Abstract
The traditional k-anonymity technique does not consider comprehensive factors when choosing anonymous locations, resulting in a high risk of privacy leakage in the final generated anonymous set. In order to construct a secure anonymous set, this paper proposed a Geohash coding location privacy protection scheme based on entropy weight TOPSIS (GLPPS-EWT). First, in order to reduce unnecessary time consumption caused by repeated encoding of historical locations, locations are cached into prefix tree based on Geohash codes. Second, considering attackers may have background knowledge so that locations initially filtered according to historical query probability and semantic distance. Finally, considering the semantic diversity, semantic sensitivity and anonymous area of anonymous set, the entropy weight method is used to determine the index weight and make multi-attribute decision on the candidate set. The optimal anonymous location is selected to construct secure anonymous set. The experimental results show that GLPPS-EWT has good performance and high privacy.












Similar content being viewed by others
Data Availability
No datasets were generated or analysed during the current study.
References
Feng Jingyu ZR, Jinwen Yang, Wenbo Z (2020) A spectrum sharing incentive scheme against location privacy leakage in iot networks. J Comput Res Develop 57:2209–2220. https://doi.org/10.7544/issn1000-1239.2020.20200453
Li Weihao CJ, Hui L (2019) Privacy self-correlation privacy-preserving scheme in lbs. J Commun 40:57–66. https://doi.org/10.11959/j.issn.1000-436x.2019110
Li Yuxi ZF, Zifeng X (2021) Privacy-preserving k-nearest-neighbor search over mobile social network. Chin J Comput 44:481–1500. https://doi.org/10.11897/SP.J.1016.2021.01481
Wang X, Luo Y, Liu S, Wang T, Han H (2019) Subspace k-anonymity algorithm for location-privacy preservation based on locality-sensitive hashing. Intell Data Anal 23:1167–1185. https://doi.org/10.3233/IDA-184183
Yu F, Yihan Y, Xiaoping W (2019) Differential privacy protection technology and its application in big data environment. J Commun 40:157–168. https://doi.org/10.11959/j.issn.1000-436x.2019209
Sheng G, Xiuhua C, Jianming Z, Liping Y, Xindi M, Hui L (2022) A location privacy-preserving worker selection scheme under limited budget for blockchain-based crowdsensing. Chin J Comput 45:1052–1067. https://doi.org/10.11897/SP.J.1016.2022.01052
Zhang Z, Sun X, Chen S, Liang Y (2022) Lpps-agc: Location privacy protection strategy based on alt-geohash coding in location-based services. Wirel Commun Mob Comput. https://doi.org/10.1155/2022/3984099
Hara T (2019) Dummy-based location anonymization for controlling observable user preferences. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp 1–7. IEEE
Jie W, Chunru W, Jianfeng M, Hongtao L (2020) Dummy location selection algorithm based on location semantics and query probability. J Commun 41:53–61. https://doi.org/10.11959/j.issn.1000-436x.2020061
TaghizadehHesary Farhad ZJ (2020) Measuring carbon market transaction efficiency in the power industry: An entropy-weighted topsis approach. Entropy (Basel, Switzerland) 22:973–983. https://doi.org/10.3390/E22090973
Zhou Y, Su Y (2023) Polo: adaptive trie-based log parser for anomaly detection. Mathematics. https://doi.org/10.3390/MATH11234797
Xueying G, Wenming W, Haiping H, Qi L, Reza M (2020) Location privacy-preserving method based on historical proximity location. Wirel Commun Mob Comput 2020:1–16. https://doi.org/10.1155/2020/8892079
Reem A, Tahani A, Nermin H (2020) A new location?based privacy protection algorithm with deep learning. Secur Priv 4:1–10. https://doi.org/10.1002/SPY2.139
Yang X, Gao L, Wang H, Li Y, Zheng J, Xu J, Ma Y (2021) A user-related semantic location privacy protection method in location-based service. In: 2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), pp 691–698. IEEE
Hu Z-W, Yang J (2019) Trajectory privacy protection based on location semantic perception. Int J Coop Inform Syst 28:34. https://doi.org/10.1142/S0218843019500060
Hai L, Xinghau L, Yunwei LBW, Yanbing R, Jianfeng M, Hongfa D (2019) Distributed k-anonymity location privacy protection sheme based on blockchain. Chin J Comput 42:942–960. https://doi.org/10.11897/SP.J.1016.2019.00942
Jin X, Zhang Y (2018) Privacy-preserving crowdsourced spectrum sensing. IEEE/ACM Trans Netw 26:1236–1249. https://doi.org/10.1109/TNET.2018.2823272
Kasiviswanathan SP, Lee HK, Nissim K, Raskhodnikova S, Smith A What can we learn privately?
