Evaluation of an Entropy-based k-Anonymity Model for Location Based Services

被引:0
|
作者
Sharma, Varun [1 ]
Shen, Chien-Chung [1 ]
机构
[1] Univ Delaware, Dept Comp & Informat Sci, Newark, DE 19716 USA
关键词
Location Based Services (LBS); k-anonymity; entropy; privacy; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the market for cellular telephones, and other mobile devices, keeps growing, the demand for new services arises to attract the end users. Location Based Services (LBS) are becoming important to the success and attractiveness of next generation wireless systems. To access location-based services, mobile users have to disclose their location information to service providers and third party applications. This raises privacy concerns, which have hampered the widespread use of LBS. Location privacy mechanisms include Anonymization, Obfuscation, Policy Based Scheme, k-anonymity and Adding Fake Events. However most existing solutions adopt the k-anonymity principle. We propose an entropy based location privacy mechanism to protect user information against attackers. We look at the effectiveness of the technique in a continuous LBS scenarios, i.e., where users are moving and recurrently requesting for Location Based Services, we also evaluate the overall performance of the system with its drawbacks.
引用
下载
收藏
页码:374 / 378
页数:5
相关论文
共 50 条
  • [1] Dummy Location Selection Scheme for K-anonymity in Location based Services
    Wu, Di
    Zhang, Yu
    Liu, Yinlong
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 441 - 448
  • [2] Privacy Protection Through k-anonymity in Location-based Services
    Zuberi, Rubina Shahin
    Lall, Brejesh
    Ahmad, Syed Naseem
    IETE TECHNICAL REVIEW, 2012, 29 (03) : 196 - 201
  • [3] k-anonymity based location privacy protection method for location-based services in Internet of Thing
    Wang, Bo
    Guo, Yina
    Li, Hongtao
    Li, Zhiying
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
  • [4] Achieving Effective k-Anonymity for Query Privacy in Location-Based Services
    Wang, Jinbao
    Li, Yingshu
    Yang, Donghua
    Gao, Hong
    Luo, Guangchun
    Li, Jianzhong
    IEEE ACCESS, 2017, 5 : 24580 - 24592
  • [5] Achieving k-anonymity in Privacy-Aware Location-Based Services
    Niu, Ben
    Li, Qinghua
    Zhu, Xiaoyan
    Cao, Guohong
    Li, Hui
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 754 - 762
  • [6] A Game-Theoretic Approach for Achieving k-Anonymity in Location Based Services
    Liu, Xinxin
    Liu, Kaikai
    Guo, Linke
    Li, Xiaolin
    Fang, Yuguang
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2985 - 2993
  • [7] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [8] A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services
    Wang, Tian
    Xu, Linli
    Zhang, Mingyue
    Zhang, Huanhuan
    Zhang, Gongxuan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (05)
  • [9] A K-anonymity Clustering Algorithm Based on the Information Entropy
    Zhang, Jianpei
    Zhao, Ying
    Yang, Yue
    Yang, Jing
    PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2014, : 319 - 324
  • [10] A K-Anonymity Based Schema for Location Privacy Preservation
    Fei, Fan
    Li, Shu
    Dai, Haipeng
    Hu, Chunhua
    Dou, Wanchun
    Ni, Qiang
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02): : 156 - 167