LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

被引:7
作者
Chen, Ming [1 ]
Li, Wenzhong [1 ]
Chen, Xu [2 ,3 ]
Li, Zhuo [4 ]
Lu, Sanglu [1 ]
Chen, Daoxu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
[2] Univ Gottingen, Inst Comp Sci, Gottingen, Germany
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Beijing Informat Sci & Technol Univ, Sch Comp Sci & Tecnol, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
SMARTPHONE COLLABORATION; INCENTIVE MECHANISMS; DATA-ACQUISITION;
D O I
10.1155/2016/7164126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have witnessed the rapid growth of location-based services (LBSs) for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS) based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users' location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache contentmaintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.
引用
收藏
页数:16
相关论文
共 36 条
[1]  
[Anonymous], 2011, P 9 INT C MOBILE SYS
[2]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[3]  
Cheng R, 2006, LECT NOTES COMPUT SC, V4258, P393
[4]  
Chow Chi-Yin., 2006, P 14 ANN ACM INT S A, P171, DOI DOI 10.1145/1183471.1183500
[5]  
Doer B, 2012, COMMUN ACM, V55, P70, DOI 10.1145/2184319.2184338
[6]   Motivating Smartphone Collaboration in Data Acquisition and Distributed Computing [J].
Duan, Lingjie ;
Kubo, Takeshi ;
Sugiyama, Kohei ;
Huang, Jianwei ;
Hasegawa, Teruyuki ;
Walrand, Jean .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (10) :2320-2333
[7]  
Duan LJ, 2012, IEEE INFOCOM SER, P1701, DOI 10.1109/INFCOM.2012.6195541
[8]  
Espinoza F., 2001, P INT S UB COMP UB 0
[9]  
Galdames P, 2012, IEEE INFOCOM SER, P2480, DOI 10.1109/INFCOM.2012.6195639
[10]   Location privacy in mobile systems: A personalized anonymization model [J].
Gedik, B ;
Liu, L .
25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, :620-629