Truthful Incentive Mechanisms for K-Anonymity Location Privacy

被引:0
|
作者
Yang, Dejun [1 ]
Fang, Xi [1 ]
Xue, Guoliang [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
关键词
PLACEMENT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tremendous efforts have been made to protect the location privacy of mobile users. Some of them, e.g., k-anonymity, require the participation of multiple mobile users to impede the adversary from tracing. These participating mobile users constitute an anonymity set. However, not all mobile users are seriously concerned about their location privacy. Therefore, to achieve k-anonymity, we need to provide incentives for mobile users to participate in the anonymity set. In this paper, we study the problem of incentive mechanism design for k-anonymity location privacy. We first consider the case where all mobile users have the same privacy degree requirement. We then study the case where the requirements are different. Finally, we consider a more challenging case where mobile users can cheat about not only their valuations but also their requirements. We design an auction-based incentive mechanism for each of these cases and prove that all the auctions are computational efficient, individually rational, budget-balanced, and truthful. We evaluate the performance of different auctions through extensive simulations.
引用
收藏
页码:2994 / 3002
页数:9
相关论文
共 50 条
  • [21] Location K-anonymity in indoor spaces
    Kim, Joon-Seok
    Li, Ki-Joune
    [J]. GEOINFORMATICA, 2016, 20 (03) : 415 - 451
  • [22] Location K-anonymity in indoor spaces
    Joon-Seok Kim
    Ki-Joune Li
    [J]. GeoInformatica, 2016, 20 : 415 - 451
  • [23] LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection
    Wang, Yunfeng
    Li, Mingzhen
    Luo, Shoushan
    Xin, Yang
    Zhu, Hongliang
    Chen, Yuling
    Yang, Guangcan
    Yang, Yixian
    [J]. IEEE ACCESS, 2019, 7 : 182886 - 182905
  • [24] Achieving Effective k-Anonymity for Query Privacy in Location-Based Services
    Wang, Jinbao
    Li, Yingshu
    Yang, Donghua
    Gao, Hong
    Luo, Guangchun
    Li, Jianzhong
    [J]. IEEE ACCESS, 2017, 5 : 24580 - 24592
  • [25] An Encryption-based K-anonymity Approach for Location Privacy Protection in LBS
    Jia, Jinying
    Zhang, Fengli
    Wu, Rongchun
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1852 - 1855
  • [26] A trusted de-swinging k-anonymity scheme for location privacy protection
    Manxiang Yang
    Baopeng Ye
    Yuling Chen
    Tao Li
    Yixian Yang
    Xiaobin Qian
    Xiaomei Yu
    [J]. Journal of Cloud Computing, 11
  • [27] A semantic k-anonymity privacy protection method for publishing sparse location data
    Yang, Xudong
    Gao, Ling
    Wang, Hai
    Zheng, Jie
    Guo, Hongbo
    [J]. 2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2019, : 216 - 222
  • [28] A trusted de-swinging k-anonymity scheme for location privacy protection
    Yang, Manxiang
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    Yu, Xiaomei
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [29] Achieving k-anonymity in Privacy-Aware Location-Based Services
    Niu, Ben
    Li, Qinghua
    Zhu, Xiaoyan
    Cao, Guohong
    Li, Hui
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 754 - 762
  • [30] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    [J]. World Wide Web, 2021, 24 : 1551 - 1561