A location data protection protocol based on differential privacy

被引:2
作者
Guo, Ping [1 ]
Ye, Baopeng [2 ]
Chen, Yuling [1 ]
Li, Tao [1 ]
Yang, Yixian [3 ]
Qian, Xiaobin [4 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
[2] Informat Technol Innovat Serv Ctr Guizhou Prov, Guiyang, Peoples R China
[3] Beijing Univ Posts & Telecommnuicat, Sch Cyberspace Secur, Beijing, Peoples R China
[4] Guizhou CoVis Sci & Technol Co Ltd, Guiyang, Peoples R China
来源
2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021 | 2021年
基金
中国国家自然科学基金;
关键词
Location-based services; Smart contract; Differential; privacy; Data availability; Privacy protection;
D O I
10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00060
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services (LBS) is geo-location-based a mobile information service based on spatial location that adopts wireless positioning, GIS, Internet, wireless communication, database and other related technologies. which brings both convenience and vulnerability. With the increasing of scale and value of data, most existing location privacy protection protocols cannot balance privacy and utility. To solve the revealing problems in LBS, in this paper, we first design an algorithm of the best-assisted user selection (BaUS) for constructing anonymity sets. Next, we contract a smart contract to evaluate reputation, to ensure the honesty of participants. And then a differential privacy protection protocol is proposed. The theoretical analysis and experiments show that the proposed protocol can resist background knowledge attacks effectively. Meanwhile, our protocol can improve data availability. Particularly, it realizes usercontrollable privacy protection which enhances privacy preservation and better security.
引用
收藏
页码:306 / 311
页数:6
相关论文
共 24 条
[1]  
[Anonymous], 2006, LECT NOTES COMPUT SC, V4052, DOI [10.1007/11787006-1, DOI 10.1007/11787006-1]
[2]  
Bi X. D., 2017, J SHANDONG U SCI EDI, P84
[3]   PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs [J].
Chen, Yuling ;
Sun, Jing ;
Yang, Yixian ;
Li, Tao ;
Niu, Xinxin ;
Zhou, Huiyu .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (02) :1204-1221
[4]  
Dwork C., LECT NOTES COMPUT SC
[5]  
Dwork C., 2006, ADV CRYPTOLOGY EUROC, V4004, DOI [10.1007/11761679-29, DOI 10.1007/11761679-29]
[6]  
Dwork C, 2016, Arxiv, DOI arXiv:1603.01887
[7]   Optimal Noise Adding Mechanisms for Approximate Differential Privacy [J].
Geng, Quan ;
Viswanath, Pramod .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (02) :952-969
[8]   KCLP: A K-MEANS CLUSTER-BASED LOCATION PRIVACY PROTECTION SCHEME IN WSNS FOR IOT [J].
Han, Guangjie ;
Wang, Hao ;
Guizani, Mohsen ;
Chan, Sammy ;
Zhang, Wenbo .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) :84-90
[9]  
[霍峥 Huo Zheng], 2018, [计算机学报, Chinese Journal of Computers], V41, P400
[10]   The matrix mechanism: optimizing linear counting queries under differential privacy [J].
Li, Chao ;
Miklau, Gerome ;
Hay, Michael ;
McGregor, Andrew ;
Rastogi, Vibhor .
VLDB JOURNAL, 2015, 24 (06) :757-781