Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing

被引:0
|
作者
Foerster, David [1 ]
Loehr, Hans [1 ]
Kargl, Frank [2 ,3 ]
机构
[1] Robert Bosch GmbH, Gerlingen, Germany
[2] Univ Ulm, D-89069 Ulm, Germany
[3] Univ Twente, POB 217, NL-7500 AE Enschede, Netherlands
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Protection of location privacy by reducing the accuracy of location data, until a desired level of privacy (e.g., measured as k-anonymity) is reached, is a well-known concept that is typically implemented using a privacy proxy. To eliminate the risks associated with a central, trusted party, we propose a generic method to enforce k-anonymity of location data in a decentralized way, using a distributed secret sharing algorithm and the concept of location and time specific keys. We describe our method in the context of a system for privacy-friendly traffic flow analysis, in which participants report origin, destination, start and end time of their trips. In order to protect their privacy the accuracy of time and location information is reduced, until it applies to at least k distinct trips. No trusted, central party is required to determine how much the accuracy of each trip report must be reduced. The participants establish location and time specific keys via vehicle-to-vehicle (V2V) communication at the beginning and end of their trips. They use these keys to encrypt trip reports with several levels of accuracy, and uploaded them to a central, untrusted database. The keys are published using a secret sharing algorithm that allows their reconstruction, once at least k shares of the same key have been uploaded. Consequently, trip reports become available automatically, after k vehicles have made "the same trip"(same origin, destination, start and end time) with respect to a certain accuracy level.
引用
收藏
页码:279 / 286
页数:8
相关论文
共 50 条
  • [21] k-anonymity:: A model for protecting privacy
    Sweeney, L
    [J]. INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [22] Location Privacy in Buildings: A 3-Dimensional K-anonymity Model
    Zhu, Yujia
    Zhai, Lidong
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN), 2014, : 195 - 200
  • [23] Location K-anonymity in indoor spaces
    Kim, Joon-Seok
    Li, Ki-Joune
    [J]. GEOINFORMATICA, 2016, 20 (03) : 415 - 451
  • [24] Mastering data privacy: leveraging K-anonymity for robust health data sharing
    Karagiannis, Stylianos
    Ntantogian, Christoforos
    Magkos, Emmanouil
    Tsohou, Aggeliki
    Ribeiro, Luis Landeiro
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2189 - 2201
  • [25] Location K-anonymity in indoor spaces
    Joon-Seok Kim
    Ki-Joune Li
    [J]. GeoInformatica, 2016, 20 : 415 - 451
  • [26] LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection
    Wang, Yunfeng
    Li, Mingzhen
    Luo, Shoushan
    Xin, Yang
    Zhu, Hongliang
    Chen, Yuling
    Yang, Guangcan
    Yang, Yixian
    [J]. IEEE ACCESS, 2019, 7 : 182886 - 182905
  • [27] Achieving Effective k-Anonymity for Query Privacy in Location-Based Services
    Wang, Jinbao
    Li, Yingshu
    Yang, Donghua
    Gao, Hong
    Luo, Guangchun
    Li, Jianzhong
    [J]. IEEE ACCESS, 2017, 5 : 24580 - 24592
  • [28] An Encryption-based K-anonymity Approach for Location Privacy Protection in LBS
    Jia, Jinying
    Zhang, Fengli
    Wu, Rongchun
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1852 - 1855
  • [29] A trusted de-swinging k-anonymity scheme for location privacy protection
    Manxiang Yang
    Baopeng Ye
    Yuling Chen
    Tao Li
    Yixian Yang
    Xiaobin Qian
    Xiaomei Yu
    [J]. Journal of Cloud Computing, 11
  • [30] A semantic k-anonymity privacy protection method for publishing sparse location data
    Yang, Xudong
    Gao, Ling
    Wang, Hai
    Zheng, Jie
    Guo, Hongbo
    [J]. 2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2019, : 216 - 222