Evaluation of an Entropy-based k-Anonymity Model for Location Based Services

被引:0
|
作者
Sharma, Varun [1 ]
Shen, Chien-Chung [1 ]
机构
[1] Univ Delaware, Dept Comp & Informat Sci, Newark, DE 19716 USA
关键词
Location Based Services (LBS); k-anonymity; entropy; privacy; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the market for cellular telephones, and other mobile devices, keeps growing, the demand for new services arises to attract the end users. Location Based Services (LBS) are becoming important to the success and attractiveness of next generation wireless systems. To access location-based services, mobile users have to disclose their location information to service providers and third party applications. This raises privacy concerns, which have hampered the widespread use of LBS. Location privacy mechanisms include Anonymization, Obfuscation, Policy Based Scheme, k-anonymity and Adding Fake Events. However most existing solutions adopt the k-anonymity principle. We propose an entropy based location privacy mechanism to protect user information against attackers. We look at the effectiveness of the technique in a continuous LBS scenarios, i.e., where users are moving and recurrently requesting for Location Based Services, we also evaluate the overall performance of the system with its drawbacks.
引用
收藏
页码:374 / 378
页数:5
相关论文
共 50 条
  • [31] A K-anonymity Based Semantic Model For Protecting Personal Information and Privacy
    Omran, Esraa
    Bokma, Albert
    Abu-Almaati, Shereef
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1443 - +
  • [32] Location Privacy in Buildings: A 3-Dimensional K-anonymity Model
    Zhu, Yujia
    Zhai, Lidong
    2014 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN), 2014, : 195 - 200
  • [33] A Location Privacy Protection Algorithm Based on Double K-Anonymity in the Social Internet of Vehicles
    Xing, Ling
    Jia, Xiaofan
    Gao, Jianping
    Wu, Honghai
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (10) : 3199 - 3203
  • [34] Query-Aware Location Privacy Model Based on p-Sensitive and k-Anonymity for Road Networks
    Chen, Jiahui
    Xu, Hongyun
    Zhu, Lin
    INTERNET OF THINGS-BK, 2012, 312 : 157 - 165
  • [35] LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme
    Chen, Ming
    Li, Wenzhong
    Chen, Xu
    Li, Zhuo
    Lu, Sanglu
    Chen, Daoxu
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [36] Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity
    Jiang, Nanlan
    Zhai, Yinan
    Wang, Yujun
    Yin, Xuesong
    Yang, Sai
    Xu, Pingping
    SENSORS, 2024, 24 (18)
  • [37] k-anonymity:: A model for protecting privacy
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [38] k-Anonymity Based on Tuple Migration in Sharing Data
    Truong, Anh T.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (04) : 648 - 655
  • [39] Clustering based k-anonymity algorithm for privacy preservation
    Ni S.
    Xie M.
    Qian Q.
    International Journal of Network Security, 2017, 19 (06) : 1062 - 1071
  • [40] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142