K-anonymous location privacy protection scheme for the mobile terminal

被引:0
|
作者
Song C. [1 ]
Jin T. [1 ]
Ni S. [1 ]
He J. [1 ]
Du S. [1 ]
机构
[1] School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo
关键词
K-anonymity; Location privacy; Mobile terminal; Oblivious transfer;
D O I
10.19665/j.issn1001-2400.2021.03.018
中图分类号
学科分类号
摘要
In view of the security and effectiveness of the current location privacy protection scheme, we propose a K-anonymous location privacy protection scheme for the mobile terminal. In this scheme, 2K valid dummy locations are obtained from the cloaking regions, and then K-1 better locations are selected from them according to the position entropy, so as to achieve a better anonymous effect. The secure and efficient oblivious transfer protocol is adopted, which avoids the dependence on the trusted anonymous center, improves the scheme's efficiency, and realizes the requirement of querying multiple interest points at one time. Security analysis shows that the scheme not only satisfies the unforgeability, but also resists the playback attack. Meanwhile, simulation indicates that the scheme can improve the execution efficiency, enhance the level of privacy protection, and reduce the communication overhead. © 2021, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:138 / 145
页数:7
相关论文
共 21 条
  • [1] LU Z, QU G, LIU Z., A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy, IEEE Transactions on Intelligent Transportation Systems, 20, 2, pp. 760-776, (2019)
  • [2] YUAN T, KALEEMULLAH M M, RODHAAN M A, Et al., A Privacy Preserving Location Service for Cloud-of-Things System, Journal of Parallel and Distributed Computing, 123, pp. 215-222, (2019)
  • [3] ABUL O, BAYRAK C., From Location to Location Pattern Privacy in Location-Based Services, Knowledge and Information Systems, 56, 3, pp. 533-557, (2018)
  • [4] GEDIK B, LIU L., Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms, IEEE Transactions on Mobile Computer, 7, 1, pp. 1-18, (2008)
  • [5] WANG K, ZHAO W, CUI J, Et al., A K-Anonymous Clustering Algorithm Based on the Analytic Hierarchy Process, Journal of Visual Communication and Image Representation, 59, pp. 76-83, (2019)
  • [6] MEMON I, CHEN L, ARAIN Q A, Et al., Pseudonym Changing Strategy with Multiple Mix Zones for Trajectory Privacy Protection in Road Networks, International Journal of Communication Systems, 31, 1, (2018)
  • [7] ZHOU B, PEI J., The K-Anonymity and L-Diversity Approaches for Privacy Preservation in Social Networks Against Neighborhood Attacks, Knowledge and Information Systems, 28, 1, pp. 47-77, (2011)
  • [8] ZHANG Shaobo, BHUIYAN M Z A, LIU Qin, Et al., The Method of Trajectory Privacy Preserving Based on Agent Forwarding Mechanism in Mobile Social Networks, Journal of Electronics and Information Technology, 38, pp. 2158-2164, (2016)
  • [9] REBOLLO-MONEDERO D, FORNE J, PALLARES E, Et al., A Modification of the Lloyd Algorithm for K-Anonymous Quantization, Information Sciences, 222, 3, pp. 185-202, (2013)
  • [10] SUN G, Song L J, LIAO D, Et al., Towards Privacy Preservation for "Check-In" Services in Location-Based Social Networks, Information Sciences, 481, pp. 616-634, (2019)