k-anonymity based location privacy protection method for location-based services in Internet of Thing

被引:4
|
作者
Wang, Bo [1 ]
Guo, Yina [1 ]
Li, Hongtao [2 ]
Li, Zhiying [2 ]
机构
[1] Taiyuan Univ Sci & Technol, Sch Elect Informat Engn, Taiyuan 030024, Peoples R China
[2] Shanxi Normal Univ, Coll Math & Comp Sci, Linfen, Shanxi, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Internet of Things; k-anonymity; location privacy protection; location-based services; Voronoi diagram;
D O I
10.1002/cpe.6760
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The wide application of Internet of Things technology has promoted the application of location-based services (LBS). Users can enjoy various conveniences brought by LBS. However, mobile users should submit their location information to LBS which may lead to privacy disclosure. Therefore, users need to protect their privacy while enjoying the service. If the privacy protection problem cannot be solved, the development of mobile internet business will be greatly affected. The existing location privacy protection methods take little account of real-time road conditions and are unable to resist link attacks. In this article, a k-anonymous location privacy protection method based on Voronoi map was proposed. First, the Voronoi diagram was divided according to road network structure and real-time road network data, and Voronoi unit was established with the intersection as the base point. Then, the base point is sent as an anchor instead of the user's actual location to the third-party server. The Voronoi diagram generated by the k-anonymity constituted an anonymous space to resist multi-query attacks and protected the location. k-1 user location points that are communicating were selected to form k-anonymous set with the current user, and send the anonymous set to LBS. Theoretical analysis and experimental results show that the proposed method not only efficiently protected location privacy, but also provided high-quality service.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Privacy Protection Through k-anonymity in Location-based Services
    Zuberi, Rubina Shahin
    Lall, Brejesh
    Ahmad, Syed Naseem
    IETE TECHNICAL REVIEW, 2012, 29 (03) : 196 - 201
  • [2] A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services
    Wang, Tian
    Xu, Linli
    Zhang, Mingyue
    Zhang, Huanhuan
    Zhang, Gongxuan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (05)
  • [3] Achieving Effective k-Anonymity for Query Privacy in Location-Based Services
    Wang, Jinbao
    Li, Yingshu
    Yang, Donghua
    Gao, Hong
    Luo, Guangchun
    Li, Jianzhong
    IEEE ACCESS, 2017, 5 : 24580 - 24592
  • [4] Achieving k-anonymity in Privacy-Aware Location-Based Services
    Niu, Ben
    Li, Qinghua
    Zhu, Xiaoyan
    Cao, Guohong
    Li, Hui
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 754 - 762
  • [5] Protecting query privacy with differentially private k-anonymity in location-based services
    Wang, Jinbao
    Cai, Zhipeng
    Li, Yingshu
    Yang, Donghua
    Li, Ji
    Gao, Hong
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (03) : 453 - 469
  • [6] Protecting query privacy with differentially private k-anonymity in location-based services
    Jinbao Wang
    Zhipeng Cai
    Yingshu Li
    Donghua Yang
    Ji Li
    Hong Gao
    Personal and Ubiquitous Computing, 2018, 22 : 453 - 469
  • [7] Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services
    Wang, Jinbao
    Cai, Zhipeng
    Ai, Chunyu
    Yang, Donghua
    Gao, Hong
    Cheng, Xiuzhen
    2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 475 - 480
  • [8] K-anonymity scheme for privacy preservation in location-based services on IoT environment
    Das, Ayan Kumar
    Tabassum, Ayesha
    Sadaf, Sayema
    Sinha, Ditipriya
    INTERNATIONAL JOURNAL OF AUTOMATION AND CONTROL, 2021, 15 (03) : 340 - 362
  • [9] A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Services
    Um, Jung-Ho
    Jang, Mi-Young
    Jo, Kyoung-Jin
    Chang, Jae-Woo
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 79 - 85
  • [10] A Location Privacy Protection Algorithm Based on Double K-Anonymity in the Social Internet of Vehicles
    Xing, Ling
    Jia, Xiaofan
    Gao, Jianping
    Wu, Honghai
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (10) : 3199 - 3203