LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

被引:6
|
作者
Chen, Ming [1 ]
Li, Wenzhong [1 ]
Chen, Xu [2 ,3 ]
Li, Zhuo [4 ]
Lu, Sanglu [1 ]
Chen, Daoxu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
[2] Univ Gottingen, Inst Comp Sci, Gottingen, Germany
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Beijing Informat Sci & Technol Univ, Sch Comp Sci & Tecnol, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
SMARTPHONE COLLABORATION; INCENTIVE MECHANISMS; DATA-ACQUISITION;
D O I
10.1155/2016/7164126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed the rapid growth of location-based services (LBSs) for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS) based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users' location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache contentmaintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity
    Kisilevich, Slava
    Elovici, Yuval
    Shapira, Bracha
    Rokach, Lior
    PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 63 - +
  • [42] User k-anonymity for privacy preserving data mining of query logs
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    Erola, Arnau
    Castella-Roca, Jordi
    INFORMATION PROCESSING & MANAGEMENT, 2012, 48 (03) : 476 - 487
  • [43] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    B. Sowmiya
    E. Poovammal
    Wireless Personal Communications, 2022, 127 : 1359 - 1376
  • [44] k-anonymity based framework for privacy preserving data collection in wireless sensor networks
    Bahsi, Hayretdin
    Levi, Albert
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2010, 18 (02) : 241 - 271
  • [45] A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
    Sowmiya, B.
    Poovammal, E.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1359 - 1376
  • [46] Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model
    Bhaladhare, Pawan R.
    Jinwala, Devesh C.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (01) : 63 - 78
  • [47] Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing
    Foerster, David
    Loehr, Hans
    Kargl, Frank
    2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, : 279 - 286
  • [48] Protecting query privacy with differentially private k-anonymity in location-based services
    Jinbao Wang
    Zhipeng Cai
    Yingshu Li
    Donghua Yang
    Ji Li
    Hong Gao
    Personal and Ubiquitous Computing, 2018, 22 : 453 - 469
  • [49] Protecting query privacy with differentially private k-anonymity in location-based services
    Wang, Jinbao
    Cai, Zhipeng
    Li, Yingshu
    Yang, Donghua
    Li, Ji
    Gao, Hong
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (03) : 453 - 469
  • [50] Clustering based k-anonymity algorithm for privacy preservation
    Ni S.
    Xie M.
    Qian Q.
    International Journal of Network Security, 2017, 19 (06) : 1062 - 1071