期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
Location Privacy in Device-Dependent Location-Based Services:Challenges and Solution 被引量:1
1
作者 Yuhang Wang Yanbin Sun +4 位作者 Shen Su Zhihong Tian Mohan Li Jing Qiu Xianzhi Wang 《Computers, Materials & Continua》 SCIE EI 2019年第6期983-993,共11页
With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)wi... With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness. 展开更多
关键词 location privacy device-dependent location-based service location-based service credit system location privacy preserving mechanism shared bicycle
下载PDF
User location privacy protection mechanism for location-based services 被引量:6
2
作者 Yan He Jiageng Chen 《Digital Communications and Networks》 SCIE CSCD 2021年第2期264-276,共13页
With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing co... With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data. 展开更多
关键词 Internet of things location-based services location privacy privacy protection mechanism CONFIDENTIALITY
下载PDF
Protection of mobile location privacy by using blind signature 被引量:1
3
作者 LIAO Jian QI Ying-hao +2 位作者 HUANG Pei-wei RONG Meng-tian LI Sheng-hong 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第6期984-989,共6页
Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al.(2004a... Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al.(2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols. 展开更多
关键词 Mobile computing location privacy Security techniques and system Blind signature location-based services
下载PDF
Location privacy protection of maritime mobile terminals
4
作者 Xin Su Su Jiang Dongmin Choi 《Digital Communications and Networks》 SCIE CSCD 2022年第6期932-941,共10页
Mobile Edge Computing(MEC)can support various high-reliability and low-delay applications in Maritime Networks(MNs).However,security risks in computing task offloading exist.In this study,the location privacy leakage ... Mobile Edge Computing(MEC)can support various high-reliability and low-delay applications in Maritime Networks(MNs).However,security risks in computing task offloading exist.In this study,the location privacy leakage risk of Maritime Mobile Terminals(MMTs)is quantified during task offloading and relevant Location Privacy Protection(LPP)schemes of MMT are considered under two kinds of task offloading scenarios.In single-MMT and single-time offloading scenario,a dynamic cache and spatial cloaking-based LPP(DS-CLP)algorithm is proposed;and under the multi-MMTs and multi-time offloading scenario,a pseudonym and alterable silent period-based LPP(PA-SLP)strategy is proposed.Simulation results show that the DS-CLP can save the response time and communication cost compared with traditional algorithms while protecting the MMT location privacy.Meanwhile,extending the alterable silent period,increasing the number of MMTs in the maritime area or improving the pseudonym update probability can enhance the LPP effect of MMTs in PA-SLP.Furthermore,the study results can be effectively applied to MNs with poor communication environments and relatively insufficient computing resources. 展开更多
关键词 location privacy protection Maritime network Mobile edge computing Task floading
下载PDF
A Fast Physical Layer Security-Based Location Privacy Parameter Recommendation Algorithm in 5G IoT
5
作者 Hua Zhao Mingyan Xu +1 位作者 Zhou Zhong Ding Wang 《China Communications》 SCIE CSCD 2021年第8期75-84,共10页
The 5G IoT(Internet of Things,IoT)is easier to implement in location privacy-preserving research.The terminals in distributed network architecture blur their accurate locations into a spatial cloaking region but most ... The 5G IoT(Internet of Things,IoT)is easier to implement in location privacy-preserving research.The terminals in distributed network architecture blur their accurate locations into a spatial cloaking region but most existing spatial cloaking algorithms cannot work well because of man-in-the-middle attacks,high communication overhead,time consumption,and the lower success rate.This paper proposes an algorithm that can recommend terminal’s privacy requirements based on getting terminal distribution information in the neighborhood after cross-layer authentication and therefore help 5G IoT terminals find enough collaborative terminals safely and quickly.The approach shows it can avoid man-in-the-middle attacks and needs lower communication costs and less searching time than 520ms at the same time.It has a great anonymization success rate by 93%through extensive simulation experiments for a range of 5G IoT scenarios. 展开更多
关键词 cross-layer authentication location privacy parameter recommendation 5G IoT
下载PDF
δ-Calculus:A New Approach to Quantifying Location Privacy
6
作者 Lihua Yin Ran Li +4 位作者 Jingquan Ding Xiao Li Yunchuan Guo Huibing Zhang Ang Li 《Computers, Materials & Continua》 SCIE EI 2020年第6期1323-1342,共20页
