A Dual Privacy Preserving Scheme in Continuous Location-Based Services

被引:10
作者
Zhang, Shaobo [1 ,2 ]
Wang, Guojun [3 ]
Liu, Qin [4 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
[4] Hunan Univ, Sch Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
来源
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS | 2017年
基金
中国国家自然科学基金;
关键词
Location-Based Services; Trajectory and Content Privacy; Multiple Anonymizers; Shamir Threshold; K-anonymity; QUERY PRIVACY; PROTECTION; ALGORITHMS; USERS;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.264
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To address the risk of location privacy disclosure in location-based services (LBSs), existing solutions generally introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information in jeopardy. In this paper, we propose a dual privacy preserving (DPP) scheme in continuous LBSs to protect the users' trajectory and query privacy. Our scheme introduces multiple anonymizers between the users and LSP, and combines with Shamir threshold mechanism and K-anonymity technology to improve the users' trajectory and content privacy in continuous LBSs. An anonymizer alone cannot get the users' trajectory and query contents, and it thus can be semi-trusted. Our scheme can enhance the users' privacy and solve the single point failure in single anonymizer structure. The security analysis demonstrate that the proposed scheme has the ability to protect users' trajectory and content privacy effectively.
引用
收藏
页码:402 / 408
页数:7
相关论文
共 22 条
  • [1] [Anonymous], 2015, IEEE GLOBECOM
  • [2] An Obfuscation-Based Approach for Protecting Location Privacy
    Ardagna, Claudio A.
    Cremonini, Marco
    di Vimercati, Sabrina De Capitani
    Samarati, Pierangela
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) : 13 - 27
  • [3] Chow Chi-Yin., 2006, P 14 ANN ACM INT S A, P171, DOI DOI 10.1145/1183471.1183500
  • [4] CHOW CY, 2007, P 10 INT C ADV SPAT, V4605, P258
  • [5] Evaluating Location Privacy in Vehicular Communications and Applications
    Corser, George P.
    Fu, Huirong
    Banihani, Abdelnasser
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (09) : 2658 - 2667
  • [6] TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
    Gao, Sheng
    Ma, Jianfeng
    Shi, Weisong
    Zhan, Guoxing
    Sun, Cong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 874 - 887
  • [7] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [8] Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing
    Grissa, Mohamed
    Yavuz, Attila A.
    Hamdaoui, Bechir
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) : 418 - 431
  • [9] A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection
    Hwang, Ren-Hung
    Hsueh, Yu-Ling
    Chung, Hao-Wei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2014, 7 (02) : 126 - 139
  • [10] Vu K, 2012, IEEE INFOCOM SER, P2399, DOI 10.1109/INFCOM.2012.6195629