Skip to main content

Advertisement

Log in

Geohash coding location privacy protection scheme based on entropy weight TOPSIS

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The traditional k-anonymity technique does not consider comprehensive factors when choosing anonymous locations, resulting in a high risk of privacy leakage in the final generated anonymous set. In order to construct a secure anonymous set, this paper proposed a Geohash coding location privacy protection scheme based on entropy weight TOPSIS (GLPPS-EWT). First, in order to reduce unnecessary time consumption caused by repeated encoding of historical locations, locations are cached into prefix tree based on Geohash codes. Second, considering attackers may have background knowledge so that locations initially filtered according to historical query probability and semantic distance. Finally, considering the semantic diversity, semantic sensitivity and anonymous area of anonymous set, the entropy weight method is used to determine the index weight and make multi-attribute decision on the candidate set. The optimal anonymous location is selected to construct secure anonymous set. The experimental results show that GLPPS-EWT has good performance and high privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

References

  1. Feng Jingyu ZR, Jinwen Yang, Wenbo Z (2020) A spectrum sharing incentive scheme against location privacy leakage in iot networks. J Comput Res Develop 57:2209–2220. https://doi.org/10.7544/issn1000-1239.2020.20200453

    Article  Google Scholar 

  2. Li Weihao CJ, Hui L (2019) Privacy self-correlation privacy-preserving scheme in lbs. J Commun 40:57–66. https://doi.org/10.11959/j.issn.1000-436x.2019110

    Article  Google Scholar 

  3. Li Yuxi ZF, Zifeng X (2021) Privacy-preserving k-nearest-neighbor search over mobile social network. Chin J Comput 44:481–1500. https://doi.org/10.11897/SP.J.1016.2021.01481

    Article  Google Scholar 

  4. Wang X, Luo Y, Liu S, Wang T, Han H (2019) Subspace k-anonymity algorithm for location-privacy preservation based on locality-sensitive hashing. Intell Data Anal 23:1167–1185. https://doi.org/10.3233/IDA-184183

    Article  Google Scholar 

  5. Yu F, Yihan Y, Xiaoping W (2019) Differential privacy protection technology and its application in big data environment. J Commun 40:157–168. https://doi.org/10.11959/j.issn.1000-436x.2019209

    Article  Google Scholar 

  6. Sheng G, Xiuhua C, Jianming Z, Liping Y, Xindi M, Hui L (2022) A location privacy-preserving worker selection scheme under limited budget for blockchain-based crowdsensing. Chin J Comput 45:1052–1067. https://doi.org/10.11897/SP.J.1016.2022.01052

    Article  Google Scholar 

  7. Zhang Z, Sun X, Chen S, Liang Y (2022) Lpps-agc: Location privacy protection strategy based on alt-geohash coding in location-based services. Wirel Commun Mob Comput. https://doi.org/10.1155/2022/3984099

    Article  Google Scholar 

  8. Hara T (2019) Dummy-based location anonymization for controlling observable user preferences. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp 1–7. IEEE

  9. Jie W, Chunru W, Jianfeng M, Hongtao L (2020) Dummy location selection algorithm based on location semantics and query probability. J Commun 41:53–61. https://doi.org/10.11959/j.issn.1000-436x.2020061

    Article  Google Scholar 

  10. TaghizadehHesary Farhad ZJ (2020) Measuring carbon market transaction efficiency in the power industry: An entropy-weighted topsis approach. Entropy (Basel, Switzerland) 22:973–983. https://doi.org/10.3390/E22090973

    Article  Google Scholar 

  11. Zhou Y, Su Y (2023) Polo: adaptive trie-based log parser for anomaly detection. Mathematics. https://doi.org/10.3390/MATH11234797

    Article  Google Scholar 

  12. Xueying G, Wenming W, Haiping H, Qi L, Reza M (2020) Location privacy-preserving method based on historical proximity location. Wirel Commun Mob Comput 2020:1–16. https://doi.org/10.1155/2020/8892079

    Article  Google Scholar 

  13. Reem A, Tahani A, Nermin H (2020) A new location?based privacy protection algorithm with deep learning. Secur Priv 4:1–10. https://doi.org/10.1002/SPY2.139

    Article  Google Scholar 

  14. Yang X, Gao L, Wang H, Li Y, Zheng J, Xu J, Ma Y (2021) A user-related semantic location privacy protection method in location-based service. In: 2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), pp 691–698. IEEE

  15. Hu Z-W, Yang J (2019) Trajectory privacy protection based on location semantic perception. Int J Coop Inform Syst 28:34. https://doi.org/10.1142/S0218843019500060

    Article  Google Scholar 

  16. Hai L, Xinghau L, Yunwei LBW, Yanbing R, Jianfeng M, Hongfa D (2019) Distributed k-anonymity location privacy protection sheme based on blockchain. Chin J Comput 42:942–960. https://doi.org/10.11897/SP.J.1016.2019.00942

    Article  Google Scholar 

  17. Jin X, Zhang Y (2018) Privacy-preserving crowdsourced spectrum sensing. IEEE/ACM Trans Netw 26:1236–1249. https://doi.org/10.1109/TNET.2018.2823272

