LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

被引:6
|
作者
Chen, Ming [1 ]
Li, Wenzhong [1 ]
Chen, Xu [2 ,3 ]
Li, Zhuo [4 ]
Lu, Sanglu [1 ]
Chen, Daoxu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
[2] Univ Gottingen, Inst Comp Sci, Gottingen, Germany
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Beijing Informat Sci & Technol Univ, Sch Comp Sci & Tecnol, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
SMARTPHONE COLLABORATION; INCENTIVE MECHANISMS; DATA-ACQUISITION;
D O I
10.1155/2016/7164126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed the rapid growth of location-based services (LBSs) for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS) based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users' location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache contentmaintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Betweenness Centrality Based k-Anonymity for Privacy Preserving in Social Networks
    Tian, Hui
    Lu, Yue
    Liu, Jingtian
    Yu, Jingjing
    16TH INTERNATIONAL CONFERENCE ON ADVANCES IN MOBILE COMPUTING AND MULTIMEDIA (MOMM 2018), 2014, : 3 - 7
  • [22] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [23] Truthful Incentive Mechanisms for K-Anonymity Location Privacy
    Yang, Dejun
    Fang, Xi
    Xue, Guoliang
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2994 - 3002
  • [24] Privacy Protection Through k-anonymity in Location-based Services
    Zuberi, Rubina Shahin
    Lall, Brejesh
    Ahmad, Syed Naseem
    IETE TECHNICAL REVIEW, 2012, 29 (03) : 196 - 201
  • [25] A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services
    Zhang, Shaobo
    Li, Xiong
    Tan, Zhiyuan
    Peng, Tao
    Wang, Guojun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 40 - 50
  • [26] Research on k-anonymity privacy protection scheme based on bilinear pairings
    Song Cheng
    Zhang Yadong
    Wang Lei
    Liu Zhizhong
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2018, 25 (05) : 12 - 19
  • [27] Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation
    Casino, Fran
    Domingo-Ferrer, Josep
    Patsakis, Constantinos
    Puig, Domenec
    Solanas, Agusti
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 490 - 497
  • [28] Fine-grained k-anonymity for privacy preserving in cloud
    Arava, Karuna
    Lingamgunta, Sumalatha
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (04) : 241 - 247
  • [29] K-Anonymity Based Approach For Privacy-Preserving Web Service Selection
    Ammar, Nariman
    Malik, Zaki
    Medjahed, Brahim
    Alodib, Mohammed
    2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, : 281 - 288
  • [30] A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity
    Chakravarthy, Srinivasa L.
    Kumari, Valli V.
    Sarojini, Ch
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 889 - 896