Truthful Incentive Mechanisms for K-Anonymity Location Privacy

被引:0
|
作者
Yang, Dejun [1 ]
Fang, Xi [1 ]
Xue, Guoliang [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
关键词
PLACEMENT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tremendous efforts have been made to protect the location privacy of mobile users. Some of them, e.g., k-anonymity, require the participation of multiple mobile users to impede the adversary from tracing. These participating mobile users constitute an anonymity set. However, not all mobile users are seriously concerned about their location privacy. Therefore, to achieve k-anonymity, we need to provide incentives for mobile users to participate in the anonymity set. In this paper, we study the problem of incentive mechanism design for k-anonymity location privacy. We first consider the case where all mobile users have the same privacy degree requirement. We then study the case where the requirements are different. Finally, we consider a more challenging case where mobile users can cheat about not only their valuations but also their requirements. We design an auction-based incentive mechanism for each of these cases and prove that all the auctions are computational efficient, individually rational, budget-balanced, and truthful. We evaluate the performance of different auctions through extensive simulations.
引用
收藏
页码:2994 / 3002
页数:9
相关论文
共 50 条
  • [1] On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy
    Zhang, Yuan
    Tong, Wei
    Zhong, Sheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2528 - 2541
  • [2] A Distributed k-Anonymity Protocol for Location Privacy
    Zhong, Ge
    Hengartner, Urs
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
  • [3] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
  • [4] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    [J]. IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [5] A K-Anonymity Based Schema for Location Privacy Preservation
    Fei, Fan
    Li, Shu
    Dai, Haipeng
    Hu, Chunhua
    Dou, Wanchun
    Ni, Qiang
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02): : 156 - 167
  • [6] SocialCloaking: a Distributed Architecture for K-anonymity Location Privacy Protection
    Hwang, Ren-Hung
    Huang, Fu-Hui
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 247 - 251
  • [7] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [8] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
  • [9] Location privacy: going beyond K-anonymity, cloaking and anonymizers
    Ali Khoshgozaran
    Cyrus Shahabi
    Houtan Shirani-Mehr
    [J]. Knowledge and Information Systems, 2011, 26 : 435 - 465
  • [10] Location privacy: going beyond K-anonymity, cloaking and anonymizers
    Khoshgozaran, Ali
    Shahabi, Cyrus
    Shirani-Mehr, Houtan
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 26 (03) : 435 - 465