KAP: Location privacy-preserving approach in location services

被引:4
|
作者
机构
[1] Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin
来源
Wang, Yu-Hang | 1600年 / Editorial Board of Journal on Communications卷 / 35期
基金
中国国家自然科学基金;
关键词
k-anonymity; Location privacy; Location service; Mobile internet;
D O I
10.3969/j.issn.1000-436x.2014.11.021
中图分类号
学科分类号
摘要
Preserving location privacy is an essential requirement in mobile internet. A location privacy protection approach named KAP was proposed which aimed at the privacy issue of location service under the mobile Internet. Through the analysis on locating technology, a weighted adjacent graph-based topology model was given in order to describe the positional relationship between hot spots. Meanwhile, with the help of the model, combining the concept of k-anonymity, three privacy algorithms was shown to make sure the location can not be obtained precisely by attacker. The simulation results verified the correctness and performance of the approach. ©, 2014, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:182 / 190
页数:8
相关论文
共 14 条
  • [1] Damiani M.L., Cuijpers C., Privacy challenges in third-party location services , IEEE 14th International Conference on Mobile Data Management (MDM 2013) , (2013)
  • [2] Li B., Salter J., Dempster A.G., Et al., Indoor positioning techniques based on wireless LAN , First IEEE International Conference on Wireless Broadband and Ultra Wideband Communication (2007) , pp. 13-16, (2008)
  • [3] Ficco M., Palmieri F., Castiglione A., Hybrid indoor and outdoor location services for new generation mobile terminals , Personal and Ubiquitous Computing, 18, 2, pp. 271-285, (2014)
  • [4] Gezici S., A survey on wireless position estimation , Journal of Wireless Personal Communications, 44, 3, pp. 63-282, (2008)
  • [5] Duckham M., Kulik L., Location Privacy and Location-Aware Computing , (2006)
  • [6] Wernke M., Skvortsov P., Durr F., Et al., A classification of location privacy attacks and approaches , Personal and Ubiquitous Computing, 18, 1, pp. 163-175, (2012)
  • [7] Gruteser M., Grunwald D., Anonymous usage of location-based services through spatial and temporal cloaking , Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MOBISYS 2003) , pp. 31-42, (2003)
  • [8] Zhang C.Y., Huang Y., Cloaking locations for anonymous location based services: A hybrid approach, Geoinformatica, 13, 2, pp. 159-182, (2009)
  • [9] Divanis A.G., Kalnis P., Verykios V.S., Providing k-anonymity in location based services , SIGKDD Explorations Newsletter, 12, 1, pp. 3-10, (2010)
  • [10] Chow C.Y., Mokbel M.F., Trajectory privacy in location-based services and data publication , SIGKDD Explorations, 13, 1, pp. 19-29, (2011)