Location Privacy Protection Scheme for LBS in IoT

被引:9
作者
Li, Hongtao [1 ,2 ]
Xue, Xingsi [3 ]
Li, Zhiying [1 ]
Li, Long [4 ]
Xiong, Jinbo [5 ]
机构
[1] Shanxi Normal Univ, Coll Math & Comp Sci, Linfen 041000, Shanxi, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[3] Fujian Univ Technol, Sch Comp Sci & Math, Fuzhou 350118, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[5] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350118, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTHENTICATION PROTOCOL; MIX-ZONES; ANONYMITY;
D O I
10.1155/2021/9948543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of Internet of Things (IoT) technology has promoted location-based service (LBS) applications. Users can enjoy various conveniences brought by LBS by providing location information to LBS. However, it also brings potential privacy threats to location information. Location data that contains private information is often transmitted among IoT networks in LBS, and such privacy information should be protected. In order to solve the problem of location privacy leakage in LBS, a location privacy protection scheme based on k-anonymity is proposed in this paper, in which the Geohash coding model and Voronoi graph are used as grid division principles. We adopt the client-server-to-user (CS2U) model to protect the user's location data on the client side and the server side, respectively. On the client side, the Geohash algorithm is proposed, which converts the user's location coordinates into a Geohash code of the corresponding length. On the server side, the Geohash code generated by the user is inserted into the prefix tree, the prefix tree is used to find the nearest neighbors according to the characteristics of the coded similar prefixes, and the Voronoi diagram is used to divide the area units to complete the pruning. Then, using the Geohash coding model and the Voronoi diagram grid division principle, the G-V anonymity algorithm is proposed to find k neighbors in an anonymous area so that the user's location data meets the k-anonymity requirement in the area unit, thereby achieving anonymity protection of location privacy. Theoretical analysis and experimental results show that our method is effective in terms of privacy and data quality while reducing the time of data anonymity.
引用
收藏
页数:18
相关论文
共 37 条
[1]  
[Anonymous], 2020, KNOWL-BASED SYST, DOI DOI 10.1016/j.knosys.2020.105940
[2]  
Arain Q.A., 2016, J INFORM COMMUNICATI, P10
[3]   Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks [J].
Arain, Qasim Ali ;
Deng Zhongliang ;
Memon, Imran ;
Arain, Salman ;
Shaikh, Faisal Kareem ;
Zubedi, Asma ;
Unar, Mukhtiar Ali ;
Ashraf, Aisha ;
Shaikh, Roshan .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) :505-521
[4]   Privacy-preserving authentication scheme for on-road on-demand refilling of pseudonym in VANET [J].
Benarous, Leila ;
Kadri, Benamar ;
Bitam, Salim ;
Mellouk, Abdelhamid .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (10)
[5]   Social space keyword query based on semantic trajectory [J].
Cao, Keyan ;
Sun, Qimeng ;
Liu, Haoli ;
Liu, Yefan ;
Meng, Gongjie ;
Guo, Jingjing .
NEUROCOMPUTING, 2021, 428 (428) :340-351
[6]   Casper: Query Processing for Location Services without Compromising Privacy [J].
Chow, Chi-Yin ;
Mokbel, Mohamed F. ;
Aref, Walid G. .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 2009, 34 (04)
[7]   VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services [J].
Gupta, Ruchika ;
Rao, Udai Pratap .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (02) :1041-1059
[8]   Achieving Location Privacy through CAST in Location Based Services [J].
Gupta, Ruchika ;
Rao, Udai Pratap .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2017, 19 (03) :239-249
[9]   A Hybrid Location Privacy Solution for Mobile LBS [J].
Gupta, Ruchika ;
Rao, Udai Pratap .
MOBILE INFORMATION SYSTEMS, 2017, 2017
[10]  
Gupta Shreya, 2019, 2019 4th International Conference on Information Systems and Computer Networks (ISCON), P42, DOI 10.1109/ISCON47742.2019.9036149