A Differential Privacy Protection Protocol Based on Location Entropy

被引:6
作者
Guo, Ping [1 ]
Ye, Baopeng [2 ]
Chen, Yuling [1 ]
Li, Tao [1 ]
Yang, Yixian [3 ]
Qian, Xiaobin [4 ]
Yu, Xiaomei [5 ]
机构
[1] Guizhou Univ, Sch Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Informat Technol Innovat Serv Ctr Guizhou Prov, Guiyang 550025, Peoples R China
[3] Beijing Univ Posts & Telecommnuicat, Sch Cyberspace Secur, Beijing 100000, Peoples R China
[4] Guizhou CoVis Sci & Technol Co Ltd, Guiyang 550025, Peoples R China
[5] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250000, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2023年 / 28卷 / 03期
基金
中国国家自然科学基金;
关键词
Privacy; Differential privacy; Protocols; Publishing; Geology; Smart contracts; Resists; Location-Based Services (LBS); smart contract; location entropy; differential privacy; privacy protection; SYSTEM;
D O I
10.26599/TST.2022.9010003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Location-Based Service (LBS) refers to geolocation-based services that bring both convenience and vulnerability. With an increase in the scale and value of data, most existing location privacy protection protocols cannot balance privacy and utility. To solve the revealing problems in LBS, we propose a differential privacy protection protocol based on location entropy. First, we design an algorithm of the best-assisted user selection for constructing anonymity sets. Second, we employ smart contracts to evaluate the credibility of participants, which ensures the honesty of participants. Moreover, we provide a comprehensive experiment; the theoretical analysis and experiments show that the proposed protocol effectively resists background knowledge attacks. Generally, our protocol improves data availability. Particularly, it realizes user-controllable privacy protection, which improves privacy protection and strengthens security.
引用
收藏
页码:452 / 463
页数:12
相关论文
共 43 条
[1]  
[Anonymous], 1948, Bell System Technical Journal, DOI DOI 10.1002/J.1538-7305.1948.TB01338.X
[2]   Towards sharp inapproximability for any 2-CSP [J].
Austrin, Per .
48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, :307-317
[3]   New Enhanced Authentication Protocol for Internet of Things [J].
Azrour, Mourade ;
Mabrouki, Jamal ;
Guezzaz, Azedine ;
Farhaoui, Yousef .
BIG DATA MINING AND ANALYTICS, 2021, 4 (01) :1-9
[4]  
Ben Niu, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P1017, DOI 10.1109/INFOCOM.2015.7218474
[5]  
[毕晓迪 Bi Xiaodi], 2017, [山东大学学报. 理学版, Journal of Shandong University. Natural Science], V52, P75
[6]  
Chatzikokolakis K, 2015, LECT NOTES COMPUT SC, V8956, P49, DOI 10.1007/978-3-319-14977-6_4
[7]   Security Issues and Defensive Approaches in Deep Learning Frameworks [J].
Chen, Hongsong ;
Zhang, Yongpeng ;
Cao, Yongrui ;
Xie, Jing .
TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (06) :894-905
[8]   Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE [J].
Chen, Yuling ;
Dong, Sen ;
Li, Tao ;
Wang, Yilei ;
Zhou, Huiyu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :5239-5249
[9]   PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs [J].
Chen, Yuling ;
Sun, Jing ;
Yang, Yixian ;
Li, Tao ;
Niu, Xinxin ;
Zhou, Huiyu .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (02) :1204-1221
[10]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1