Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries

被引:0
|
作者
Liu H. [1 ]
Li X.-H. [1 ]
Wang E.-M. [1 ]
Ma J.-F. [1 ]
机构
[1] School of Cyber Engineering, Xidian Universality, Xi'an
来源
基金
中国国家自然科学基金;
关键词
Check of continuous reasonability; Continuous queries; Dummy; Location-based service; Privacy enhancing;
D O I
10.11959/j.issn.1000-436x.2016142
中图分类号
学科分类号
摘要
Without need for the third party and sharing key, the dummy-based privacy protection scheme enabled users to obtain the precise query result in location-based services. However, in continuous queries, since the existing dummy- based privacy protection schemes ignored the spatio-temporal relevance of the submitted neighbor location sets, the adversary could infer dummies, making that the protection degree of users' location privacy was reduced. To solve this problem, a dummy-based privacy protection enhancing method toward continuous queries was proposed. In the proposal, the candidate dummies were first generated by the existing dummy-based schemes, and could be filtered through the check of continuous reasonability and single privacy enhancement. Security analysis shows that, in the proposed method, the formed movement paths are indistinguishable in time and space, so that protecting the user's location privacy effectively in continuous queries. Moreover, extensive experiments indicate that its computation cost is limited, and compared with the scheme adopted to generate candidate dummies, the user's privacy protection is also enhanced in snapshot query. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:140 / 150
页数:10
相关论文
共 26 条
  • [1] Krumm J., A survey of computational location privacy, Personal and Ubiquitous Computing, 13, 6, pp. 391-399, (2009)
  • [2] Tiwari S., Kaushik S., Jagwani P., Et al., A survey on LBS: system architecture, trends and broad research areas, LNCS 7108: The 7th International Conference on Databases in Network Information Systems, pp. 223-241, (2011)
  • [3] Wang L., Meng X.F., Location privacy preservation in big data era: a survey, Journal of Software, 25, 4, pp. 693-712, (2014)
  • [4] Wang Y.H., Zhang H.L., Yu X.Z., Research on location privacy in mobile Internet, Journal on Communications, 36, 9, (2015)
  • [5] Kido H., Yanagisawa Y., Satoh T., An anonymous communication technique using dummies for location-based services, The International Conference on Pervasive Services 2005, pp. 88-97, (2005)
  • [6] Kido H., Yanagiswa Y., Satoh T., Protection of location privacy using dummies for location-based services, The 21st International Conference on Data Engineering Workshops, (2005)
  • [7] Gruteser M., Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, The 1st International Conference on Mobile, Systems, Applications and Services, pp. 31-42, (2003)
  • [8] Talukder N., Ahamed S.I., Preventing multi-query attack in location-based services, The 3rd ACM Conference on Wireless Network Security, pp. 25-36, (2010)
  • [9] Bersford A.R., Stajano F., Mix zones: user privacy in location-aware services, The 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 127-131, (2004)
  • [10] Gao S., Ma J.F., Shi W.S., Et al., TrPF: a trajectory privacy-preserving framework for participatory sensing, IEEE Transactions on Information Forensics and Security, 8, 6, pp. 874-887, (2013)