Location privacy preservation through kernel transformation

被引:0
作者
Zhang, Lefeng [1 ]
Song, Guanghua [2 ]
Zhu, Danyang [2 ]
Ren, Wei [3 ]
Xiong, Ping [2 ]
机构
[1] Univ Technol Sydney, Sch Software, Sydney, NSW, Australia
[2] Zhongnan Univ Econ & Law, Sch Informat & Secur Engn, 182 Nanhu Ave, Wuhan 430073, Peoples R China
[3] Univ Geosci, Sch Comp Sci, Wuhan, Peoples R China
关键词
kernel function; location-based service; privacy preservation; RBF kernel;
D O I
10.1002/cpe.6014
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The frequent data leak scandals of recent years indicate that service providers who hold personal data may not be reliable as they claim. We assert that sensitive user information must be sanitized locally before it is sent to service providers if it is to be protected. The LPPK privacy-preserving framework presented in this article is a local sanitization scheme, for location-based services (LBSs). It applies a fog-computing structure in which a private map is generated by the LBS server with kernel transformation for each user. A fog device then provides location services for each user according to the private map. Without colluding, neither the LBS server nor the fog device can deduce a user's real location. Experiments conducted on real-world data sets demonstrate that LPPK delivers sufficient query accuracy at a level significantly higher than existing approaches while preserving location privacy.
引用
收藏
页数:15
相关论文
共 29 条
[1]   User-side adaptive protection of location privacy in participatory sensing [J].
Agir, Berker ;
Papaioannou, Thanasis G. ;
Narendula, Rammohan ;
Aberer, Karl ;
Hubaux, Jean-Pierre .
GEOINFORMATICA, 2014, 18 (01) :165-191
[2]  
Andres M. E., 2013, ACM CCS, P901
[3]  
[Anonymous], 2004, Kernel methods for pattern analysis
[4]   Optimal Geo-Indistinguishable Mechanisms for Location Privacy [J].
Bordenabe, Nicolas E. ;
Chatzikokolakis, Konstantinos ;
Palamidessi, Catuscia .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :251-262
[5]  
Chang Y., 2010, J. Mach. Learn. Res., V11, P1471
[6]  
Chatzikokolakis K, 2015, LECT NOTES COMPUT SC, V8956, P49, DOI 10.1007/978-3-319-14977-6_4
[7]   Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers [J].
Dewri, Rinku .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (12) :2360-2372
[8]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[9]   A Firm Foundation for Private Data Analysis [J].
Dwork, Cynthia .
COMMUNICATIONS OF THE ACM, 2011, 54 (01) :86-95
[10]   A K-Anonymity Based Schema for Location Privacy Preservation [J].
Fei, Fan ;
Li, Shu ;
Dai, Haipeng ;
Hu, Chunhua ;
Dou, Wanchun ;
Ni, Qiang .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02) :156-167