LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

被引:6
|
作者
Chen, Ming [1 ]
Li, Wenzhong [1 ]
Chen, Xu [2 ,3 ]
Li, Zhuo [4 ]
Lu, Sanglu [1 ]
Chen, Daoxu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
[2] Univ Gottingen, Inst Comp Sci, Gottingen, Germany
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Beijing Informat Sci & Technol Univ, Sch Comp Sci & Tecnol, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
SMARTPHONE COLLABORATION; INCENTIVE MECHANISMS; DATA-ACQUISITION;
D O I
10.1155/2016/7164126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed the rapid growth of location-based services (LBSs) for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS) based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users' location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache contentmaintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu H.
    Li X.-H.
    Luo B.
    Wang Y.-W.
    Ren Y.-B.
    Ma J.-F.
    Ding H.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
  • [2] Preserving Location Privacy based on Distributed Cache Pushing
    Chen, Ming
    Li, Wenzhong
    Li, Zhuo
    Lu, Sanglu
    Chen, Daoxu
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 3456 - 3461
  • [3] Privacy-preserving distributed k-anonymity
    Jiang, W
    Clifton, C
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 166 - 177
  • [4] A Distributed k-Anonymity Protocol for Location Privacy
    Zhong, Ge
    Hengartner, Urs
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
  • [5] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
  • [6] SocialCloaking: a Distributed Architecture for K-anonymity Location Privacy Protection
    Hwang, Ren-Hung
    Huang, Fu-Hui
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 247 - 251
  • [7] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [8] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
    Wang, Hui
    Huang, Haiping
    Qin, Yuxiang
    Wang, Yunqi
    Wu, Min
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (06)
  • [9] A K-Anonymity Based Schema for Location Privacy Preservation
    Fei, Fan
    Li, Shu
    Dai, Haipeng
    Hu, Chunhua
    Dou, Wanchun
    Ni, Qiang
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02): : 156 - 167
  • [10] A personalized k-anonymity privacy preserving method
    Xu, Yong
    Qin, Xiaolin
    Yang, Zhongxue
    Yang, Yitao
    Li, Kun
    Journal of Information and Computational Science, 2013, 10 (01): : 139 - 155