Evaluation of an Entropy-based k-Anonymity Model for Location Based Services

被引:0
|
作者
Sharma, Varun [1 ]
Shen, Chien-Chung [1 ]
机构
[1] Univ Delaware, Dept Comp & Informat Sci, Newark, DE 19716 USA
关键词
Location Based Services (LBS); k-anonymity; entropy; privacy; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the market for cellular telephones, and other mobile devices, keeps growing, the demand for new services arises to attract the end users. Location Based Services (LBS) are becoming important to the success and attractiveness of next generation wireless systems. To access location-based services, mobile users have to disclose their location information to service providers and third party applications. This raises privacy concerns, which have hampered the widespread use of LBS. Location privacy mechanisms include Anonymization, Obfuscation, Policy Based Scheme, k-anonymity and Adding Fake Events. However most existing solutions adopt the k-anonymity principle. We propose an entropy based location privacy mechanism to protect user information against attackers. We look at the effectiveness of the technique in a continuous LBS scenarios, i.e., where users are moving and recurrently requesting for Location Based Services, we also evaluate the overall performance of the system with its drawbacks.
引用
收藏
页码:374 / 378
页数:5
相关论文
共 50 条
  • [21] K-Anonymity Based on Sensitive Tuples
    Hu, Xinping
    Sun, Zhihui
    Wu, Yingjie
    Hu, Wenyu
    Dong, Jiancheng
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 91 - +
  • [22] An Encryption-based K-anonymity Approach for Location Privacy Protection in LBS
    Jia, Jinying
    Zhang, Fengli
    Wu, Rongchun
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1852 - 1855
  • [23] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
  • [24] An Improved Location-Based Service Authentication Algorithm with Personalized K-Anonymity
    Ye, Yu-Meng
    Pan, Chang-Chun
    Yang, Gen-Ke
    CHINA SATELLITE NAVIGATION CONFERENCE (CSNC) 2016 PROCEEDINGS, VOL I, 2016, 388 : 257 - 266
  • [25] The Analysis of Typical Algorithms Based on K-Anonymity
    Fan Tigui
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 327 - 330
  • [26] K-Anonymity Algorithm Based on Improved Clustering
    Zheng, Wantong
    Wang, Zhongyue
    Lv, Tongtong
    Ma, Yong
    Jia, Chunfu
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT II, 2018, 11335 : 462 - 476
  • [27] A Distributed k-Anonymity Protocol for Location Privacy
    Zhong, Ge
    Hengartner, Urs
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
  • [28] Optimization-based k-anonymity algorithms
    Liang, Yuting
    Samavi, Reza
    COMPUTERS & SECURITY, 2020, 93
  • [29] Minimum Spanning Tree Based k-Anonymity
    Ramana, K. Venkata
    Kumari, V. Valli
    Raju, K. V. S. V. N.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 1, 2012, 130 : 405 - 413
  • [30] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
    Wang, Hui
    Huang, Haiping
    Qin, Yuxiang
    Wang, Yunqi
    Wu, Min
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (06)