient and robust access method for points and rectangles. In: Proceeding of ACM International Conference Management of Data (Sigmod 1990), pp. 322–331 (1990)
Interval Tree. http://en.wikipedia.org/wiki/Interval_tree. Accessed April 2014.
Acknowledgement
The paper is sponsored by Beijing Higher Education Young Elite Teacher Project, DNSLAB, the China’s Next Generation Internet Project(CNGI Project)(CNGI-12-03-009) and National High Technology Research and Development Program of China (2013AA014702).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Luo, Z., Huang, X. (2015). A Personalized k-Anonymity with Fake Position Generation for Location Privacy Protection. In: Zhang, S., Xu, K., Xu, M., Wu, J., Wu, C., Zhong, Y. (eds) Frontiers in Internet Technologies. ICoC 2014. Communications in Computer and Information Science, vol 502. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46826-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-662-46826-5_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46825-8
Online ISBN: 978-3-662-46826-5
eBook Packages: Computer ScienceComputer Science (R0)