Probability-based location anonymity algorithm

被引:0
|
作者
Yan, Yushuang [1 ]
Tan, Shichong [1 ]
Zhao, Dawei [1 ]
机构
[1] State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an
来源
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University | 2015年 / 42卷 / 06期
关键词
Inactive users; K-anonymity; PLA algorithm; Probability;
D O I
10.3969/j.issn.1001-2400.2015.06.014
中图分类号
学科分类号
摘要
As one of the most effective location privacy preservation technologies, the k-anonymity model provides safeguards for location privacy of the mobile client against vulnerabilities for abuse by constructing an anonymous area of k users including the protected one. However, most existing k-anonymity models only utilize the users who are sending requests at recent time. If there are not enough requesting users, the generated anonymous area of the k-anonymity model will be larger than expected. In this paper, a Probability-based Location Anonymity (PLA) algorithm is proposed for protecting location privacy of the mobile users in a road network. The PLA model takes advantage of the historical path track of the users who are not sending the request currently, and then computes the probability into the anonymous section so that it can greatly reduce the size of the anonymous area. Experimental results show that the PLA algorithm is superior to the k-anonymity and it increases its anonymous efficiency enormously. © 2015, Science Press. All right reserved.
引用
收藏
页码:75 / 80
页数:5
相关论文
共 14 条
  • [1] Duri S., Gruteser M., Liu X., Et al., Framework for Security and Privacy in Automotive Telematics, Proceedings of the 2nd International Workshop on Mobile Commerce, pp. 25-32, (2002)
  • [2] Wang Y., Xu D., He X., L2P2: Location-aware Location Privacy Protection for Location-based Services, Proceedings of IEEE INFOCOM, pp. 1996-2004, (2012)
  • [3] Wang Q., Xu Z., Qu S., An Enhanced K-Anonymity Model Against Homogeneity Attack, Journal of Software, 6, 10, pp. 1945-1952, (2011)
  • [4] Gruteser M., Grunwald D., Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking, Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31-42, (2003)
  • [5] Beresford A.R., Stajano F., Location Privacy in Pervasive Computing, IEEE Pervasive Computing, 2, 1, pp. 46-55, (2003)
  • [6] Kim M., Fielding J.J., Kotz D., Risks of Using AP Locations Discovered through War Driving in Pervasive Computing, pp. 67-82, (2006)
  • [7] Xu T., Cai Y., Exploring Historical Location Data for Anonymity Preservation in Location-based Services, Proceedings of the 27th IEEE Communications Society Conference on Computer Communications, pp. 1220-1228, (2008)
  • [8] Chow C.Y., Mokbel M.F., Trajectory Privacy in Location-based Services and Data Publication, ACM SIGKDD Explorations Newsletter, 13, 1, pp. 19-29, (2011)
  • [9] Suzuki A., Iwata M., Arase Y., Et al., A User Location Anonymization Method for Location Based Services in a Real Environment, Proceedings of the 18th ACM International Symposium on Advances in Geographic Information Systems, pp. 398-401, (2010)
  • [10] Kato R., Iwata M., Hara T., Et al., A Dummy-based Anonymization Method Based on User Trajectory with Pauses, Proceedings of the 20th ACM International Symposium on Advances in Geographic Information Systems, pp. 249-258, (2012)