An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism

被引:2
作者
Xinghua Li
Meixia Miao
Hai Liu
Jianfeng Ma
Kuan-Ching Li
机构
[1] Xidian University,State Key Laboratory of Integrated Service Networks
[2] Xidian University,School of Cyber Engineering
[3] Providence University,Department of Computer Science and Information Engineering
来源
Soft Computing | 2017年 / 21卷
关键词
Location-based service; Privacy protection; Fuzzy logic; Distributed ; -anonymity; Incentive mechanism;
D O I
暂无
中图分类号
学科分类号
摘要
In the location-based service (LBS) privacy protection, the most common and classic solution is K-anonymity, however, existing schemes rarely consider the issue that whether other mobile users are willing to provide assistance to the requesters to form the K-anonymity set, thus leading to their poor practicability. In this paper, an incentive mechanism based on credit is introduced into the distributed K-anonymity, and only providing assistance to the others, a user can gain and accumulate his credit. Based on the fuzzy logic in the soft computing, a probability threshold is introduced to reflect a user’s reputation, and only when a user’s reputation reaches this threshold, can he get the assistance from other neighbors. Security analysis shows that our scheme is secure with respect to various typical attacks. And because of not relying on a trusted third party, our scheme can avoid the security issue resulting from its breach. Extensive experiments indicate that the time to form the anonymity set is short and it increases slowly as the value of K increases. Finally, the additional traffic introduced by this scheme is very limited.
引用
收藏
页码:3907 / 3917
页数:10
相关论文
共 21 条
[1]  
Chow CY(2009)Casper: query processing for location services without compromising privacy ACM Trans Database Syst 34 1-24
[2]  
Mokbel MF(2012)High-speed high-security signatures J Cryptogr Eng 2 77-89
[3]  
Aref WG(2014)Hybrid indoor and outdoor location services for new generation mobile terminals J Person Ubiquitiou Comput 18 271-285
[4]  
Daniel J(2008)Protecting location privacy with personalized k-anonymity: architecture and algorithms IEEE Trans Mobile Comput 7 1-18
[5]  
Bernstein Niels D(2014)A soft computing based location-aware access control for smart buildings Soft Comput 18 1659-1674
[6]  
Lange TJ(2005)A novel privacy preserving location-based service protocol with secret circular shift for k-nn search IEEE Trans Inf Forensics Secur 8 863-873
[7]  
Ficco M(2013)A multiclassifier approach for topology-based wifi indoor localization Soft Comput 17 1817-1831
[8]  
Palmieri F(undefined)undefined undefined undefined undefined-undefined
[9]  
Castiglione A(undefined)undefined undefined undefined undefined-undefined
[10]  
Gedik B(undefined)undefined undefined undefined undefined-undefined