Privacy metric for user's trajectory in location-based services

被引:3
作者
Wang, Cai-Mei [1 ]
Guo, Ya-Jun [1 ]
Guo, Yan-Hua [1 ]
机构
[1] Department of Computer Science, Huazhong Normal University
来源
Ruan Jian Xue Bao/Journal of Software | 2012年 / 23卷 / 02期
关键词
Association rule; Background knowledge; Location-based service; Privacy metric; Trajectory privacy;
D O I
10.3724/SP.J.1001.2012.03946
中图分类号
学科分类号
摘要
This paper proposes a trajectory privacy measure for Silent Cascade, which is a prevalent trajectory privacy preserving method in LBS (location-based services). In this measure, the user's trajectory is modeled as a weighted undirected graph, and the user's trajectory privacy level is calculated through the use of information entropy. It is pointed out in literatures that any privacy preserving methods will be subject to privacy threats once the attacker has new background knowledge. Therefore, adversarial background knowledge is hierarchically integrated into this measure. The privacy metric result composes of the assumptive background knowledge and the corresponding trajectory privacy level. (K UL(K i+, K i-), K L(K i+, K i-)) association rules is also proposed to describe the assumptive background knowledge. Simulation results show that this metric is an effective and valuable tool for mobile users and the designers of trajectory privacy preserving methods to measure the user's trajectory privacy level correctly, even the attacker has variable background knowledge. © 2012 ISCAS.
引用
收藏
页码:352 / 360
页数:8
相关论文
共 16 条
[1]  
Kelly D.J., Raines R.A., Grimaila M.R., Baldwin R.O., Mullins B.E., A survey of state-of-the-art in anonymity metrics, Proc. of the 1st ACM Workshop on Network Data Anonymization, pp. 31-40, (2008)
[2]  
Lin X., Li S.P., Yang C.H., Attacking algorithms against continuous queries in LBS and anonymity measurement, Journal of Software, 20, 4, pp. 1058-1068, (2009)
[3]  
Xu T., Cai Y., Location anonymity in continuous location-based services, Proc. of the 15th Annual ACM Int'l Symp. on Advances in Geographic Information Systems, pp. 1-8, (2007)
[4]  
Gruteser M., Hoh B., On the anonymity of periodic location samples, Proc. of the 2nd Int'l Conf. on Security in Pervasive Computing, pp. 179-192, (2005)
[5]  
Hoh B., Gruteser M., Xiong H., Alrabady A., Preserving privacy in GPS traces via uncertainty-aware path cloaking, Proc. of the 14th ACM Conf. on Computer and Communications Security, pp. 161-171, (2007)
[6]  
Ma Z.D., Frank K., Michael M., A location privacy metric for V2X communication systems, Proc. of the 2009 IEEE Sarnoff Symp., pp. 1-6, (2009)
[7]  
Ma Z.D., Frank K., Michael M., Measuring location privacy in V2X communication systems with accumulated information, Proc. of the 6th IEEE Int'l Conf. on Mobile Ad-Hoc and Sensor Systems, pp. 322-331, (2009)
[8]  
Edman M., Sivrikaya F., Yener B., A combinatorial approach to measuring anonymity, Proc. of the IEEE Intelligence and Security Information, pp. 356-363, (2007)
[9]  
Gierlichs B., Troncoso C., Diaz C., Preneel B., Verbauwhede I., Revisiting a combinatorial approach toward measuring anonymity, Proc. of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 111-116, (2008)
[10]  
Shokri R., Freudiger J., Jadliwala M., Hubaux J., A distortion-based metric for location privacy, Proc. of the 8th ACM Workshop on Privacy in the Electronic Society, pp. 21-30, (2009)