Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing

被引:0
|
作者
Foerster, David [1 ]
Loehr, Hans [1 ]
Kargl, Frank [2 ,3 ]
机构
[1] Robert Bosch GmbH, Gerlingen, Germany
[2] Univ Ulm, D-89069 Ulm, Germany
[3] Univ Twente, POB 217, NL-7500 AE Enschede, Netherlands
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Protection of location privacy by reducing the accuracy of location data, until a desired level of privacy (e.g., measured as k-anonymity) is reached, is a well-known concept that is typically implemented using a privacy proxy. To eliminate the risks associated with a central, trusted party, we propose a generic method to enforce k-anonymity of location data in a decentralized way, using a distributed secret sharing algorithm and the concept of location and time specific keys. We describe our method in the context of a system for privacy-friendly traffic flow analysis, in which participants report origin, destination, start and end time of their trips. In order to protect their privacy the accuracy of time and location information is reduced, until it applies to at least k distinct trips. No trusted, central party is required to determine how much the accuracy of each trip report must be reduced. The participants establish location and time specific keys via vehicle-to-vehicle (V2V) communication at the beginning and end of their trips. They use these keys to encrypt trip reports with several levels of accuracy, and uploaded them to a central, untrusted database. The keys are published using a secret sharing algorithm that allows their reconstruction, once at least k shares of the same key have been uploaded. Consequently, trip reports become available automatically, after k vehicles have made "the same trip"(same origin, destination, start and end time) with respect to a certain accuracy level.
引用
收藏
页码:279 / 286
页数:8
相关论文
共 50 条
  • [41] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
    Wang, Hui
    Huang, Haiping
    Qin, Yuxiang
    Wang, Yunqi
    Wu, Min
    [J]. ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (06)
  • [42] Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity
    Chai, Guofei
    Xu, Miao
    Xu, Wenyuan
    Lin, Zhiyun
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [43] kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity
    Kisilevich, Slava
    Elovici, Yuval
    Shapira, Bracha
    Rokach, Lior
    [J]. PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 63 - +
  • [44] k-anonymity based location privacy protection method for location-based services in Internet of Thing
    Wang, Bo
    Guo, Yina
    Li, Hongtao
    Li, Zhiying
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
  • [45] Multidimensional k-anonymity for Protecting Privacy using Nearest Neighborhood Strategy
    Patil, B. B.
    Patankar, A. J.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 532 - 535
  • [46] Protecting query privacy with differentially private k-anonymity in location-based services
    Jinbao Wang
    Zhipeng Cai
    Yingshu Li
    Donghua Yang
    Ji Li
    Hong Gao
    [J]. Personal and Ubiquitous Computing, 2018, 22 : 453 - 469
  • [47] AnonTwist: Nearest Neighbor Querying with Both Location Privacy and K-anonymity for Mobile Users
    Wang, Song
    Wang, X. Sean
    [J]. MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 443 - 448
  • [48] A Location Privacy Protection Algorithm Based on Double K-Anonymity in the Social Internet of Vehicles
    Xing, Ling
    Jia, Xiaofan
    Gao, Jianping
    Wu, Honghai
    [J]. IEEE COMMUNICATIONS LETTERS, 2021, 25 (10) : 3199 - 3203
  • [49] Protecting query privacy with differentially private k-anonymity in location-based services
    Wang, Jinbao
    Cai, Zhipeng
    Li, Yingshu
    Yang, Donghua
    Li, Ji
    Gao, Hong
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (03) : 453 - 469
  • [50] Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity
    Jiang, Nanlan
    Zhai, Yinan
    Wang, Yujun
    Yin, Xuesong
    Yang, Sai
    Xu, Pingping
    [J]. SENSORS, 2024, 24 (18)