Protecting Location Privacy Based on Historical Users over Road Networks

被引:0
作者
Han, Qilong [1 ]
Zhao, Hongbin [1 ]
Ma, Zhiqiang [1 ]
Zhang, Kejia [1 ]
Pan, Haiwei [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Peoples R China
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2014 | 2014年 / 8491卷
关键词
location based services; location privacy; road network; density-based clustering;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, with the extensive application of the location based services (LBS), more and more location privacy problems have happened. To use LBSs, users must send their location information to service provider, but users' location information is private. The current methods have some flaws, such as in Euclidean space and so on. In this paper, a based historical user dummy generation (BHUDG) scheme is proposed, which can provide location privacy by utilizing density-based clustering method in a real road network environment. We investigate the effectiveness of BHUDG based on extensive simulation study. Simulation results show that our proposed scheme has a better performance.
引用
收藏
页码:347 / 355
页数:9
相关论文
共 10 条
  • [1] [Anonymous], J COMPUTER SCI FRONT
  • [2] [Anonymous], 2007, P MDM 2007
  • [3] Anonymous usage of location-based services through spatial and temporal cloaking
    Gruteser, M
    Grunwald, D
    [J]. PROCEEDINGS OF MOBISYS 2003, 2003, : 31 - 42
  • [4] Kido H., 2005, 21 INT C DAT ENG WOR, P1248
  • [5] Location Privacy in Sparse Environment
    Liu, Heng
    Wang, Tiejun
    Sun, Ming
    Liu, Zhen
    Zhou, Mingtian
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 258 - 261
  • [6] Lu Hua., 2008, Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, P16, DOI DOI 10.1145/1626536.1626540
  • [7] Meng X., 2010, CCCF, V6, P16
  • [8] Suzuki A., 2010, P 18 SIGSPATIAL INT, V2010, P398, DOI [DOI 10.1145/1869790.1869846, 10.1145/1869790.1869846]
  • [9] Xu T, 2008, IEEE INFOCOM SER, P1220
  • [10] A k-anonymity model for spatio-temporal data
    Zacharouh, Polixeni
    Gkoulalas-Divanis, Aris
    Verykios, Vassihos S.
    [J]. 2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1-2, 2007, : 555 - 564