An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services

被引:9
|
作者
Du, Yongwen [1 ]
Cai, Gang [1 ]
Zhang, Xuejun [1 ]
Liu, Ting [1 ]
Jiang, Jinghua [2 ]
机构
[1] Lanzhou Jiaotong Univ, Sch Elect & Informat Engn, Lanzhou 730000, Gansu, Peoples R China
[2] Baidu Inc, Baidu Bldg,10 Shangdi 10th St, Beijing 100000, Peoples R China
关键词
Internet of Things; location-based service; dummy location selection; location privacy; ACHIEVING K-ANONYMITY; OF-THINGS; PROTECTION; SECURITY; IOT;
D O I
10.3390/info10090278
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of GPS-equipped smart mobile devices and mobile computing, location-based services (LBS) are increasing in popularity in the Internet of Things (IoT). Although LBS provide enormous benefits to users, they inevitably introduce some significant privacy concerns. To protect user privacy, a variety of location privacy-preserving schemes have been recently proposed. Among these schemes, the dummy-based location privacy-preserving (DLP) scheme is a widely used approach to achieve location privacy for mobile users. However, the computation cost of the existing dummy-based location privacy-preserving schemes is too high to meet the practical requirements of resource-constrained IoT devices. Moreover, the DLP scheme is inadequate to resist against an adversary with side information. Thus, how to effectively select a dummy location is still a challenge. In this paper, we propose a novel lightweight dummy-based location privacy-preserving scheme, named the enhanced dummy-based location privacy-preserving(Enhanced-DLP) to address this challenge by considering both computational costs and side information. Specifically, the Enhanced-DLP adopts an improved greedy scheme to efficiently select dummy locations to form a k-anonymous set. A thorough security analysis demonstrated that our proposed Enhanced-DLP can protect user privacy against attacks. We performed a series of experiments to verify the effectiveness of our Enhanced-DLP. Compared with the existing scheme, the Enhanced-DLP can obtain lower computational costs for the selection of a dummy location and it can resist side information attacks. The experimental results illustrate that the Enhanced-DLP scheme can effectively be applied to protect the user's location privacy in IoT applications and services.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] More Efficient and Verifiable Privacy-Preserving Aggregation Scheme for Internet of Things-Based Federated Learning
    Shi, Rongquan
    Wei, Lifei
    Zhang, Lei
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [22] Efficient and privacy-preserving location-based services over the cloud
    Yadav, Vijay Kumar
    Verma, Shekhar
    Venkatesan, S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05): : 3175 - 3192
  • [23] Efficient and privacy-preserving location-based services over the cloud
    Vijay Kumar Yadav
    Shekhar Verma
    S. Venkatesan
    [J]. Cluster Computing, 2022, 25 : 3175 - 3192
  • [24] A context-aware scheme for privacy-preserving location-based services
    Pingley, Aniket
    Yu, Wei
    Zhang, Nan
    Fu, Xinwen
    Zhao, Wei
    [J]. COMPUTER NETWORKS, 2012, 56 (11) : 2551 - 2568
  • [25] Efficient Routing Protocol for Location Privacy Preserving in Internet of Things
    Kaur, Rajwinder
    Verma, Karan
    Jain, Shelendra Kumar
    Kesswani, Nishtha
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : 70 - 85
  • [26] Time Obfuscation-Based Privacy-Preserving Scheme for Location-Based Services
    Li, Fenghua
    Wan, Sheng
    Niu, Ben
    Li, Hui
    He, Yuanyuan
    [J]. 2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [27] A Caching-Based Privacy-Preserving Scheme for Continuous Location- Based Services
    Zhang, Shaobo
    Liu, Qin
    Wang, Guojun
    [J]. SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 73 - 82
  • [28] EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services
    Niu, Ben
    Zhu, Xiaoyan
    Lei, Xiaosan
    Zhang, Weidong
    Li, Hui
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2139 - 2144
  • [29] An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment
    Liu, Yu
    Xue, Kaiping
    He, Peixuan
    Wei, David S. L.
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07) : 6634 - 6646
  • [30] Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare
    Das, Sangjukta
    Namasudra, Suyel
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (11)