LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

被引:6
|
作者
Chen, Ming [1 ]
Li, Wenzhong [1 ]
Chen, Xu [2 ,3 ]
Li, Zhuo [4 ]
Lu, Sanglu [1 ]
Chen, Daoxu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
[2] Univ Gottingen, Inst Comp Sci, Gottingen, Germany
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Beijing Informat Sci & Technol Univ, Sch Comp Sci & Tecnol, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
SMARTPHONE COLLABORATION; INCENTIVE MECHANISMS; DATA-ACQUISITION;
D O I
10.1155/2016/7164126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed the rapid growth of location-based services (LBSs) for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS) based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users' location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache contentmaintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Trajectory Privacy-Preserving Approach for Consecutive Queries Based on K-Anonymity
    Zhu, Lin
    FUZZY SYSTEMS AND DATA MINING III (FSDM 2017), 2017, 299 : 416 - 421
  • [32] Achieving Effective k-Anonymity for Query Privacy in Location-Based Services
    Wang, Jinbao
    Li, Yingshu
    Yang, Donghua
    Gao, Hong
    Luo, Guangchun
    Li, Jianzhong
    IEEE ACCESS, 2017, 5 : 24580 - 24592
  • [33] An Encryption-based K-anonymity Approach for Location Privacy Protection in LBS
    Jia, Jinying
    Zhang, Fengli
    Wu, Rongchun
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1852 - 1855
  • [34] Achieving k-anonymity in Privacy-Aware Location-Based Services
    Niu, Ben
    Li, Qinghua
    Zhu, Xiaoyan
    Cao, Guohong
    Li, Hui
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 754 - 762
  • [35] Location privacy: going beyond K-anonymity, cloaking and anonymizers
    Khoshgozaran, Ali
    Shahabi, Cyrus
    Shirani-Mehr, Houtan
    KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 26 (03) : 435 - 465
  • [36] Location privacy: going beyond K-anonymity, cloaking and anonymizers
    Ali Khoshgozaran
    Cyrus Shahabi
    Houtan Shirani-Mehr
    Knowledge and Information Systems, 2011, 26 : 435 - 465
  • [37] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [38] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
  • [39] k-anonymity based location privacy protection method for location-based services in Internet of Thing
    Wang, Bo
    Guo, Yina
    Li, Hongtao
    Li, Zhiying
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
  • [40] Medical Ethics Privacy Protection Based on Combining Distributed Randomization With K-anonymity
    Xie, Yonghong
    He, Qing
    Zhang, Dezheng
    Hu, Xiaojing
    2015 8th International Congress on Image and Signal Processing (CISP), 2015, : 1577 - 1582