RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network

被引:4
作者
Zhang, Jinquan [1 ,2 ]
Yuan, Yanfeng [1 ]
Wang, Xiao [1 ]
Ni, Lina [1 ,2 ,3 ]
Yu, Jiguo [4 ,5 ,6 ]
Zhang, Mengmeng [1 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[2] Shandong Univ Sci & Technol, Shandong Prov Key Lab Wisdom Mine Informat Techno, Qingdao 266590, Peoples R China
[3] Tongji Univ, Key Lab, Minist Educ Embedded Syst & Serv Comp, Shanghai 201804, Peoples R China
[4] Qufu Normal Univ, Sch Informat Sci & Engn, Jining 276826, Shandong, Peoples R China
[5] Qilu Univ Technol, Shandong Acad Sci, Jinan 250353, Shandong, Peoples R China
[6] Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan, Jinan 250014, Shandong, Peoples R China
关键词
IOT APPLICATIONS; K-ANONYMITY; SECURITY; PROTOCOL; MODEL;
D O I
10.1155/2018/6829326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Applying the proliferated location-based services (LBSs) to social networks has spawned mobile social network (MSN) services that allow users to discover potential friends around them. While enjoying the convenience of MSN services, the mobile users also are confronted with the risk of location disclosure, which is a severe privacy preserving concern. In this paper, we focus on the problem of location privacy preserving in MSN. Particularly, we propose a repartitioning anonymous region for location privacy preserving (RPAR) scheme based on the central anonymous location which minimizes the traffic between the anonymous server and the LBS server while protecting the privacy of the user location. Furthermore, our scheme enables the users to get more accurate query results, thus improving the quality of the location service. Simulation results show that our proposed scheme can effectively reduce the area of anonymous regions and minimize the traffic.
引用
收藏
页数:10
相关论文
共 46 条
  • [1] Alrawais A., 2018, IEEE T VEH TECHNOL
  • [2] [Anonymous], 2012, PROC 5 ACM INT C WEB, DOI DOI 10.1145/2124295.2124380
  • [3] [Anonymous], IEEE T VEHICULAR TEC
  • [4] Bamba B., 2008, Proceeding of 17th International Conference on World Wide Web, P237, DOI DOI 10.1145/1367497.1367531
  • [5] Cai Z., 2018, IEEE TRANSACTIONS ON
  • [6] Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
    Cai, Zhipeng
    He, Zaobo
    Guan, Xin
    Li, Yingshu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 577 - 590
  • [7] Chen D, 2015, IEEE ICC, P7347, DOI 10.1109/ICC.2015.7249500
  • [8] On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks
    Chen, Honglong
    Lou, Wei
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 16 : 36 - 50
  • [9] Damiani M. L., 2012, SECURITY COMMUNICATI, V244, P223
  • [10] Duckham M, 2005, LECT NOTES COMPUT SC, V3468, P152