Location Privacy Preservation for Mobile Users in Location-Based Services

被引:49
作者
Sun, Gang [1 ]
Cai, Shuai [1 ]
Yu, Hongfang [1 ]
Maharjan, Sabita [2 ]
Chang, Victor [3 ]
Du, Xiaojiang [4 ]
Guizani, Mohsen [5 ]
机构
[1] Univ Elect Sci & Technol China, Minist Educ, Key Lab Opt Fiber Sensing & Commun, Chengdu 611731, Sichuan, Peoples R China
[2] Univ Oslo, Simula Res Lab, N-0316 Oslo, Norway
[3] Xian Jiaotong Liverpool Univ, Int Business Sch Suzhou, Suzhou 215123, Peoples R China
[4] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[5] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
关键词
Location privacy preservation; location-based service; semantic information; mobile users; ACHIEVING K-ANONYMITY;
D O I
10.1109/ACCESS.2019.2925571
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research challenges. In this paper, we propose a region-of-interest division-based algorithm to Preserve the location Privacy of mobile device users in location-based Cyber Services (PPCS). Unlike existing methods, our proposed PPCS approach generates dummy locations while considering the semantic information of those locations. The PPCS algorithm enables the generated locations to exclude or reduce the exposure of a user's real location. In our analysis, we demonstrate that PPCS is resilient to both colluding attacks and inference attacks. We also evaluate the efficiency and demonstrate the utility of our proposed approach through extensive simulations.
引用
收藏
页码:87425 / 87438
页数:14
相关论文
共 33 条
[1]  
[Anonymous], 2006, PEER TO PEER SPATIAL
[2]   An Obfuscation-Based Approach for Protecting Location Privacy [J].
Ardagna, Claudio A. ;
Cremonini, Marco ;
di Vimercati, Sabrina De Capitani ;
Samarati, Pierangela .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :13-27
[3]   A cybernetics Social Cloud [J].
Chang, Victor .
JOURNAL OF SYSTEMS AND SOFTWARE, 2017, 124 :195-211
[4]  
Chang V, 2016, IEEE T SERV COMPUT, V9, P138, DOI [10.1109/TSC.2015.2491281, 10.1109/ISSNIP.2015.7106910]
[5]  
Fenghua Li, 2016, 2016 IEEE Wireless Communications and Networking Conference: Workshops (WCNCW), P465, DOI 10.1109/WCNCW.2016.7552744
[6]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[7]   P4QS: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications [J].
Ghaffari, Meysam ;
Ghadiri, Nasser ;
Manshaei, Mohammad Hossein ;
Lahijani, Mehran Sadeghi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (10) :9458-9469
[8]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42
[9]  
Gupta R., J COMMUN NETW, V19, P239
[10]   An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey [J].
Gupta, Ruchika ;
Rao, Udai Pratap .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) :1973-2007