With the rapid development of mobile wireless Internet and high-precision localization devices,location-based services(LBS)bring more convenience for people over recent years.In LBS,if the original location data are d... With the rapid development of mobile wireless Internet and high-precision localization devices,location-based services(LBS)bring more convenience for people over recent years.In LBS,if the original location data are directly provided,serious privacy problems raise.As a response to these problems,a large number of location-privacy protection mechanisms(LPPMs)(including formal LPPMs,FLPPMs,etc.)and their evaluation metrics have been proposed to prevent personal location information from being leakage and quantify privacy leakage.However,existing schemes independently consider FLPPMs and evaluation metrics,without synergizing them into a unifying framework.In this paper,a unified model is proposed to synergize FLPPMs and evaluation metrics.In detail,the probabilistic process calculus(calledδ-calculus)is proposed to characterize obfuscation schemes(which is a LPPM)and integrateα-entropy toδ-calculus to evaluate its privacy leakage.Further,we use two calculus moving and probabilistic choice to model nodes’mobility and compute its probability distribution of nodes’locations,and a renaming function to model privacy leakage.By formally defining the attacker’s ability and extending relative entropy,an evaluation algorithm is proposed to quantify the leakage of location privacy.Finally,a series of examples are designed to demonstrate the efficiency of our proposed approach. 展开更多
关键词 location privacy δ-calculus relative entropy
下载PDF
A Trajectory Privacy Protection Method to Resist Long-Term Observation Attacks
7
作者 Qixin Zhan 《Journal of Computer and Communications》 2024年第5期53-70,共18页
Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exp... Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exploited by opponents, greatly increasing the risk of trajectory privacy leakage. This attack method is called a long-term observation attack. On the premise of ensuring lower time overhead and higher cache contribution rate, the existing methods cannot utilize cache to answer subsequent queries while also resisting long-term observation attacks. So this article proposes a trajectory privacy protection method to resist long-term observation attacks. This method combines caching technology and improves the existing differential privacy mechanism, while incorporating randomization factors that are difficult for attackers to recognize after long-term observation to enhance privacy. Search for locations in the cache of both the mobile client and edge server that can replace the user’s actual location. If there are replacement users in the cache, the query results can be obtained more quickly. Simultaneously obfuscating the spatiotemporal correlation of actual trajectories by generating confusion regions. If it does not exist, the obfuscated location generation method that resists long-term observation attacks is executed to generate the real anonymous area and send it to the service provider. The above steps can comprehensively protect the user’s trajectory privacy. The experimental results show that this method can protect user trajectories from long-term observation attacks while ensuring low time overhead and a high cache contribution rate. 展开更多
关键词 location privacy Long-Term Observation Attacks K-ANONYMITY location Caching
下载PDF
Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services 被引量:6
8
作者 Yu Wang Dingbang Xu Fan Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期243-259,共17页
Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonym... Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real-life scenarios. In this paper, we introduce a new location privacy problem: Location-aware Location Privacy Protection (L2P2) problem, where users can define dynamic and diverse privacy requirements for different locations. The goal of the L2P2 problem is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user. In this paper, we formalize two versions of the L2P2 problem, and propose several efficient heuristics to provide such location-aware location privacy protection for mobile users. Through extensive simulations over large synthetic and real-life datasets, we confirm the effectiveness and efficiency of the proposed L2P2 algorithms. 展开更多
关键词 location privacy K-ANONYMITY cloaking algorithm location-based service mobile networks
原文传递
Preserving location privacy without exact locations in mobile services 被引量:6
9
作者 Xiao PAN Xiaofeng MENG 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第3期317-340,共24页
Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile us... Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most existing cloaking approaches assume that mobile users are trusted. And exact locations are required to protect location privacy, which is exactly the information mobile users want to hide. In this paper, we propose a p-anti-conspiration privacy model to anonymize over semi-honest users. Further- more, two k*NNG-based cloaking algorithms, vk*NNCA and ek*NNCA, are proposed to protect location privacy without exact locations. The efficiency and effectiveness of the pro- posed algorithms are validated by a series of carefully designed experiments. The experimental results show that the price paid for location privacy protection without exact locations is small. 展开更多
关键词 location privacy semi-honest users privacy preservation location-based services
原文传递
Preserving Personalized Location Privacy in Ride-Hailing Service 被引量:5
10
作者 Youssef Khazbak Jingyao Fan +1 位作者 Sencun Zhu Guohong Cao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第6期743-757,共15页
