ABSTRACT
Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location privacy protection scheme is proposed, which includes location hiding algorithm and query privacy protection algorithm. Q-Tree storage ensures that anonymous location units are as dispersed as possible. The point of interest (POI) with higher query probability is selected as the query content of anonymous location unit, which protects the user's query privacy. At the same time, private information retrieval technology (PIR) is used to provide users with higher privacy and security protection. Finally, the effectiveness of the scheme is proved by privacy analysis and experimental results.
- GEDIK B, LIU L. Protecting location privacy with personalized k-anonymity: architecture and algorithms [J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1--18.Google ScholarDigital Library
- PINGLY A, YU W, ZHANG N, FU X, et al. Cap: a context-aware privacy protection system for location-based services[C]// ICDCS 2009: 49--57.Google Scholar
- LI X, ZHANG C, JUNG T, QIAN J, et al. Graph-based privacy-preserving data publication[C]//INFOCOM. 2016.Google Scholar
- CHEN Z, HU X, JU X, et al. Lisa: location information scrambler for privacy protection on smartphones[C]//CNS. 2013.Google Scholar
- ZHENG X, CAI Z, LI J, et al. Location-privacy-aware review publication mechanism for local business service systems[C]//International Conference on Computer Communications. IEEE, 2017: 1--9.Google Scholar
- JIANG H, ZHAO P, WANG C. Roblop: towards robust privacy preserving against location dependent attacks in continuous lbs queries [J]. IEEE/ACM Transactions on Networking, 2018, 26(2):1018--1032.Google ScholarDigital Library
- XIAO Y, XIONG L. Protecting locations with differential privacy under temporal correlations[C]//The 22nd ACM Conference on Computer and Communications Security. 2015: 1--7.Google Scholar
- SHOKRI R, THEODORAKOPOULOS G, BOUDEC J Y L, et al. Quantifying location privacy[C]//IEEE Security and Privacy. 2011: 247--262.Google Scholar
- WANG J, LI Y, YANG D, et al. Achieving effective k-anonymity for query privacy in location-based services[J]. IEEE Access, 2017, 5: 24580--24592.Google ScholarCross Ref
- LI W, NIU B, LI H, et al. Privacy-preserving strategies in service quality aware location-based services[C]//IEEE International Conference on Communications. 2015: 7328--7334.Google Scholar
- SHOKRI R, THEODORAKOPOULOS G, TRONCOSO C, et al. Protecting location privacy: optimal strategy against localization attacks[C]//Proceedings of ACM Conference on Computer and Communications Security, New York: ACM Press, 2012: 617--627.Google ScholarDigital Library
- KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing location-based identity inference in anonymous spatial queries [J]. IEEE Transactions on Knowledge & Data Engineering, 2007, 19(12): 1719--1733.Google ScholarDigital Library
- TRIPATHYB K, MAITY A, RANAJIT B, et al. A fast p-sensitive l-diversity Anonymisation algorithm[C]// Recent Advances in Intelligent Computational Systems. IEEE, 2011: 741--744.Google Scholar
- HE X, JIN R, DAH I. Leveraging spatial diversity for privacy- aware location-based services in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(6):1524--1534.Google ScholarDigital Library
- HAO G, BINX Y. Research on privacy preserving method based on t-closeness model[C]//The International Conference on Communications in China. IEEE, 2017: 1455--1459.Google Scholar
- MONEDERO D R, FORNE J, FERRER J D. From t-closeness-like privacy to post randomization via information theory [J]. IEEE Transactions on Knowledge and Data Engineering, 2010, 22(11): 1623--1636.Google ScholarDigital Library
- LI N H, LIT C, VENKATASUBRAMANIAN S. T-closeness: privacy beyond k-anonymity and l-diversity[C]//International Conference on Data Engineering. IEEE, 2007: 106--115.Google Scholar
- CHEN Z, HU X, JU X, et al. Lisa: location information scrambler for privacy protection on smartphones[C]// Conference on Communications and Network Security. IEEE, 2013: 296--304.Google Scholar
- GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services: anonymizers are not necessary[C]// Proceedings of the 2008 ACM SIGMOD international conference on management of data. New York: ACM, 2008: 121--132.Google ScholarDigital Library
Index Terms
- Location Privacy Protection Scheme Based on Location Services
Recommendations
Resilient Privacy Protection for Location-Based Services through Decentralization
Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users. However, the location and other information disclosed through each query to the LBS erodes user privacy. This is a concern especially because LBS ...
Collaborative trajectory privacy preserving scheme in location-based services
Location-based services (LBSs) have been gaining considerable popularity and are becoming the fastest growing activity-related services that people use in their daily life. While users benefit from LBSs, the collection and analysis of participators ...
A privacy-aware location cloaking technique reducing bandwidth consumption in location-based services
QUeST '12: Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal DataThe explosive growth of location-detection devices, such as GPS (Global Positioning System), continuously increases users' privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/...
Comments