Location privacy protection method based on random mesh

被引:0
作者
Yang S. [1 ,2 ]
Wang H. [1 ]
Ma C. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin
[2] College of Information and Electronic Technology, Jiamusi University, Jiamusi
来源
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | 2018年 / 40卷 / 02期
关键词
Location anonymous; Location-based service; Privacy protection; Random mesh;
D O I
10.3969/j.issn.1001-506X.2018.02.26
中图分类号
学科分类号
摘要
In order to cope with the problem of privacy reduction with the decrease of the number of users in the vicinity, an improved location anonymity method based on the concept of grid computing and theory of cryptograph is proposed. In this method, a random mesh is used to generalize the location of the user, and the location updating is obtained by simple calculation between mobile nodes and the location cloak server, and then location k-anonymity is realized by the collaborative computing between the mobile terminal and the anonymous server. Finally, a theoretical analysis is proposed to illustrate that the method has the following characteristics: trajectory untraceability and identification unlinkability. At the same time, simulation results show that the computational complexity and communication complexity of the proposed method can meet the requirements of real-time communication in location services. © 2018, Editorial Office of Systems Engineering and Electronics. All right reserved.
引用
收藏
页码:422 / 426
页数:4
相关论文
共 17 条
[1]  
Zhou A.Y., Yang B., Jin C.Q., Location-based services: architecture and progress, Chinese Journal of Computers, 34, 7, pp. 156-1171, (2011)
[2]  
Wang L., Meng X.F., Location privacy preservation in big data era: a survey, Journal of Software, 25, 4, pp. 693-712, (2014)
[3]  
Feng D.G., Zhang M., Li H., Big data security and privacy protection, Chinese Journal of Computers, 37, 1, pp. 246-258, (2014)
[4]  
Acquisti A., Brandimarte L., Loewenstein G., Privacy and human behavior in the age of information, Science, 347, 6221, pp. 509-514, (2015)
[5]  
Zhang L., Ma C.G., Yang S.T., Et al., Location privacy protection model and algorithm based on profiles generalization, Systems Engineering and Electronics, 38, 12, pp. 2894-2900, (2016)
[6]  
Nergiz M.E., Gok M.Z., Hybrid k-anonymity, Computers & Security, 44, 2, pp. 51-63, (2014)
[7]  
Schlegel R., Chow C.Y., Huang Q., Et al., User-defined privacy grid system for continuous location-based services, IEEE Trans. on Mobile Computing, 14, 10, pp. 2158-2172, (2015)
[8]  
Ni W., Gu M., Chen X., Location privacy-preserving k nearest neighbor query under user's preference, Knowledge-Based Systems, 103, 2016, pp. 19-27, (2016)
[9]  
Mou L., Lbath A., A grid-based location privacy-preserving method for LBS users, Proc. of the Acm Sigspatial International Workshop on Privacy in Geographic Information Collection and Analysis, pp. 1-4, (2014)
[10]  
Hara T., Suzuki A., Iwata M., Et al., Dummy-based user location anonymization under real-world constraints, IEEE Access, 4, 2016, pp. 673-687, (2016)