Ride-hailing service has become a popular means of transportation due to its convenience and low cost.However,it also raises privacy concerns.Since riders’mobility information including the pick-up and drop-off locat... Ride-hailing service has become a popular means of transportation due to its convenience and low cost.However,it also raises privacy concerns.Since riders’mobility information including the pick-up and drop-off location is tracked,the service provider can infer sensitive information about the riders such as where they live and work.To address these concerns,we propose location privacy preserving techniques that efficiently match riders and drivers while preserving riders’location privacy.We first propose a baseline solution that allows a rider to select the driver who is the closest to his pick-up location.However,with some side information,the service provider can launch location inference attacks.To overcome these attacks,we propose an enhanced scheme that allows a rider to specify his privacy preference.Novel techniques are designed to preserve rider’s personalized privacy with limited loss of matching accuracy.Through trace-driven simulations,we compare our enhanced privacy preserving solution to existing work.Evaluation results show that our solution provides much better ride matching results that are close to the optimal solution,while preserving personalized location privacy for riders. 展开更多
关键词 ride-hailing location privacy privacy preserving Voronoi diagram
原文传递
HilAnchor:Location Privacy Protection in the Presence of Users' Preferences 被引量:4
11
作者 倪巍伟 郑锦旺 崇志宏 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第2期413-427,共15页
Location privacy receives considerable attentions in emerging location based services.Most current practices however either ignore users' preferences or incompletely fulfill privacy preferences.In this paper,we propo... Location privacy receives considerable attentions in emerging location based services.Most current practices however either ignore users' preferences or incompletely fulfill privacy preferences.In this paper,we propose a privacy protection solution to allow users' preferences in the fundamental query of k nearest neighbors (kNN).Particularly,users are permitted to choose privacy preferences by specifying minimum inferred region.Via Hilbert curve based transformation,the additional workload from users' preferences is alleviated.Furthermore,this transformation reduces time-expensive region queries in 2-D space to range the ones in 1-D space.Therefore,the time efficiency,as well as communication efficiency,is greatly improved due to clustering properties of Hilbert curve.Further,details of choosing anchor points are theoretically elaborated.The empirical studies demonstrate that our implementation delivers both flexibility for users' preferences and scalability for time and communication costs. 展开更多
关键词 location privacy kNN query minimum inferred region users' privacy preferences
原文传递
MimiBS: Mimicking Base-Station to Provide Location PrivacyProtection in Wireless Sensor Networks 被引量:3
12
作者 Ling-Fang Zeng Dan Feng 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第5期991-1007,共17页
In a wireless sensor network (WSN), sink node/base station (BS) gathers data from surrounding nodes and sends them to a remote server via a gateway. BS holds important data. Therefore, it is necessary to hide its loca... In a wireless sensor network (WSN), sink node/base station (BS) gathers data from surrounding nodes and sends them to a remote server via a gateway. BS holds important data. Therefore, it is necessary to hide its location from an inside/outside attacker. Providing BS location anonymity against a local and global adversary, we propose a novel technique called MimiBS 'Mimicking Base-Station'. The key idea is the integration of aggregator nodes (ANs) with sensor nodes (SNs), while fine tuning TTL (time to live) value for fake packets, and setting some threshold value for real packet counter rpctr. MimiBS creates multiple traffic-hotspots (zones), which shifts the focus from BS to the newly created ANs hotspots. Multiple traffic-hotspots confuse the adversary while determining the real BS location information. We defend the BS location information anonymity against traffic analysis attack, and traffic tracing attack. MimiBS gives an illusion of having multiple BSs, and thus, if the attacker knows any about AN, he/she will be deceived between the real BS and ANs. MimiBS outperforms BLAST (base-station location anonymity and security technique), RW (random walk), and SP (shortest path), while conducting routing without fake packets, with fake packets, without energy consideration, and with energy consideration respectively. 展开更多
关键词 base station location privacy wireless sensor network balanced energy consumption aggregator node
原文传递
An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem 被引量:2
13
作者 Jingjing Wang Yiliang Han Xiaoyuan Yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期260-269,共10页
Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and mobile network environments. In fact, existing k-anonymity schemes only protect location in datasets with small granularity. B... Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and mobile network environments. In fact, existing k-anonymity schemes only protect location in datasets with small granularity. But in larger granularity datasets, a user's geographical region-location is always exposed in realizations of k-anonymity because of interaction with neighboring nodes. And if a user could not find enough adjacent access points, most existing schemes would be invalid. How to protect location information has become an important issue. But it has not attracted much attention. To solve this problem, two location-privacy protection models are proposed. Then a new generalized k-anonymity Location Privacy Protection Scheme based on the Chinese Remainder Theorem (LPSS-CRT) in Location-Based Services (LBSs) is proposed. We prove that it can guarantee that users can access LBSs without leaking their region-location information, which means the scheme can achieve perfect anonymity. Analysis shows that LPPS-CRT is more secure in protecting location privacy, including region information, and is more efficient, than similar schemes. It is suitable for dynamic environments for different users' privacy protection requests. 展开更多
关键词 location privacy protection generalized k-anonymity location-based services the Chinese remaindertheorem
原文传递
Privacy-preserving Distributed Location Proof Generating System 被引量:3
14
作者 LIU Mengjun LIU Shubo +3 位作者 ZHANG Rui Li Yongkai WANG Jun CAO Hui 《China Communications》 SCIE CSCD 2016年第3期203-218,共16页
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr... The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results. 展开更多
关键词 computer software and theory location proof secret-sharing location privacy
下载PDF
A Novel Routing Strategy to Provide Source Location Privacy in Wireless Sensor Networks 被引量:2
15
作者 LI Shuming XIAO Yan +1 位作者 LIN Qiaomin QI Zhuzhu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第4期298-306,共9页
In order to secure the source location privacy when information is sent back to the base station in wireless sensor network, we propose a novel routing strategy which routes the packets to the base station through thr... In order to secure the source location privacy when information is sent back to the base station in wireless sensor network, we propose a novel routing strategy which routes the packets to the base station through three stages: directional random routing, h-hop routing in the annular region and the shortest path routing. These stages provide two fold protections to prevent the source location from being tracked down by the adversary. The analysis and simulation results show that proposed scheme, besides providing longer safety period, can significantly reduce energy consumption compared with two baseline schemes. 展开更多
关键词 source location privacy wireless sensor networks(WSN) safety period energy efficiency
原文传递
Complete Bipartite Anonymity for Location Privacy
16
作者 董恺 顾涛 +1 位作者 陶先平 吕建 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第6期1094-1110,共17页
Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring u... Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users' paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of "end points connecting to a specific start point in a graph" is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby nsers to discover and authenticate each other without knowing their real identities or accurate locations, predict tile encounter location using users' moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack. 展开更多
关键词 location privacy K-ANONYMITY path confusion query obfuscation complete bipartite anonymity
原文传递
APPLSS:Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption
17
作者 Yiliang Han Shuaishuai Zhu +1 位作者 Yu Li Xi Lin 《China Communications》 SCIE CSCD 2021年第3期105-121,共17页
Unauthorized access to location information in location-based service is one of the most critical security threats to mobile Internet.In order to solve the problem of quality of location sharing while keeping privacy ... Unauthorized access to location information in location-based service is one of the most critical security threats to mobile Internet.In order to solve the problem of quality of location sharing while keeping privacy preserved,adaptive privacy preserved location sharing scheme called APPLSS is proposed,which is based on a new hierarchical ciphertext-policy attribute-based encryption algorithm.In the algorithm,attribute authority sets the attribute vector according to the attribute tags of registration from the location service providers.Then the attribute vector can be adaptively transformed into an access structure to control the encryption and decryption.The APPLSS offers a natural hierarchical mechanism in protecting location information when partially sharing it in mobile networks.It allows service providers access to end user’s sensitive location more flexibly,and satisfies a sufficient-but-no-more strategy.For end-users,the quality of service is obtained while no extra location privacy is leaked.To improve service response performance,outsourced decryption is deployed to avoid the bottlenecks of the service providers and location information providers.The performance analysis and experiments show that APPLSS is an efficient and practical location sharing scheme. 展开更多
关键词 location-based service location privacy attribute-based encryption
下载PDF
