Protecting query privacy with differentially private k-anonymity in location-based services

被引:27
作者
Wang, Jinbao [1 ]
Cai, Zhipeng [2 ]
Li, Yingshu [2 ]
Yang, Donghua [1 ]
Li, Ji [2 ]
Gao, Hong [1 ]
机构
[1] Harbin Inst Technol, Harbin, Heilongjiang, Peoples R China
[2] Georgia State Univ, Atlanta, GA 30303 USA
基金
中国博士后科学基金; 中国国家自然科学基金; 美国国家科学基金会;
关键词
k-Anonymity; Differential privacy; Query privacy; Location-based service;
D O I
10.1007/s00779-018-1124-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, location-based services (LBS) are facilitating people in daily life through answering LBS queries. However, privacy issues including location privacy and query privacy arise at the same time. Existing works for protecting query privacy either work on trusted servers or fail to provide sufficient privacy guarantee. This paper combines the concepts of differential privacy and k-anonymity to propose the notion of differentially private k-anonymity (DPkA) for query privacy in LBS. We recognize the sufficient and necessary condition for the availability of 0-DPkA and present how to achieve it. For cases where 0-DPkA is not achievable, we propose an algorithm to achieve epsilon-DPkA with minimized epsilon. Extensive simulations are conducted to validate the proposed mechanisms based on real-life datasets and synthetic data distributions.
引用
收藏
页码:453 / 469
页数:17
相关论文
共 42 条
[1]  
Ahmadzadeh R, 2017, DISCRET MATH ALGORIT, V9, DOI 10.1142/S1793830917500343
[2]  
Andres M. E., 2013, P ACM SIGSAC C COMP, P901
[3]  
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI DOI 10.1145/2382196.2382261
[4]  
Bamba B., 2008, Proceeding of 17th International Conference on World Wide Web, P237, DOI DOI 10.1145/1367497.1367531
[5]   Optimal Geo-Indistinguishable Mechanisms for Location Privacy [J].
Bordenabe, Nicolas E. ;
Chatzikokolakis, Konstantinos ;
Palamidessi, Catuscia .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :251-262
[6]  
Boyd K, 2015, P 8 ACM WORKSH ART I, P15
[7]   Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks [J].
Cai, Zhipeng ;
He, Zaobo ;
Guan, Xin ;
Li, Yingshu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :577-590
[8]   An Android-Based Mechanism for Energy Efficient Localization Depending on Indoor/Outdoor Context [J].
Capurso, Nicholas ;
Song, Tianyi ;
Cheng, Wei ;
Yu, Jiguo ;
Cheng, Xiuzhen .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02) :299-307
[9]  
Chen LS, 2015, PROC INT CONF DATA, P255, DOI 10.1109/ICDE.2015.7113289
[10]  
Chen X., 2013, P 3 ACM C DAT APPL S, P37, DOI DOI 10.1145/2435349.2435354