Location Privacy Protection Scheme for LBS in IoT

被引:3
|
作者
Li, Hongtao [1 ,2 ]
Xue, Xingsi [3 ]
Li, Zhiying [1 ]
Li, Long [4 ]
Xiong, Jinbo [5 ]
机构
[1] Shanxi Normal Univ, Coll Math & Comp Sci, Linfen 041000, Shanxi, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[3] Fujian Univ Technol, Sch Comp Sci & Math, Fuzhou 350118, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[5] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350118, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTHENTICATION PROTOCOL; MIX-ZONES; ANONYMITY;
D O I
10.1155/2021/9948543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of Internet of Things (IoT) technology has promoted location-based service (LBS) applications. Users can enjoy various conveniences brought by LBS by providing location information to LBS. However, it also brings potential privacy threats to location information. Location data that contains private information is often transmitted among IoT networks in LBS, and such privacy information should be protected. In order to solve the problem of location privacy leakage in LBS, a location privacy protection scheme based on k-anonymity is proposed in this paper, in which the Geohash coding model and Voronoi graph are used as grid division principles. We adopt the client-server-to-user (CS2U) model to protect the user's location data on the client side and the server side, respectively. On the client side, the Geohash algorithm is proposed, which converts the user's location coordinates into a Geohash code of the corresponding length. On the server side, the Geohash code generated by the user is inserted into the prefix tree, the prefix tree is used to find the nearest neighbors according to the characteristics of the coded similar prefixes, and the Voronoi diagram is used to divide the area units to complete the pruning. Then, using the Geohash coding model and the Voronoi diagram grid division principle, the G-V anonymity algorithm is proposed to find k neighbors in an anonymous area so that the user's location data meets the k-anonymity requirement in the area unit, thereby achieving anonymity protection of location privacy. Theoretical analysis and experimental results show that our method is effective in terms of privacy and data quality while reducing the time of data anonymity.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] LBS-oriented location privacy protection model and scheme
    Yang, Song-Tao
    Ma, Chun-Guang
    Zhou, Chang-Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 (08): : 116 - 124
  • [2] LBS user location privacy protection scheme based on trajectory similarity
    Qian, Kun
    Li, Xiaohui
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [3] LBS user location privacy protection scheme based on trajectory similarity
    Kun Qian
    Xiaohui Li
    Scientific Reports, 12
  • [4] A New Scheme of LBS Privacy Protection
    Ming, Tang
    Wu, Qianhong
    Zhang Guoping
    He Lili
    Huan-guo, Zhang
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5219 - +
  • [5] A Novel Method for Location Privacy Protection in LBS Applications
    Lu, Dan
    Han, Qilong
    Zhang, Kejia
    Zhang, Haitao
    Gull, Bisma
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [6] LBS-oriented location privacy protection model
    Zhang, Guoping
    Fan, Xing
    Tang, Ming
    Zhang, Xinyu
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (09): : 45 - 49
  • [7] Research on Cloud-Based LBS and Location Privacy Protection
    Yan, Yan
    Wang, Wan Jun
    INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, : 9 - 15
  • [8] LPS for LBS: Location-Privacy Scheme for Location-Based Services
    Doumiati, Salam
    Al Choikani, Tarek
    Artail, Hassan
    2014 IEEE/ACS 11TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2014, : 449 - 456
  • [9] A source location privacy protection scheme based on ring-loop routing for the IoT
    Wang, Hao
    Han, Guangjie
    Zhou, Lina
    Ansere, James Adu
    Zhang, Wenbo
    COMPUTER NETWORKS, 2019, 148 : 142 - 150
  • [10] Study on Personalized Location Privacy Protection Algorithms for Continuous Queries in LBS
    Gan, Jiayi
    Xu, Hongyun
    Xu, Mengzhen
    Tian, Kai
    Zheng, Yaohui
    Zhang, Yong
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 98 - 108