An Effective Privacy-Preserving and Enhanced Dummy Location Scheme for Semi-trusted Third Parties

被引:0
|
作者
Zuo, Meijing [1 ]
Peng, Luyao [2 ]
Song, Jun [2 ]
机构
[1] Univ Reading, Dept Comp Sci, Reading RG6 6AH, England
[2] China Univ Geosci, Sch Comp Sci, Wuhan, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Privacy preservation; Location based service; Game model; Semi-trusted third party; Inference attacks; SERVICES;
D O I
10.1007/978-981-97-2390-4_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Location-Based Services (LBS) have garnered significant attention in recent years, emphasizing the need to improve location services while safeguarding user privacy. In this paper, we propose an effective privacy-preserving and enhanced dummy location scheme specifically designed for semi-trusted third-party scenarios, with a primary focus on defending against inference attacks targeting a user's private location information. To achieve more effective location privacy preservation and mitigate privacy leaks stemming from a single point of failure, we employ a key information sharing mechanism, introduce a robust dummy location set generation approach, and present a comprehensive covering area construction strategy. To demonstrate the viability and effectiveness of our proposed scheme, we conduct a thorough simulation evaluation and performance analysis based on a practical road network setting.
引用
收藏
页码:193 / 208
页数:16
相关论文
共 50 条
  • [1] Privacy-preserving distributed association rule mining via semi-trusted mixer
    Yi, Xun
    Zhang, Yanchun
    [J]. DATA & KNOWLEDGE ENGINEERING, 2007, 63 (02) : 550 - 567
  • [2] Fair Threshold Decryption with Semi-Trusted Third Parties
    Hong, Jeongdae
    Kim, Jinil
    Kim, Jihye
    Franklin, Matthew K.
    Park, Kunsoo
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 309 - +
  • [3] Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers
    Yi, Xun
    Zhang, Yanchun
    [J]. INFORMATION SYSTEMS, 2009, 34 (03) : 371 - 380
  • [4] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    [J]. CEIS 2011, 2011, 15
  • [5] Best-practice example from Australia: privacy-preserving approach using semi-trusted third-party models
    Churches, Tim
    [J]. EUROPEAN JOURNAL OF PUBLIC HEALTH, 2010, 20 : 102 - 102
  • [6] Privacy-Preserving and Fault-Tolerant Aggregation of Time-Series Data With a Semi-Trusted Authority
    Xu, Chang
    Yin, Run
    Zhu, Liehuang
    Zhang, Chuan
    Zhang, Can
    Chen, Yupeng
    Sharif, Kashif
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14): : 12231 - 12240
  • [7] Privacy Preserving Record Matching Using Automated Semi-trusted Broker
    Lazrig, Ibrahim
    Moataz, Tarik
    Ray, Indrajit
    Ray, Indrakshi
    Ong, Toan
    Kahn, Michael
    Cuppens, Frederic
    Cuppens, Nora
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 103 - 118
  • [8] A Framework for Transformation Network Training in Coordination with Semi-trusted Cloud Provider for Privacy-Preserving Deep Neural Networks
    Ito, Hiroki
    Kinoshita, Yuma
    Kiya, Hitoshi
    [J]. 2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2020, : 1420 - 1424
  • [9] An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services
    Du, Yongwen
    Cai, Gang
    Zhang, Xuejun
    Liu, Ting
    Jiang, Jinghua
    [J]. INFORMATION, 2019, 10 (09)
  • [10] Privacy-preserving enhanced dummy-generation technique for location-based services
    Parmar, Dilay
    Rao, Udai Pratap
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (02):