Geohash coding location privacy protection scheme based on entropy weight TOPSIS

被引:0
|
作者
Jing, Li [1 ,2 ,3 ]
Ke, Liu [1 ,2 ,3 ]
Lei, Zhang [1 ,2 ,3 ]
Yin, Xiaoya [1 ,2 ,3 ]
Jia, Yuanyuan [1 ,2 ,3 ]
Jia, Huinan [1 ,2 ,3 ]
机构
[1] Jiamusi Univ, Coll Informat & Elect Technol, Heilongjiang 154007, Peoples R China
[2] Key Lab Autonomous Intelligence & Informat Proc, Heilongjiang 154007, Peoples R China
[3] Key Lab Satellite Nav Technol & Equipment Engn Tec, Jiamusi 154007, Heilongjiang, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2025年 / 81卷 / 01期
关键词
Location privacy; Geohash; k-anonymity; Entropy weight method; Multi-attribute decision-making;
D O I
10.1007/s11227-024-06511-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional k-anonymity technique does not consider comprehensive factors when choosing anonymous locations, resulting in a high risk of privacy leakage in the final generated anonymous set. In order to construct a secure anonymous set, this paper proposed a Geohash coding location privacy protection scheme based on entropy weight TOPSIS (GLPPS-EWT). First, in order to reduce unnecessary time consumption caused by repeated encoding of historical locations, locations are cached into prefix tree based on Geohash codes. Second, considering attackers may have background knowledge so that locations initially filtered according to historical query probability and semantic distance. Finally, considering the semantic diversity, semantic sensitivity and anonymous area of anonymous set, the entropy weight method is used to determine the index weight and make multi-attribute decision on the candidate set. The optimal anonymous location is selected to construct secure anonymous set. The experimental results show that GLPPS-EWT has good performance and high privacy.
引用
收藏
页数:30
相关论文
共 50 条
  • [31] LBS user location privacy protection scheme based on trajectory similarity
    Qian, Kun
    Li, Xiaohui
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [32] Research on Location Privacy Protection Scheme Based on Similar Trajectory Replacement
    Song C.
    Zhang Y.-D.
    Peng W.-P.
    Wang L.
    Liu Z.-Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2020, 43 (01): : 135 - 142
  • [33] Bidirectional location privacy protection scheme for epidemiological investigation based on OT
    Liu, Xueyan
    Wang, Jing
    Liu, Qiong
    Xiong, Xin
    Niu, Shufen
    COMPUTERS & SECURITY, 2023, 135
  • [34] An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
    Wang, Jingjing
    Han, Yiliang
    Yang, Xiaoyuan
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (03) : 260 - 269
  • [35] Location Privacy Protection Scheme Based on Random Encryption Period in VANETs
    Gao, Tianhan
    Xin, Xin
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 366 - 374
  • [36] Location Entropy-Based Privacy Protection Algorithm for Social Internet of Vehicles
    Xing, Ling
    Huang, Yuanhao
    Gao, Jianping
    Jia, Xiaofan
    Wu, Honghai
    Ma, Huahong
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (04) : 3009 - 3025
  • [37] Location Entropy-Based Privacy Protection Algorithm for Social Internet of Vehicles
    Ling Xing
    Yuanhao Huang
    Jianping Gao
    Xiaofan Jia
    Honghai Wu
    Huahong Ma
    Wireless Personal Communications, 2023, 130 : 3009 - 3025
  • [38] A Demand-Aware Location Privacy Protection Scheme in Continuous Location-based Services
    Li, Xinghua
    Deng, Lingjuan
    Gao, Sheng
    Ma, Jianfeng
    Yao, Qingsong
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 112 - 117
  • [39] A stochastic location privacy protection scheme for edge computing
    Tian, Yuan
    Song, Biao
    Al Rodhaan, Mznah
    Huang, Chen Rong
    Al-Dhelaan, Mohammed A.
    Al-Dhelaan, Abdullah
    Al-Nabhan, Najia
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (03) : 2636 - 2649
  • [40] Bus cache-based location privacy protection scheme in the Internet of vehicles
    Cui, Jie
    Chen, Xuefeng
    Zhang, Jing
    Wei, Lu
    Zhong, Hong
    Tongxin Xuebao/Journal on Communications, 2021, 42 (07): : 150 - 161