Authentication User's Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services

被引:55
作者
Memon, Imran [1 ,2 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Zhejiang, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
关键词
Location based services (LBSs); Privacy preservation; Query linking privacy; Quality of service (QoS);
D O I
10.1007/s11277-015-2300-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Location based services (LBSs) are gaining importance due to the advancement in mobile networks and positioning technologies. The proliferation of location-based services in recent years has highlighted the need to consider location privacy. This has led to the development of methods enhancing location privacy, and to the investigation of reasons for sharing location information. While computational attacks on location privacy and their prevention have attracted a lot of research, attacks based on humans strategies and tactics have mostly been considered implicitly. Nevertheless, in querying LBSs, a user send its exact locations to their location service providers but in the process, location information of the users are misused either purposefully or otherwise by service providers creating privacy issues for users. It has therefore become important that mechanisms necessary to protect the privacy of users are adopted when querying location based services. It's on this premise that we introduced a novel query privacy algorithm called the authentication speed dynamic transportation mode cloaking algorithm for continuous query LBSs that considers users' similarity in speed, direction and travelling with the same transport mode for cloaking for anonymization. Experimental evaluation of the algorithm on a real world map shows that our model ensures total privacy for users, enhanced privacy guarantee, improves quality of service significantly and achieved an excellent performance measure also we compare our method with existing privacy protection methods such as V-DCA, DSDCA, AVD-DCA, D-TC and GCA.
引用
收藏
页码:1585 / 1600
页数:16
相关论文
共 30 条
[1]  
Ahmadinejad S. H., 2013, ASIA CCS 13
[2]  
Akhtar R., 2013, SOURCE P SPIE INT SO, V8768
[3]   Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery [J].
Akhtar, Rizwan ;
Leng, Supeng ;
Memon, Imran ;
Ali, Mushtaq ;
Zhang, Liren .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (01) :85-96
[4]  
[Anonymous], 2008, NETWORK BASED GENERA
[5]  
CHENG R, 2006, P PRIV ENH TECHN WOR
[6]   Query-aware location anonymization for road networks [J].
Chow, Chi-Yin ;
Mokbel, Mohamed F. ;
Bao, Jie ;
Liu, Xuan .
GEOINFORMATICA, 2011, 15 (03) :571-607
[7]  
Domenic KM, 2013, PR INT CONF INF MANA, P352, DOI 10.1109/ICIII.2013.6702947
[8]  
Du J., 2007, P C MOB DAT MAN MDM
[9]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[10]  
Gruteser M., 2003, MOBISYS 03