Location Privacy Protection Scheme for LBS in IoT

被引:3
|
作者
Li, Hongtao [1 ,2 ]
Xue, Xingsi [3 ]
Li, Zhiying [1 ]
Li, Long [4 ]
Xiong, Jinbo [5 ]
机构
[1] Shanxi Normal Univ, Coll Math & Comp Sci, Linfen 041000, Shanxi, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[3] Fujian Univ Technol, Sch Comp Sci & Math, Fuzhou 350118, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[5] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350118, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTHENTICATION PROTOCOL; MIX-ZONES; ANONYMITY;
D O I
10.1155/2021/9948543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of Internet of Things (IoT) technology has promoted location-based service (LBS) applications. Users can enjoy various conveniences brought by LBS by providing location information to LBS. However, it also brings potential privacy threats to location information. Location data that contains private information is often transmitted among IoT networks in LBS, and such privacy information should be protected. In order to solve the problem of location privacy leakage in LBS, a location privacy protection scheme based on k-anonymity is proposed in this paper, in which the Geohash coding model and Voronoi graph are used as grid division principles. We adopt the client-server-to-user (CS2U) model to protect the user's location data on the client side and the server side, respectively. On the client side, the Geohash algorithm is proposed, which converts the user's location coordinates into a Geohash code of the corresponding length. On the server side, the Geohash code generated by the user is inserted into the prefix tree, the prefix tree is used to find the nearest neighbors according to the characteristics of the coded similar prefixes, and the Voronoi diagram is used to divide the area units to complete the pruning. Then, using the Geohash coding model and the Voronoi diagram grid division principle, the G-V anonymity algorithm is proposed to find k neighbors in an anonymous area so that the user's location data meets the k-anonymity requirement in the area unit, thereby achieving anonymity protection of location privacy. Theoretical analysis and experimental results show that our method is effective in terms of privacy and data quality while reducing the time of data anonymity.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] A Hybrid Location Privacy Solution for Mobile LBS
    Gupta, Ruchika
    Rao, Udai Pratap
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [22] A LOCATION PRIVACY PRESERVING ALGORITHM FOR MOBILE LBS
    Li, Wei
    Jiao, Wei
    Li, Guangye
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 548 - 552
  • [23] Privacy Preserving Scheme for Location and Content Protection in Location-Based Services
    Peng, Tao
    Liu, Qin
    Wang, Guojun
    Xiang, Yang
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 26 - 38
  • [24] A Model of LBS Privacy Protection Based on Collaboration
    Li, Suduo
    Huang, Jinglian
    Li, Yingxing
    Deng, Jingwei
    Deng, Kaiying
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 172 - +
  • [25] A novel location privacy-preserving scheme based on l-queries for continuous LBS
    Ye, Ayong
    Li, Yacheng
    Xu, Li
    COMPUTER COMMUNICATIONS, 2017, 98 : 1 - 10
  • [26] Perceived K-value Location Privacy Protection Method Based on LBS in Augmented Reality
    Yang, Yang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 25 - 32
  • [27] Location Privacy Protection for UAVs in Package Delivery and IoT Data Collection
    Enayati, Saeede
    Goeckel, Dennis
    Houmansadr, Amir
    Pishro-Nik, Hossein
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) : 20586 - 20601
  • [28] Location Privacy Protection Scheme Without Trusted Third Party
    Zhang, Mingyue
    Jin, Tong
    Wang, Guohong
    Wang, Tian
    Zhang, Gongxuan
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [29] A User Location Privacy Protection Mechanism for LBS using Third Party-based Architectures
    Abi-Char, Pierre E.
    2022 45TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING, TSP, 2022, : 139 - 145
  • [30] A New Location Privacy Protection Scheme for Multi-users
    Wang J.
    Han Y.
    Chen J.
    Yang X.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2020, 52 (05): : 178 - 185