Long-term location privacy protection for location-based services in mobile cloud computing

被引:20
作者
Tang, Feilong [1 ]
Li, Jie [1 ]
You, Ilsun [2 ]
Guo, Minyi [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Korean Bible Univ, Sch Informat Sci, Seoul, South Korea
基金
中国国家自然科学基金;
关键词
Soft computing; Privacy protection; Dummy generation; Location-based services; Mobile cloud computing; SMART;
D O I
10.1007/s00500-015-1703-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The popularity of mobile devices, especially intelligent mobile phones, significantly prompt various location-based services (LBSs) in cloud systems. These services not only greatly facilitate people's daily lives, but also cause serious threats that users' location information may be misused or leaked by service providers. The dummy-based privacy protection techniques have significant advantages over others because they neither rely on trusted servers nor need adequate number of trustworthy peers. Existing dummy-based location privacy protection schemes, however, cannot yet provide long-term privacy protection. In this paper, we propose four principles for the dummy-based long-term location privacy protection (LT-LPP). Based on the principles, we propose a set of long-term consistent dummy generation algorithms for the LT-LPP. Our approach is built on soft computing techniques and can balance the preferred privacy protection and computing cost. Comprehensive experimental results demonstrate that our approach is effective to both long-term privacy protection and fake path generation for LBSs in mobile clouds.
引用
收藏
页码:1735 / 1747
页数:13
相关论文
共 38 条
[1]  
Ahmad M. W., 2012, Proceedings of the 12th International Conference on Computational Science and Its Applications (ICCSA 2012), P26, DOI 10.1109/ICCSA.2012.15
[2]  
[Anonymous], IEEE S RES SEC PRIV
[3]  
[Anonymous], 2013, J WIRELESS MOBILE NE
[4]  
[Anonymous], 2007, P MDM 2007
[5]  
Ardagna CA, 2007, LECT NOTES COMPUT SC, V4602, P47
[6]   An Obfuscation-Based Approach for Protecting Location Privacy [J].
Ardagna, Claudio A. ;
Cremonini, Marco ;
di Vimercati, Sabrina De Capitani ;
Samarati, Pierangela .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :13-27
[7]   Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices [J].
Bilogrevic, Igor ;
Jadliwala, Murtuza ;
Joneja, Vishal ;
Kalkan, Kubra ;
Hubaux, Jean-Pierre ;
Aad, Imad .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) :1141-1156
[8]  
Chow Chi-Yin., 2006, P 14 ANN ACM INT S A, P171, DOI DOI 10.1145/1183471.1183500
[9]  
Chow R., 2009, P 8 ACM WORKSH PRIV, P105, DOI DOI 10.1145/1655188.1655204
[10]   Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers [J].
Dewri, Rinku .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (12) :2360-2372