A K-Anonymity Based Schema for Location Privacy Preservation

被引:55
|
作者
Fei, Fan [1 ,2 ]
Li, Shu [1 ,2 ]
Dai, Haipeng [1 ,2 ]
Hu, Chunhua [3 ]
Dou, Wanchun [1 ,2 ]
Ni, Qiang [4 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China
[2] Nanjing Univ, Dept Comp Sci & Technol, Nanjing 210008, Peoples R China
[3] Hunan Univ Commerce, Sch Comp & Informat Engn, Changsha 410205, Peoples R China
[4] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4YW, England
来源
基金
美国国家科学基金会; 英国工程与自然科学研究理事会;
关键词
LBS; privacy preservation; k-anonymity; auction;
D O I
10.1109/TSUSC.2017.2733018
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, with the development of mobile devices, the location based services (LBSs) have become more and more prevailing and most applications installed on these devices call for location information. Yet, the untrusted LBS provider can collect this location information, which may potentially threaten users' location privacy. In view of this challenge, we propose a two-tier schema for the privacy preservation based on k-anonymity principle meanwhile reducing the cost for privacy protection. Concretely, we divide the users into groups in order to maximize the privacy level and in each group one proxy is selected to generate dummy locations and share the returned results from LBS provider; then, on each group, an auction mechanism is proposed to determine the payment of each user to the proxy as the compensation, which satisfies budget balance and incentive compatibility. To evalue the performance of the proposed schema, a simulated experiment is conducted.
引用
收藏
页码:156 / 167
页数:12
相关论文
共 50 条
  • [1] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
  • [2] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    [J]. IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [3] K-anonymity scheme for privacy preservation in location-based services on IoT environment
    Das, Ayan Kumar
    Tabassum, Ayesha
    Sadaf, Sayema
    Sinha, Ditipriya
    [J]. INTERNATIONAL JOURNAL OF AUTOMATION AND CONTROL, 2021, 15 (03) : 340 - 362
  • [4] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    [J]. World Wide Web, 2021, 24 : 1551 - 1561
  • [5] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
  • [6] A Distributed k-Anonymity Protocol for Location Privacy
    Zhong, Ge
    Hengartner, Urs
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
  • [7] Improving k-anonymity based privacy preservation for collaborative filtering
    Wei, Ruoxuan
    Tian, Hui
    Shen, Hong
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 : 509 - 519
  • [8] Truthful Incentive Mechanisms for K-Anonymity Location Privacy
    Yang, Dejun
    Fang, Xi
    Xue, Guoliang
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2994 - 3002
  • [9] Subspace k-anonymity algorithm for location-privacy preservation based on locality-sensitive hashing
    Wang, Xiaohan
    Luo, Yonglong
    Liu, Shiyang
    Wang, Taochun
    Han, Huihui
    [J]. INTELLIGENT DATA ANALYSIS, 2019, 23 (05) : 1167 - 1185
  • [10] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu, Hai
    Li, Xing-Hua
    Luo, Bin
    Wang, Yun-Wei
    Ren, Yan-Bing
    Ma, Jian-Feng
    Ding, Hong-Fa
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960