Privacy Protection Model for Location-Based Services

被引:4
|
作者
Ni, Lihao [1 ,2 ]
Liu, Yanshen [2 ]
Liu, Yi [2 ]
机构
[1] Cent China Normal Univ, Natl Engn Res Ctr E Leaming NERCEL, Wuhan, Peoples R China
[2] Cent China Normal Univ, Hubei Res Ctr Educ Informationizat, Wuhan, Peoples R China
来源
关键词
Geohash-Encoding; Location-Based Services; Memcached Server Cluster; Point of Interest; Privacy Protection Model;
D O I
10.3745/JIPS.04.0163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Solving the disclosure problem of sensitive information with the k-nearest neighbor query, location dummy technique, or interfering data in location-based services (LBSs) is a new research topic. Although they reduced security threats, previous studies will be ineffective in the case of sparse users or K-successive privacy, and additional calculations will deteriorate the performance of LBS application systems. Therefore, a model is proposed herein, which is based on geohash-encoding technology instead of latitude and longitude, memcached server cluster, encryption and decryption, and authentication. Simulation results based on PHP and MySQL show that the model offers approximately 10x speedup over the conventional approach. Two problems are solved using the model: sensitive information in LBS application is not disclosed, and the relationship between an individual and a track is not leaked.
引用
收藏
页码:96 / 112
页数:17
相关论文
共 50 条
  • [31] Location Privacy Issues in Location-Based Services
    AlShalaan, Manal
    AlSubaie, Reem
    Latif, Rabia
    2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 129 - 132
  • [32] Location privacy of users in location-based services
    Yanagisawa, Yutaka
    Kido, Hidetoshi
    Satoh, Tetsuji
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 1 - +
  • [33] Location privacy of users in location-based services
    Yanagisawa, Yutaka
    Kido, Hidetoshi
    Satoh, Tetsuji
    2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 66 - +
  • [34] Privacy Protection Through k-anonymity in Location-based Services
    Zuberi, Rubina Shahin
    Lall, Brejesh
    Ahmad, Syed Naseem
    IETE TECHNICAL REVIEW, 2012, 29 (03) : 196 - 201
  • [35] Trust and privacy in location-based services
    Jorns, O.
    Quirchmayr, G.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2010, 127 (05): : 151 - 155
  • [36] Location-Based Services and Privacy in Airports
    Hansen, John Paulin
    Alapetite, Alexandre
    Andersen, Henning Boje
    Malmborg, Lone
    Thommesen, Jacob
    HUMAN-COMPUTER INTERACTION - INTERACT 2009, PT I, 2009, 5726 : 168 - +
  • [37] "Don't trust anyone": Privacy protection for location-based services
    Hashem, Tanzima
    Kulik, Lars
    PERVASIVE AND MOBILE COMPUTING, 2011, 7 (01) : 44 - 59
  • [38] Privacy Preservation in Location-Based Services
    Wang, Shengling
    Hu, Qin
    Sun, Yunchuan
    Huang, Jianhui
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (03) : 134 - 140
  • [39] A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
    Hasan, Chowdhury S.
    Ahamed, Sheikh I.
    Tanviruzzaman, Mohammad
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1 - 10
  • [40] Privacy protection in location-based services through a public-key privacy homomorphism
    Solanas, Agusti
    Martinez-Balleste, Antoni
    Public Key Infrastructure, Proceedings, 2007, 4582 : 362 - 368