A Generalization-Based POI Query Privacy Preserving Scheme

被引:0
作者
Feng, Yunxia [1 ]
Li, Xu [2 ]
机构
[1] Qingdao Univ Sci & Technol, Coll Informat Sci & Technol, Qingdao 266061, Peoples R China
[2] Qingdao Univ Sci & Technol, Coll Electromech Engn, Qingdao 266061, Peoples R China
来源
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC, CONTROL AND AUTOMATION ENGINEERING (MECAE 2017) | 2017年 / 61卷
基金
中国国家自然科学基金;
关键词
Location Privacy preserving; POI query; K-anonymity; Generalizationd; LOCATION PRIVACY; K-ANONYMITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Point of interest (POI) is a special kind of point location that combines some information that people may find useful or interesting. Thus, POI query may disclose directly people's sensitive information. Current location anonymity schemes do not pay close attention to information added to locations, whereas cryptographic-based privacy information retrieval (PIR) protocol is too complex for the POI query. This paper studies the problem of privacy preserving in POI query system. Based on characteristics of POI category architecture, we present a generation based k-anonymity POI query scheme. Main idea of the proposed scheme is to decrease the ability of leaking privacy information by using the generalized characteristic of POI architecture. Other advantages of the proposed strategy are as follows: it is a personalized location preserving strategy, and it can be implemented easily on smart mobile devices without supporting of any third part.
引用
收藏
页码:33 / 38
页数:6
相关论文
共 15 条
  • [1] Ackerman MS, 2000, ACM C EL COMM, P1
  • [2] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [3] A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users
    Feng, Yunxia
    Liu, Peng
    Zhang, Jianhui
    [J]. 2012 IEEE 8TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2012, : 92 - 98
  • [4] Gedik B., 2005, IEEE INT C DISTR COM
  • [5] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [6] Ghinita G., 2008, P ACM SIGMOD INT C M, P121, DOI DOI 10.1145/1376616.1376631
  • [7] A reciprocal framework for spatial K-anonymity
    Ghinita, Gabriel
    Zhao, Keliang
    Papadias, Dimitris
    Kalnis, Panos
    [J]. INFORMATION SYSTEMS, 2010, 35 (03) : 299 - 314
  • [8] Gruteser M., 2003, MOBISYS
  • [9] Meyerowitz J., 2009, ACM MOBICOM
  • [10] Nearest Neighbor Search with Strong Location Privacy
    Papadopoulos, Stavros
    Bakiras, Spiridon
    Papadias, Dimitris
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2010, 3 (01): : 619 - 629