Localized Differential Location Privacy Protection Scheme in Mobile Environment

被引:1
作者
Kai, Liu [1 ]
Wang Jingjing [1 ]
Hu Yanjing [1 ]
机构
[1] Engn Univ PAP, Coll Cryptog Engn, Xian, Peoples R China
来源
2022 IEEE THE 5TH INTERNATIONAL CONFERENCE ON BIG DATA AND ARTIFICIAL INTELLIGENCE (BDAI 2022) | 2022年
基金
中国国家自然科学基金;
关键词
location privacy protection; K-anonymity; differential privacy; Markov model;
D O I
10.1109/BDAI56143.2022.9862753
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When users request location services, they are easy to expose their privacy information, and the scheme of using a third-party server for location privacy protection has high requirements for the credibility of the server. To solve these problems, a localized differential privacy protection scheme in mobile environment is proposed, which uses Markov chain model to generate probability transition matrix, and adds Laplace noise to construct a location confusion function that meets differential privacy, Conduct location confusion on the client, construct and upload anonymous areas. Through the analysis of simulation experiments, the scheme can solve the problem of untrusted thirdparty server, and has high efficiency while ensuring the high availability of the generated anonymous area.
引用
收藏
页码:148 / 152
页数:5
相关论文
共 15 条
[1]  
[Anonymous], 2007, ACM T KNOWL DISCOV D, DOI [10.1145/1217299.1217302, DOI 10.1145/1217299.1217302]
[2]   Planning Bike Lanes based on Sharing-Bikes' Trajectories [J].
Bao, Jie ;
He, Tianfu ;
Ruan, Sijie ;
Li, Yanhua ;
Zheng, Yu .
KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, :1377-1386
[3]   Estimating Depth From Monocular Images as Classification Using Deep Fully Convolutional Residual Networks [J].
Cao, Yuanzhouhan ;
Wu, Zifeng ;
Shen, Chunhua .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (11) :3174-3182
[4]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[5]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42
[6]  
Hanke H, 2013, LOCATION BASED SERVI
[7]   A survey of computational location privacy [J].
Krumm, John .
PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) :391-399
[8]  
Lei Z, 2017, CHIN J NET INFO SEC, V3, P8
[9]  
Li N, 2007, DATA ENG 2007 ICDE 2
[10]  
Suxia Z, 2021, J COMMUNICATIONS, V42, P113