Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data

被引:0
作者
Zhang H. [1 ]
Li P. [1 ]
机构
[1] Department of Information Engineering, Shanxi Conservancy Technical Institute, Yuncheng
来源
Journal of Cyber Security and Mobility | 2023年 / 12卷 / 06期
关键词
Digital footprint; false position technology; generate confrontation network; synthetic track; TUL task;
D O I
10.13052/jcsm2245-1439.1262
中图分类号
学科分类号
摘要
The digital footprint in wireless sensor networks can bring great academic and commercial value, but it will also bring the risk of privacy disclosure to users. This study discusses the location privacy protection methods in location based service under multiple scenarios. In the experiment, a false location filtering algorithm for real-time location request scenarios and a false path generation model for offline location release scenarios are proposed. The false position filtering algorithm is implemented based on the idea of a large top heap selection query. The algorithm can construct false position candidate sets and filter false positions. The false track generation model combines the false position technology and the generative adversarial networks model, which mainly protects the user's track data by synthesizing tracks. In the attacker's recognition experiment of a real location. The minimum distance between the false locations generated by the algorithm proposed in the study is above 400 m and the generation time does not exceed 5 ms, generating a better set of false locations in terms of both effectiveness and efficiency. Compared with several commonly used privacypreserving algorithms, the proposed algorithm has the lowest probability of being identified with real locations, with no more than 21% overall, and is almost independent of the k value. the recognition accuracy of the trajectory user link task decreases from over 90% to about 34%, indicating that the proposed fake trajectory generation model can effectively protect users' data privacy. The experimental results demonstrate that the algorithm and model proposed in the study can quickly generate physically dispersed and semantically diverse sets of fake locations and effectively protect users' trajectory privacy, which is important for users' digital footprint privacy protection. © 2023 River Publishers.
引用
收藏
页码:845 / 868
页数:23
相关论文
共 30 条
[11]  
Wu Z, Li G, Shen S, Lian X, Chen E, Xu G., Constructing dummy query sequences to protect location privacy and query privacy in locationbased services, World Wide Web, 24, pp. 25-49, (2021)
[12]  
Zhang S, Li X, Tan Z, Peng T, Wang G., A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services, Future Generation Computer Systems, 94, pp. 40-50, (2019)
[13]  
Liu J, Wang S., All-dummy k-anonymous privacy protection algorithm based on location offset, Computing, 104, 8, pp. 1739-1751, (2022)
[14]  
Zhang S, Mao X, Choo K K R, Peng T, Wang G., A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services, Information Sciences, 527, pp. 406-419, (2020)
[15]  
Qu Y, Yu S, Zhou W, Tian Y., Gan-driven personalized spatial-temporal private data sharing in cyber-physical social systems, IEEE Transactions on Network Science and Engineering, 7, 4, pp. 2576-2586, (2020)
[16]  
Xiong Z, Cai Z, Han Q, Alrawais A, Li W., ADGAN: Protect your location privacy in camera data of auto-driving vehicles, IEEE Transactions on Industrial Informatics, 17, 9, pp. 6200-6210, (2020)
[17]  
Huang C, Chen S, Zhang Y, Zhou W, Rodrigues J., A robust approach for privacy data protection: IoT security assurance using generative adversarial imitation learning, IEEE Internet of Things Journal, 9, 18, pp. 17089-17097, (2021)
[18]  
Chen S, Fu A, Yu S, Ke H, Su M., DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication, Soft Computing, 25, pp. 7325-7339, (2021)
[19]  
Masnabadi N, Hosseinali F, Bahramian Z., Developing a spatial and temporal density-based clustering algorithm to extract stop locations from the user's trajectory, Engineering Journal of Geospatial Information Technology, 9, 2, pp. 105-128, (2021)
[20]  
Sun G, Chang V, Ramachandran M, Sun Z, Li J, Yu H, Liao D., Efficient location privacy algorithm for Internet of Things (IoT) services and applications, Journal of Network and Computer Applications, 89, pp. 3-13, (2017)