Evaluation of an Entropy-based k-Anonymity Model for Location Based Services

被引:0
|
作者
Sharma, Varun [1 ]
Shen, Chien-Chung [1 ]
机构
[1] Univ Delaware, Dept Comp & Informat Sci, Newark, DE 19716 USA
关键词
Location Based Services (LBS); k-anonymity; entropy; privacy; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the market for cellular telephones, and other mobile devices, keeps growing, the demand for new services arises to attract the end users. Location Based Services (LBS) are becoming important to the success and attractiveness of next generation wireless systems. To access location-based services, mobile users have to disclose their location information to service providers and third party applications. This raises privacy concerns, which have hampered the widespread use of LBS. Location privacy mechanisms include Anonymization, Obfuscation, Policy Based Scheme, k-anonymity and Adding Fake Events. However most existing solutions adopt the k-anonymity principle. We propose an entropy based location privacy mechanism to protect user information against attackers. We look at the effectiveness of the technique in a continuous LBS scenarios, i.e., where users are moving and recurrently requesting for Location Based Services, we also evaluate the overall performance of the system with its drawbacks.
引用
收藏
页码:374 / 378
页数:5
相关论文
共 50 条
  • [41] Truthful Incentive Mechanisms for K-Anonymity Location Privacy
    Yang, Dejun
    Fang, Xi
    Xue, Guoliang
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2994 - 3002
  • [42] Nonexposure Accurate Location K-Anonymity Algorithm in LBS
    Jia, Jinying
    Zhang, Fengli
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [43] Multidimensional K-anonymity partition method using entropy
    Yan, Hua
    Liu, Gui-Song
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (06): : 1228 - 1231
  • [44] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [45] A Topological k-Anonymity Model Based on Collaborative Multi-view Clustering
    Zouinina, Sarah
    Grozavu, Nistor
    Bennani, Younes
    Lyhyaoui, Abdelouahid
    Rogovschi, Nicoleta
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2018, PT III, 2018, 11141 : 817 - 827
  • [46] θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records
    Khan, Razaullah
    Tao, Xiaofeng
    Anjum, Adeel
    Kanwal, Tehsin
    Malik, Saif Ur Rehman
    Khan, Abid
    Rehman, Waheed Ur
    Maple, Carsten
    ELECTRONICS, 2020, 9 (05)
  • [47] A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Services
    Um, Jung-Ho
    Jang, Mi-Young
    Jo, Kyoung-Jin
    Chang, Jae-Woo
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 79 - 85
  • [48] K-Anonymity Algorithm Based on Multi Attribute Generalization
    2017, Univ. of Electronic Science and Technology of China (46):
  • [49] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [50] Algorithm for k-anonymity based on rounded partition function
    Wu, Ying-Jie
    Tang, Qing-Ming
    Ni, Wei-Wei
    Sun, Zhi-Hui
    Ruan Jian Xue Bao/Journal of Software, 2012, 23 (08): : 2138 - 2148