Privacy-preserving enhanced dummy-generation technique for location-based services

被引:3
|
作者
Parmar, Dilay [1 ,2 ]
Rao, Udai Pratap [3 ,4 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol, Cent Comp Ctr, Surat, India
[2] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Sci & Engn, Surat, India
[3] Natl Inst Technol, Dept Comp Sci & Engn, Patna, India
[4] Natl Inst Technol, Dept Comp Sci & Engn, Patna, Bihar, India
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2023年 / 35卷 / 02期
关键词
dummy-generation; edge computing; location privacy; location-based services; privacy-enhancing technologies; K-ANONYMITY; INTERNET; SECURITY; THINGS; PRESERVATION; SYSTEMS; SCHEME; USERS; MODEL; IOT;
D O I
10.1002/cpe.7501
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Location-based services (LBS) has become an intrinsic part of our everyday life. However, the flexibility and convenience provided by LBS are at the cost of user privacy since untrusted LBS server can leak private information of users. To overcome the privacy issues observed in LBS, a novel dummy-generation based privacy preservation technique is proposed in this article. The proposed dummy-generation technique is a circle-based technique which generates dummy locations in the circle area and is effective against center-of-anonymized spatial region attack, map-matching attack, and location-homogeneity attack. Additionally, an edge computing enabled framework is proposed, which can be used in the IoT environment. The edge computing enabled framework helps in handling the resource poverty issues of the service requesting devices and provides the low latency solution. The security analysis of our proposed dummy-generation technique reflects that the proposed technique is resilient to specific attacks for different adversary attack models. The results obtained through simulations suggest that our technique performs better than the pre-existing techniques.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services
    Du, Yongwen
    Cai, Gang
    Zhang, Xuejun
    Liu, Ting
    Jiang, Jinghua
    INFORMATION, 2019, 10 (09)
  • [32] Preserving Users' Privacy for Location-Based Services
    Agarwal, Pranay
    Kumar, Abhinav
    Yamaguchi, Rie Shigetomi
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [33] Enabling Efficient Privacy-Preserving Spatiotemporal Location-Based Services for Smart Cities
    Li, Zhijun
    Ma, Jianfeng
    Miao, Yinbin
    Wang, Xiangyu
    Li, Jiayi
    Xu, Chao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 5288 - 5300
  • [34] An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud
    Zhu, Hui
    Lu, Rongxing
    Huang, Cheng
    Chen, Le
    Li, Hui
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (09) : 7729 - 7739
  • [35] APS: Attribute-aware privacy-preserving scheme in location-based services
    Li, Weihao
    Li, Chen
    Geng, Yeli
    INFORMATION SCIENCES, 2020, 527 : 460 - 476
  • [36] A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud
    Li, Dong
    Wu, Jiahui
    Le, Junqing
    Liao, Xiaofeng
    Xiang, Tao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 457 - 469
  • [37] Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services
    Hui, Zhu
    Liu, Fen
    Li, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 536 - 545
  • [38] A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Xiaohui
    Shen, Xuemin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2012, 13 (01) : 127 - 139
  • [39] A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services
    Huang, Zhisheng
    Yan, Xiai
    Lin, Yaping
    Xu, Zhou
    Lin, Feng
    IEEE ACCESS, 2018, 6 : 72796 - 72807
  • [40] Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks
    Hu, Ziyuan
    Liu, Shengli
    Chen, Kefei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 972 - 983