A differentially k-anonymity-based location privacy-preserving for mobile crowdsourcing systems

被引:18
作者
Wang, Yingjie [1 ,2 ]
Cai, Zhipeng [3 ]
Chi, Zhongyang [1 ]
Tong, Xiangrong [1 ]
Li, Lijie [4 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
[2] Yantai Univ, Sch Comp & Control Engn, Yantai 264005, Peoples R China
[3] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
[4] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Heilongjiang, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS | 2018年 / 129卷
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Mobile crowdsourcing; location privacy-preserving; k-anonymity; differential privacy;
D O I
10.1016/j.procs.2018.03.040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of mobile devices, the problem privacy leaking has become an important research focus in the field of mobile crowdsourcing. In order to guarantee the security and truthfulness of mobile crowdsourcing, this paper proposes a differentially k-anonymity location privacy-preserving for mobile crowdsourcing. Through combining k-anonymity and differential privacy-preserving, the differentially k-anonymity-based location privacy-preserving is proposed in order to prevent workers' location information from being leaked. Through comparison experiments, the effectiveness, adaptation and flexibility of the proposed differentially k-anonymity-based location privacy-preserving is verified. The differentially k-anonymity-based location privacy preserving can inspire workers to participate crowd tasks, and protect workers' location privacy effectively. Copyright (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:28 / 34
页数:7
相关论文
共 35 条
[1]  
Bamba B., 2008, P 17 INT C WORLD WID
[2]  
Boutsis I., 2013, P IEEE PERCOM SAN DI
[3]   Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks [J].
Cai, Zhipeng ;
He, Zaobo ;
Guan, Xin ;
Li, Yingshu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :577-590
[4]  
De Cristofaro E, 2011, P 4 ACM C WIR NETW S
[5]   Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI) [J].
De Cristofaro, Emiliano ;
Soriente, Claudio .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) :2021-2033
[6]   Participatory Privacy: Enabling Privacy in Participatory Sensing [J].
De Cristofaro, Emiliano ;
Soriente, Claudio .
IEEE NETWORK, 2013, 27 (01) :32-36
[7]   Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers [J].
Dewri, Rinku .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (12) :2360-2372
[8]  
Duan Z., 2017, IEEE INT C DISTR COM
[9]  
Dwork C., 2010, P 2010 ACM INT S THE
[10]   Demonstration of temporal cloaking [J].
Fridman, Moti ;
Farsi, Alessandro ;
Okawachi, Yoshitomo ;
Gaeta, Alexander L. .
NATURE, 2012, 481 (7379) :62-65