Research on Location Privacy Protection Scheme Based on Similar Trajectory Replacement

被引:0
作者
Song C. [1 ]
Zhang Y.-D. [1 ]
Peng W.-P. [1 ]
Wang L. [1 ]
Liu Z.-Z. [1 ]
机构
[1] School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo
来源
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications | 2020年 / 43卷 / 01期
关键词
Location based services; Privacy protection; Query-replace; Similar trajectory;
D O I
10.13190/j.jbupt.2019-031
中图分类号
学科分类号
摘要
Aiming at the problem of privacy leakage of mobile terminal users in location based service, a location privacy protection scheme is proposed based on similar trajectory replacement query. In this scheme, identities of the requesting user and all the candidates are annonymized. By adopting the similar trajectory function to calculate the trajectory similarities between all the candidates and the requesting user at certain time intervals, the optimal candidate with highest similarity is selected to represent requesting user in requesting LBS. So the identities of the requesting user. The privacy of queries and the trajectories is protected. Security analyses prove that the scheme satisfies such security features as anonymity, unforgeability, and resisting continuous query service tracking attack. Simulation shows that the proposed scheme effectively improves the trajectory similarity of the optimal candidate and the efficiency of the best candidate selection. © 2020, Editorial Department of Journal of Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:135 / 142
页数:7
相关论文
共 20 条
[1]  
Huang H., Progress in location-based services 2014, Lecture Notes in Geoinformation and Cartography, 46, 6, (2016)
[2]  
Sun Y., Chen M., Hu L., Et al., ASA: against statistical attacks for privacy-aware users in location based service, Future Generation Computer Systems, 70, pp. 48-58, (2017)
[3]  
He W., Research on LBS privacy protection technology in mobile social networks, IEEE, Advanced Information Technology, Electronic and Automation Control Conference, pp. 73-76, (2017)
[4]  
Huo Z., Meng X., A Survey of trajectory privacy-preserving techniques, Chinese Journal of Computers, 34, 10, pp. 1820-1830, (2011)
[5]  
Naghizade E., Bailey J., Kulik L., Et al., How private can i be among public users, UbiComp2015, the 2015 ACM International Joint Conference, pp. 1137-1141, (2015)
[6]  
Zhang Y., Chen Q., Zhong S., Privacy-preserving data aggregation in mobile phone sensing, IEEE Transactions on Information Forensics & Security, 11, 5, pp. 980-992, (2016)
[7]  
Wan S., Li F., Niu B., Et al., Research progress on location privacy-preserving techniques, Journal on Communications, 37, 12, pp. 124-141, (2016)
[8]  
Lee Ken C.K., Zheng B., Chen C., Et al., Efficient index-based approaches for skyline queries in location-based applications, IEEE Transactions on Knowledge and Data Engineering, 25, 11, pp. 2507-2520, (2013)
[9]  
Pan X., Meng X., Xu J., Distortion-based anonymity for continuous queries in location-based mobile services, ACM Sigspatial International Symposium on Advances in Geographic Information Systems, pp. 256-265, (2009)
[10]  
Freudiger J., Shokri R., Hubaux J.P., On the optimal placement of mix zones, International Symposium on Privacy Enhancing Technologies, pp. 216-234, (2009)