Non-deterministic K-anonymity Algorithm Based Untrusted Third Party for Location Privacy Protection in LBS

被引:0
作者
Jia, Jinying [1 ]
Zhang, Fengli [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 611731, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 09期
关键词
location based service; location privacy; spatial cloaking; k-anonymity;
D O I
10.14257/ijsia.2015.9.9.33
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When people use the LBS, they will leak their location information to an untrusted LBS provider A new technology named location privacy protection has been well studied by scholars. But in their researches, they supposed that there was a trusted third party which could provide anonymous services for the query user However; it is very difficult to find a trusted third party in practice. In this paper; we proposed a non-deterministic k-anonymity algorithm based untrusted third party for location privacy protection in LBS. It moved the process of the generating anonymous spatial region (ASR) from the third party to the users, thereby reduced the credibility of the third party from trusted to untrusted. And introduced an incremental query for KNN. The experiments demonstrate that our proposed algorithm has better performance than existing algorithms.
引用
收藏
页码:387 / 399
页数:13
相关论文
共 14 条
[11]  
Mokbel MF., 2007, P 23 INT C DAT ENG I
[12]  
Sun Xingming, 2014, INT J SECURITY ITS A, V8
[13]  
YIU ML, 2008, P ICDE
[14]  
Zhou T., 2013, INFORM SYSTEMS FRONT, V15