A LOCATION PRIVACY PRESERVING ALGORITHM FOR MOBILE LBS

被引:0
|
作者
Li, Wei [1 ]
Jiao, Wei [1 ]
Li, Guangye [1 ]
机构
[1] Beihang Univ, Sch Comp Sci & Engn, Key Lab Beijing Network Technol, Beijing 100191, Peoples R China
来源
2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3 | 2012年
关键词
Location-based service; Privacy protection; Continuous query;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Location-Based Service (LBS) combined with mobile devices and Internet become more and more popular, and are widely used in traffic navigation, intelligent logistics and the point of interest query. However, most users worry about their privacy when using the LBS because they should provide their accurate location and query content to the untrustworthy server. Therefore, how to protect users' privacy is very important to the mobile LBS application. Continuous queries tracking attack is one of the typical attack models in mobile LBS. This paper analyzes the query association attack model for the continuous query in mobile LBS, formalizes the background knowledge of attackers considering the spatiotemporal dimension. In order to resist the query association attack for continuous query in mobile LBS, this paper improves the k-sharing model and proposes the location distribution aware cloaking algorithm which is distribution-aware when generating cloak regions, it satisfies the m-invariant and l-diversity. Finally, a set of experiments show the effectiveness of the approach.
引用
收藏
页码:548 / 552
页数:5
相关论文
共 50 条
  • [41] Privacy-preserving location-based queries in mobile environments
    Gao, Jiali
    Xiao, Shali
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 805 - 812
  • [42] A Dual-active Spatial Cloaking Algorithm for Location Privacy Preserving in mobile Peer-to-Peer Networks
    Che, Yanzhe
    Yang, Qiang
    Hong, Xiaoyan
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [43] LBS-oriented location privacy protection model
    Zhang, Guoping
    Fan, Xing
    Tang, Ming
    Zhang, Xinyu
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (09): : 45 - 49
  • [44] A Novel Method for Location Privacy Protection in LBS Applications
    Lu, Dan
    Han, Qilong
    Zhang, Kejia
    Zhang, Haitao
    Gull, Bisma
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [45] Privacy Preserving Location Recommendations
    Badsha, Shahriar
    Yi, Xun
    Khalil, Ibrahim
    Liu, Dongxi
    Nepal, Surya
    Bertino, Elisa
    WEB INFORMATION SYSTEMS ENGINEERING, WISE 2017, PT II, 2017, 10570 : 502 - 516
  • [46] Preserving privacy in the context of location based services through location hider in mobile-tourism
    Saravanan S.
    Sadhu Ramakrishnan B.
    Information Technology & Tourism, 2016, 16 (2) : 229 - 248
  • [47] Myself: Local Perturbation for Location Privacy in LBS applications
    Jagdale, B. N.
    Bakal, J. W.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1981 - 1985
  • [48] Triple Cache Approach for Preserving Privacy and Enhancing Performance of LBS
    Alsaawy, Yazed
    Alkhodre, Ahmad
    Eassa, Fathy Albouraey
    Sen, Adnan Ahmed Abi
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1277 - 1281
  • [49] Privacy Preserving Queries for LBS: Hash Function Secured (HFS)
    Albelaihy, Abdullah
    Cazalas, Jonathan
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 7 - 12
  • [50] Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems
    Wang, Yingjie
    Cai, Zhipeng
    Tong, Xiangrong
    Gao, Yang
    Yin, Guisheng
    COMPUTER NETWORKS, 2018, 135 : 32 - 43