Location Privacy in Mobile Big Data:User Identifiability via Habitat Region Representation
18
作者 Luoyang Fang Xiang Cheng +1 位作者 Liuqing Yang Haonan Wang 《Journal of Communications and Information Networks》 2018年第3期31-38,共8页
Mobile big data collected by mobile network operators is of interest to many research communities and industries for its remarkable values.However,such spatiotemporal information may lead to a harsh threat to subscrib... Mobile big data collected by mobile network operators is of interest to many research communities and industries for its remarkable values.However,such spatiotemporal information may lead to a harsh threat to subscribers’privacy.This work focuses on subscriber privacy vulnerability assessment in terms of user identifiability across two datasets with significant detail reduced mobility representation.In this paper,we propose an innovative semantic spatiotemporal representation for each subscriber based on the geographic information,termed as daily habitat region,to approximate the subscriber’s daily mobility coverage with far lesser information compared with original mobility traces.The daily habitat region is realized via convex hull extraction on the user’s daily spatiotemporal traces.As a result,user identification can be formulated to match two records with the maximum similarity score between two convex hull sets,obtained by our proposed similarity measures based on cosine distance and permutation hypothesis test.Experiments are conducted to evaluate our proposed innovative mobility representation and user identification algorithms,which also demonstrate that the subscriber’s mobile privacy is under a severe threat even with significantly reduced spatiotemporal information. 展开更多
关键词 mobile big data privacy attack user identification SPATIOTEMPORAL location privacy
原文传递
Privacy Protection with Dynamic Pseudonym-Based Multiple Mix-Zones Over Road Networks 被引量:1
19
作者 Qasim Ali Arain Zhongliang Deng +4 位作者 Imran memon Asma Zubedi Jichao Jiao Aisha Ashraf Muhammad Saad Khan 《China Communications》 SCIE CSCD 2017年第4期89-100,共12页
In this research we proposed a strategy for location privacy protection which addresses the issues related with existing location privacy protection techniques. Mix-Zones and pseudonyms are considered as the basic bui... In this research we proposed a strategy for location privacy protection which addresses the issues related with existing location privacy protection techniques. Mix-Zones and pseudonyms are considered as the basic building blocks for location privacy; however, continuously changing pseudonyms process at multiple locations can enhance user privacy. It has been revealed that changing pseudonym at improper time and location may threat to user's privacy. Moreover, certain methods related to pseudonym change have been proposed to attain desirable location privacy and most of these solutions are based upon velocity, GPS position and direction of angle. We analyzed existing methods related to location privacy with mix zones, such as RPCLP, EPCS and MODP, where it has been observed that these methods are not adequate to attain desired level of location privacy and suffered from large number of pseudonym changes. By analyzing limitations of existing methods, we proposed Dynamic Pseudonym based multiple mix zone(DPMM) technique, which ensures highest level of accuracy and privacy. We simulate our data by using SUMO application and analysis results has revealed that DPMM outperformed existing pseudonym change techniques and achieved better results in terms of acquiring high privacy with small number of pseudonym change. 展开更多
关键词 road network multiple mix-zones location privacy
下载PDF
A Differential Privacy Budget Allocation Method Combining Privacy Security Level
20
作者 Zihao Shen Shuhan He +3 位作者 Hui Wang Peiqian Liu Kun Liu Fangfang Lian 《Journal of Communications and Information Networks》 EI CSCD 2023年第1期90-98,共9页
Trajectory privacy protection schemes based on suppression strategies rarely take geospatial constraints into account,which is made more likely for an attacker to determine the user’s true sensitive location and traj... Trajectory privacy protection schemes based on suppression strategies rarely take geospatial constraints into account,which is made more likely for an attacker to determine the user’s true sensitive location and trajectory.To solve this problem,this paper presents a privacy budget allocation method based on privacy security level(PSL).Firstly,in a custom map,the idea of P-series is contributed to allocate a given total privacy budget reasonably to the initially sensitive locations.Then,the size of privacy security level for sensitive locations is dynamically adjusted by comparing it with the customized initial level threshold parameterµ.Finally,the privacy budget of the initial sensitive location is allocated to its neighbors based on the relationship between distance and degree between nodes.By comparing the PSL algorithm with the traditional allocation methods,the results show that it is more flexible to allocate a privacy budget without compromising location privacy under the same preset conditions. 展开更多
关键词 location privacy differential privacy privacy budget budget allocation PSL
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部