Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services

被引:0
作者
Yu Wang [1 ,2 ]
Dingbang Xu [3 ]
Fan Li [4 ]
机构
[1] College of Information Engineering,Taiyuan University of Technology
[2] Department of Computer Science, the University of North Carolina at Charlotte
[3] Samsung Research America  4. School of Computer Science, Beijing Institute of Technology
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
location privacy; k-anonymity; cloaking algorithm; location-based service; mobile networks;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real-life scenarios. In this paper, we introduce a new location privacy problem: Location-aware Location Privacy Protection(L2P2) problem, where users can define dynamic and diverse privacy requirements for different locations. The goal of the L2P2 problem is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user. In this paper, we formalize two versions of the L2P2 problem, and propose several efficient heuristics to provide such location-aware location privacy protection for mobile users. Through extensive simulations over large synthetic and real-life datasets, we confirm the effectiveness and efficiency of the proposed L2P2 algorithms.
引用
收藏
页码:243 / 259
页数:17
相关论文
共 7 条
  • [1] Activity Recognition with Smartphone Sensors[J]. Xing Su,Hanghang Tong,Ping Ji.Tsinghua Science and Technology. 2014(03)
  • [2] Mobile Crowd Sensing and Computing[J] . Bin Guo,Zhu Wang,Zhiwen Yu,Yu Wang,Neil Y. Yen,Runhe Huang,Xingshe Zhou.ACM Computing Surveys (CSUR) . 2015 (1)
  • [3] A survey of computational location privacy
    Krumm, John
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) : 391 - 399
  • [4] A framework for generating network-based moving objects
    Brinkhoff, T
    [J]. GEOINFORMATICA, 2002, 6 (02) : 153 - 180
  • [5] L2P2:location-aware location privacy protection for location-based services. WANG Y,XU D,HE X,et al. INFOCOM . 2012
  • [6] Aformal model of obfuscation and negoti-ation for location privacy. Duckham M,Kulil L. Pervasive . 2005
  • [7] Protecting location privacy:optimal strategy against localization attacks. SHOKRI R,THEODORAKOPOULOS G,TRONCOSO C,et al. CCS . 2012