Miao Q, Jing W, Song H (2019) Differential privacy-based location privacy enhancing in edge computing. Concurr Comput Pract Exp 31(8):1–17. https://doi.org/10.1002/cpe.4735
Ayong Y, Lingyu M, Ziwen Z, Yiqing D, Jiaomei Z (2020) Trajectory differential privacy protection mechanism based on prediction and sliding window. J Commun 41:123–133. https://doi.org/10.11959/j.issn.1000-436x.2020049
Hongtao L, Yue W, Feng G, Jie W, Bo W, Chuankun W (2021) Differential privacy location protection method based on the markov model. Wirel Commun Mob Comput. https://doi.org/10.1155/2021/4696455
Memon I, Arain QA, Memon H, Mangi FA (2017) Efficient user based authentication protocol for location based services discovery over road networks. Wirel Pers Commun 95:3713–3732. https://doi.org/10.1007/s11277-017-4022-9
Memon I, Arain QA (2017) Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web 20:639–672. https://doi.org/10.1007/s11280-016-0403-3
Arain QA, Shaikh, RA, Memon H (2016) User privacy protection based on road network model for location based services. J Inf Commun Technol (JICT) 10
Jing Z, Chuanwen L, Botao W (2022) A performance tunable cpir-based privacy protection method for location based service. Inf Sci 589:440–458. https://doi.org/10.1016/J.INS.2021.12.068
Huang M, Yuan L, Pan X, Zhou C (2023) Trusted edge and cross-domain privacy enhancement model under multi-blockchain. Comput Netw. https://doi.org/10.1016/J.COMNET.2023.109881
Keerthika M, Shanmugapriya D (2021) Wireless sensor networks: active and passive attacks—vulnerabilities and countermeasures. Glob Trans Proc 2(2):362–367. https://doi.org/10.1016/J.GLTP.2021.08.045
Ai Z, XiaoHui L (2022) Research on privacy protection of dummy location interference for location-based service location. Int J Distrib Sens Netw. https://doi.org/10.1177/15501329221125111
Li Y, Zhu Y, Fei J, Wu W (2024) Diverse metrics for robust lbs privacy: distance, semantics, and temporal factors. Sensors. https://doi.org/10.3390/S24041314
Shahid AR, Pissinou N, Iyengar SS, Makki K (2020) Delay-aware privacy-preserving location-based services under spatiotemporal constraints. Int J Commun Syst. https://doi.org/10.1002/dac.4656
Wang K, Kunfu W, Wei F, Wanfeng M, Hui W (2020) Research on location privacy protection mechanism based on no-trusted user cooperation. J Phys Conf Ser 1673(1):012048. https://doi.org/10.1088/1742-6596/1673/1/012048
Liu B, Zhang C, Yao L, Xin Y (2023) Glps: A geohash-based location privacy protection scheme. Entropy. https://doi.org/10.3390/E25121569
Xudong Y, Ling G, Yan L, Jipeng X, Jie Z, Hai W, Quanli G (2022) A semantic-based dual location privacy-preserving approach. IEICE Trans Inf Syst 105:982–995. https://doi.org/10.1587/TRANSINF.2021EDP7185
Ayong Y, Qiang Z, Yiqing D, Jiaomei Z, Huina D, Baorong C (2020) A semantic-based approach for privacy-preserving in trajectory publishing. IEEE ACCESS 8:184965–184975. https://doi.org/10.1109/ACCESS.2020.3030038
Acknowledgements
This work was supported by the Basic Scientific Research Operating Expenses of Heilongjiang Provincial Universities and Colleges for Excellent Innovation Team (2022-KYYWF-0654), the National Fund cultivation project of Jiamusi University (JMSUGPZR2022-014), the Open Research Topics of Heilongjiang Province Key Laboratory of Autonomous Intelligence and Information Processing (ZZXC202302), the “Dongji” Academic Team of Jiamusi University(Team Code: DJXSTD202417), the Excellent Discipline Team Project of Jiamusi University (JDXKTDG2019008) and the Natural Science Fund of Heilongjiang Province (LH2021F054).
Author information
Authors and Affiliations
Contributions
lijing: conceptualization, methodology; liuke: Writing-Original Draft, Software, validation; zhanglei: resources, Supervision; yinxiaoya: data Curation; jiayuanyuan: data Curation; jiahuinan: data Curation.
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jing, L., Ke, L., Lei, Z. et al. Geohash coding location privacy protection scheme based on entropy weight TOPSIS. J Supercomput 81, 85 (2025). https://doi.org/10.1007/s11227-024-06511-0
Accepted:
Published:
DOI: https://doi.org/10.1007/s11227-024-06511-0