A Cloaking-Based Approach to Protect Location Privacy in Location-Based Services

被引:0
作者
Zheng Jiangyu [1 ,2 ]
Tan Xiaobin [1 ,2 ]
Zou, Cliff [3 ]
Niu Yukun [1 ,2 ]
Jin, Zhu [1 ,2 ]
机构
[1] Univ Sci & Technol China, CAS Key Lab Technol Geospatial Informat Proc & Ap, Hefei 230026, Peoples R China
[2] Univ Sci & Technol China, Dept Automat, Hefei 230026, Peoples R China
[3] Univ Cent Florida, Dept Elect Engn & Comp Sci, Orlando, FL 32816 USA
来源
2014 33RD CHINESE CONTROL CONFERENCE (CCC) | 2014年
关键词
Location-based Services; Location Privacy; k-anonymity; Cloaking Area; K-ANONYMITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of mobile devices, the location-based service (LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a user expects to report his own location as far as possible away from his real location to protect his location privacy. On the other hand, in order to obtain high quality of service (QoS), users are required to report their locations as accurate as possible. To achieve the dedicated tradeoff between privacy requirement and QoS requirement, we propose a novel approach based on cloaking technique. We also discuss the disadvantage of the traditional general system model and propose an improved model. The basic idea of our approach is to select a sub-area from the generated cloaking area as user's reported location. The sub-area may not contain a user's real location, which prevents an adversary from performing attack with side information. Specifically, by defining an objective function with a novel location privacy metric and a QoS metric, we are able to convert the privacy issue to an optimization problem. Then, location privacy metric and QoS metric are given. To reduce the complexity of the optimization, a heuristic algorithm is proposed. Through privacy-preserving analysis and comparison with related work [8], we demonstrate the effectiveness and efficiency of our approach.
引用
收藏
页码:5459 / 5464
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI DOI 10.1145/2382196.2382261
[2]   An Obfuscation-Based Approach for Protecting Location Privacy [J].
Ardagna, Claudio A. ;
Cremonini, Marco ;
di Vimercati, Sabrina De Capitani ;
Samarati, Pierangela .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :13-27
[3]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[4]  
Duckham M, 2005, LECT NOTES COMPUT SC, V3468, P152
[5]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[6]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42
[7]  
Kido H, 2005, INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES 2005, PROCEEDINGS, P88
[8]  
Li M, 2013, IEEE INFOCOM SER, P3012
[9]  
Liu XX, 2013, IEEE INFOCOM SER, P2985
[10]   SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones [J].
Quercia, Daniele ;
Leontiadis, Ilias ;
McNamara, Liam ;
Mascolo, Cecilia ;
Crowcroft, Jon .
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, :363-372