Truthful Incentive Mechanisms for K-Anonymity Location Privacy

被引:0
|
作者
Yang, Dejun [1 ]
Fang, Xi [1 ]
Xue, Guoliang [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
关键词
PLACEMENT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tremendous efforts have been made to protect the location privacy of mobile users. Some of them, e.g., k-anonymity, require the participation of multiple mobile users to impede the adversary from tracing. These participating mobile users constitute an anonymity set. However, not all mobile users are seriously concerned about their location privacy. Therefore, to achieve k-anonymity, we need to provide incentives for mobile users to participate in the anonymity set. In this paper, we study the problem of incentive mechanism design for k-anonymity location privacy. We first consider the case where all mobile users have the same privacy degree requirement. We then study the case where the requirements are different. Finally, we consider a more challenging case where mobile users can cheat about not only their valuations but also their requirements. We design an auction-based incentive mechanism for each of these cases and prove that all the auctions are computational efficient, individually rational, budget-balanced, and truthful. We evaluate the performance of different auctions through extensive simulations.
引用
收藏
页码:2994 / 3002
页数:9
相关论文
共 50 条
  • [31] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    [J]. World Wide Web, 2021, 24 : 1551 - 1561
  • [32] Privacy in VoIP Networks: A k-Anonymity Approach
    Srivatsa, Mudhakar
    Iyengar, Arun
    Liu, Ling
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2856 - 2860
  • [33] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [34] Balancing between Utility and Privacy for k-Anonymity
    Babu, Korra Sathya
    Jena, Sanjay Kumar
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 1 - 8
  • [35] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    [J]. 2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [36] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [37] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
  • [38] Privacy-preserving distributed k-anonymity
    Jiang, W
    Clifton, C
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 166 - 177
  • [39] Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs
    Geng, Ziye
    He, Yunhua
    Niu, Tong
    Li, Hong
    Sun, Limin
    Cheng, Wei
    Li, Xu
    [J]. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 200 - 201
  • [40] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
    Wang, Hui
    Huang, Haiping
    Qin, Yuxiang
    Wang, Yunqi
    Wu, Min
    [J]. ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (06)