Research on k-anonymity privacy protection scheme based on bilinear pairings

被引:1
|
作者
Song Cheng [1 ]
Zhang Yadong [1 ]
Wang Lei [1 ]
Liu Zhizhong [1 ]
机构
[1] College of Computer Science and Technology ( Software College) ,Henan Polytechnic University
基金
中国国家自然科学基金;
关键词
location-based services(LBS); bilinear pairings; k-anonymity; privacy protection;
D O I
10.19682/j.cnki.1005-8885.2018.0021
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is proposed. In circular region of Euclidian distance,mobile terminal evenly generates some false locations,from which half optimal false locations are screened out according to position entropy,location and mapping background information. The anonymity obtains the effective guarantee,so as to realize privacy protection. Through security analyses,the scheme is proved not only to be able to realize such security features as privacy,anonymity and nonforgeability,but also able to resist query tracing attack. And the result of simulation shows that this scheme not only has better evenness in selecting false locations,but also improves efficiency in generating and selecting false nodes.
引用
收藏
页码:12 / 19
页数:8
相关论文
共 50 条
  • [31] K-anonymity scheme for privacy preservation in location-based services on IoT environment
    Das, Ayan Kumar
    Tabassum, Ayesha
    Sadaf, Sayema
    Sinha, Ditipriya
    INTERNATIONAL JOURNAL OF AUTOMATION AND CONTROL, 2021, 15 (03) : 340 - 362
  • [32] LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme
    Chen, Ming
    Li, Wenzhong
    Chen, Xu
    Li, Zhuo
    Lu, Sanglu
    Chen, Daoxu
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [33] A Location Privacy Protection Algorithm Based on Double K-Anonymity in the Social Internet of Vehicles
    Xing, Ling
    Jia, Xiaofan
    Gao, Jianping
    Wu, Honghai
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (10) : 3199 - 3203
  • [34] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637
  • [35] Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity
    Jiang, Nanlan
    Zhai, Yinan
    Wang, Yujun
    Yin, Xuesong
    Yang, Sai
    Xu, Pingping
    SENSORS, 2024, 24 (18)
  • [36] A Personalized k-Anonymity with Fake Position Generation for Location Privacy Protection
    Luo, Zhi
    Huang, Xiaohong
    FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 46 - 55
  • [37] A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services
    Wang, Tian
    Xu, Linli
    Zhang, Mingyue
    Zhang, Huanhuan
    Zhang, Gongxuan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (05)
  • [38] k-anonymity based location privacy protection method for location-based services in Internet of Thing
    Wang, Bo
    Guo, Yina
    Li, Hongtao
    Li, Zhiying
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
  • [39] LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection
    Wang, Yunfeng
    Li, Mingzhen
    Luo, Shoushan
    Xin, Yang
    Zhu, Hongliang
    Chen, Yuling
    Yang, Guangcan
    Yang, Yixian
    IEEE ACCESS, 2019, 7 : 182886 - 182905
  • [40] Towards internal privacy and flexible K-anonymity
    Hellani, Hussein
    Kilany, Rima
    Sokhn, Maria
    2015 INTERNATIONAL CONFERENCE ON APPLIED RESEARCH IN COMPUTER SCIENCE AND ENGINEERING (ICAR), 2015,