    Article  Google Scholar 

  18. Kasiviswanathan SP, Lee HK, Nissim K, Raskhodnikova S, Smith A What can we learn privately?

  19. Miao Q, Jing W, Song H (2019) Differential privacy-based location privacy enhancing in edge computing. Concurr Comput Pract Exp 31(8):1–17. https://doi.org/10.1002/cpe.4735

    Article  Google Scholar 

  20. Ayong Y, Lingyu M, Ziwen Z, Yiqing D, Jiaomei Z (2020) Trajectory differential privacy protection mechanism based on prediction and sliding window. J Commun 41:123–133. https://doi.org/10.11959/j.issn.1000-436x.2020049

    Article  Google Scholar 

  21. Hongtao L, Yue W, Feng G, Jie W, Bo W, Chuankun W (2021) Differential privacy location protection method based on the markov model. Wirel Commun Mob Comput. https://doi.org/10.1155/2021/4696455

    Article  Google Scholar 

  22. Memon I, Arain QA, Memon H, Mangi FA (2017) Efficient user based authentication protocol for location based services discovery over road networks. Wirel Pers Commun 95:3713–3732. https://doi.org/10.1007/s11277-017-4022-9

    Article  Google Scholar 

  23. Memon I, Arain QA (2017) Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web 20:639–672. https://doi.org/10.1007/s11280-016-0403-3

    Article  Google Scholar 

  24. Arain QA, Shaikh, RA, Memon H (2016) User privacy protection based on road network model for location based services. J Inf Commun Technol (JICT) 10

  25. Jing Z, Chuanwen L, Botao W (2022) A performance tunable cpir-based privacy protection method for location based service. Inf Sci 589:440–458. https://doi.org/10.1016/J.INS.2021.12.068

    Article  Google Scholar 

  26. Huang M, Yuan L, Pan X, Zhou C (2023) Trusted edge and cross-domain privacy enhancement model under multi-blockchain. Comput Netw. https://doi.org/10.1016/J.COMNET.2023.109881

    Article  Google Scholar 

  27. Keerthika M, Shanmugapriya D (2021) Wireless sensor networks: active and passive attacks—vulnerabilities and countermeasures. Glob Trans Proc 2(2):362–367. https://doi.org/10.1016/J.GLTP.2021.08.045

    Article  Google Scholar 

  28. Ai Z, XiaoHui L (2022) Research on privacy protection of dummy location interference for location-based service location. Int J Distrib Sens Netw. https://doi.org/10.1177/15501329221125111

    Article  Google Scholar 

  29. Li Y, Zhu Y, Fei J, Wu W (2024) Diverse metrics for robust lbs privacy: distance, semantics, and temporal factors. Sensors. https://doi.org/10.3390/S24041314

    Article  Google Scholar 

  30. Shahid AR, Pissinou N, Iyengar SS, Makki K (2020) Delay-aware privacy-preserving location-based services under spatiotemporal constraints. Int J Commun Syst. https://doi.org/10.1002/dac.4656

    Article  Google Scholar 

  31. Wang K, Kunfu W, Wei F, Wanfeng M, Hui W (2020) Research on location privacy protection mechanism based on no-trusted user cooperation. J Phys Conf Ser 1673(1):012048. https://doi.org/10.1088/1742-6596/1673/1/012048

    Article  Google Scholar 

  32. Liu B, Zhang C, Yao L, Xin Y (2023) Glps: A geohash-based location privacy protection scheme. Entropy. https://doi.org/10.3390/E25121569

    Article  Google Scholar 

  33. Xudong Y, Ling G, Yan L, Jipeng X, Jie Z, Hai W, Quanli G (2022) A semantic-based dual location privacy-preserving approach. IEICE Trans Inf Syst 105:982–995. https://doi.org/10.1587/TRANSINF.2021EDP7185

    Article  Google Scholar 

  34. Ayong Y, Qiang Z, Yiqing D, Jiaomei Z, Huina D, Baorong C (2020) A semantic-based approach for privacy-preserving in trajectory publishing. IEEE ACCESS 8:184965–184975. https://doi.org/10.1109/ACCESS.2020.3030038

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Basic Scientific Research Operating Expenses of Heilongjiang Provincial Universities and Colleges for Excellent Innovation Team (2022-KYYWF-0654), the National Fund cultivation project of Jiamusi University (JMSUGPZR2022-014), the Open Research Topics of Heilongjiang Province Key Laboratory of Autonomous Intelligence and Information Processing (ZZXC202302), the “Dongji” Academic Team of Jiamusi University(Team Code: DJXSTD202417), the Excellent Discipline Team Project of Jiamusi University (JDXKTDG2019008) and the Natural Science Fund of Heilongjiang Province (LH2021F054).

Author information

Authors and Affiliations

Authors

Contributions

lijing: conceptualization, methodology; liuke: Writing-Original Draft, Software, validation; zhanglei: resources, Supervision; yinxiaoya: data Curation; jiayuanyuan: data Curation; jiahuinan: data Curation.

Corresponding author

Correspondence to Zhang Lei.

Ethics declarations

Conflict of Interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jing, L., Ke, L., Lei, Z. et al. Geohash coding location privacy protection scheme based on entropy weight TOPSIS. J Supercomput 81, 85 (2025). https://doi.org/10.1007/s11227-024-06511-0

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-06511-0

Keywords