Long-term location privacy protection for location-based services in mobile cloud computing

被引:20
作者
Tang, Feilong [1 ]
Li, Jie [1 ]
You, Ilsun [2 ]
Guo, Minyi [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Korean Bible Univ, Sch Informat Sci, Seoul, South Korea
基金
中国国家自然科学基金;
关键词
Soft computing; Privacy protection; Dummy generation; Location-based services; Mobile cloud computing; SMART;
D O I
10.1007/s00500-015-1703-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The popularity of mobile devices, especially intelligent mobile phones, significantly prompt various location-based services (LBSs) in cloud systems. These services not only greatly facilitate people's daily lives, but also cause serious threats that users' location information may be misused or leaked by service providers. The dummy-based privacy protection techniques have significant advantages over others because they neither rely on trusted servers nor need adequate number of trustworthy peers. Existing dummy-based location privacy protection schemes, however, cannot yet provide long-term privacy protection. In this paper, we propose four principles for the dummy-based long-term location privacy protection (LT-LPP). Based on the principles, we propose a set of long-term consistent dummy generation algorithms for the LT-LPP. Our approach is built on soft computing techniques and can balance the preferred privacy protection and computing cost. Comprehensive experimental results demonstrate that our approach is effective to both long-term privacy protection and fake path generation for LBSs in mobile clouds.
引用
收藏
页码:1735 / 1747
页数:13
相关论文
共 38 条
[11]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[12]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42
[13]   A soft computing based location-aware access control for smart buildings [J].
Hernandez, Jose L. ;
Moreno, M. Victoria ;
Jara, Antonio J. ;
Skarmeta, Antonio F. .
SOFT COMPUTING, 2014, 18 (09) :1659-1674
[14]  
Kido H, 2005, INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES 2005, PROCEEDINGS, P88
[15]   Design of "Personalized" Classifier Using Soft Computing Techniques for "Personalized" Facial Expression Recognition [J].
Kim, Dae-Jin ;
Bien, Zeungnam .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2008, 16 (04) :874-885
[16]  
Krumm J, 2009, LECT NOTES COMPUT SC, V5538, P25, DOI 10.1007/978-3-642-01516-8_4
[17]   The simulation of an emotional robot implemented with fuzzy logic [J].
Leu, Fang-Yie ;
Liu, Jung-chun ;
Hsu, Ya-Ting ;
Huang, Yi-Li .
SOFT COMPUTING, 2014, 18 (09) :1729-1743
[18]   A novel network mobility handoff scheme using SIP and SCTP for multimedia applications [J].
Leu, Fang-Yie .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (05) :1073-1091
[19]   An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks [J].
Liang, Hongbin ;
Cai, Lin X. ;
Huang, Dijiang ;
Shen, Xuemin ;
Peng, Daiyuan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (05) :2222-2232
[20]   A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k-NN Search [J].
Lien, I. -Ting ;
Lin, Yu-Hsun ;
Shieh, Jyh-Ren ;
Wu, Ja-Ling .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) :863-873