A Distributed k-Anonymity Protocol for Location Privacy

被引:0
|
作者
Zhong, Ge [1 ]
Hengartner, Urs [1 ]
机构
[1] Univ Waterloo, Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person's location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking the person's location such that there are at least k - 1 other people within the cloaked area and by revealing only the cloaked area to a location-based service. Previous research has explored two ways of cloaking: First, have a central server that knows everybody's location determine the cloaked area. However, this server needs to be trusted by all users and is a single point of failure. Second, have users jointly determine the cloaked area. However, this approach requires that all users trust each other, which will likely not hold in practice. We propose a distributed approach that does not have these drawbacks. Our approach assumes that there are multiple servers, each deployed by a different organization. A user's location is known to only one of the servers (e.g., to her cellphone provider), so there is no single entity that knows everybody's location. With the help of cryptography, the servers and a user jointly determine whether the k-anonymity property holds for the user's area, without the servers learning any additional information, not even whether the property holds. A user learns whether the k-anonymity property is satisfied and no other information. The evaluation of our sample implementation shows that our distributed k-anonymity protocol is sufficiently fast to be practical. Moreover, our protocol integrates well with existing infrastructures for location-based services, as opposed to the previous research.
引用
收藏
页码:253 / 262
页数:10
相关论文
共 50 条
  • [1] SocialCloaking: a Distributed Architecture for K-anonymity Location Privacy Protection
    Hwang, Ren-Hung
    Huang, Fu-Hui
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 247 - 251
  • [2] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu, Hai
    Li, Xing-Hua
    Luo, Bin
    Wang, Yun-Wei
    Ren, Yan-Bing
    Ma, Jian-Feng
    Ding, Hong-Fa
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
  • [3] Privacy-preserving distributed k-anonymity
    Jiang, W
    Clifton, C
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 166 - 177
  • [4] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
  • [5] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    [J]. IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [6] Truthful Incentive Mechanisms for K-Anonymity Location Privacy
    Yang, Dejun
    Fang, Xi
    Xue, Guoliang
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2994 - 3002
  • [7] A K-Anonymity Based Schema for Location Privacy Preservation
    Fei, Fan
    Li, Shu
    Dai, Haipeng
    Hu, Chunhua
    Dou, Wanchun
    Ni, Qiang
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02): : 156 - 167
  • [8] LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme
    Chen, Ming
    Li, Wenzhong
    Chen, Xu
    Li, Zhuo
    Lu, Sanglu
    Chen, Daoxu
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [9] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [10] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16