Location privacy protection algorithm for mobile networks

被引:0
作者
Kun Gao
Yiwei Zhu
Songjie Gong
Hengsong Tan
机构
[1] Zhejiang Business Technology Institute,Big Data Deep Analyzing Institute
来源
EURASIP Journal on Wireless Communications and Networking | / 2016卷
关键词
Location privacy; Location-based service; Mobile network;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile users often post nearest neighbor queries based on their current location. Usually, the mobile terminal (user) sends a request to query an untrusted location server, including the position information of the mobile terminal requests, thus leading to the disclosure of one’s location. For mobile users providing location services, the privacy of mobile users is crucial. This demand is particularly evident in the mobile network application. According to the structural characteristics of the mobile network, the use of hidden ring and hidden tree can blur mobile subscriber location information in the mobile network and effectively ensure location privacy. This paper proposes a new method of protecting location privacy known as Hidden Ring and Hidden Forest (HRHF), which is the use of breadth-first search to meet certain requirements of the ring and forest in the graph. Based on experimental testing of real and simulated data sets, the HRHF method has demonstrated its effectiveness in protecting location privacy and efficiency in providing quality services.
引用
收藏
相关论文
共 32 条
[1]  
Xu Z(2016)Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media EURASIP J Wirel Commun Netw. 2016 1-9
[2]  
de Montjoye Y-A(2013)Unique in the crowd: the privacy bounds of human mobility Sci Rep 3 1376-1611
[3]  
Dinh HT(2013)A survey of mobile cloud computing: architecture, applications, and approaches Wirel. Commun. Mob. Comput. 13 1587-1299
[4]  
Enck W(2014)TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones ACM Trans. Comput. Syst. 32 5-8
[5]  
Khan AN(2013)Towards secure mobile cloud computing: a survey Futur. Gener. Comput. Syst. 29 1278-22
[6]  
Li K(2012)Building a targeted mobile advertising system for location-based services Decis.Support. Syst 54 1-139
[7]  
Du TC(2013)Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications IEEE Wirel. Commun. 20 14-733
[8]  
Liu F(2012)A dynamic privacy-preserving key management scheme for location-based services in VANETs IEEE Trans. Intell. Transp. Syst. 13 127-130
[9]  
Lu R(2013)Privacy vulnerability of published anonymous mobility traces IEEE/ACM Trans. Networking 21 720-15
[10]  
Ma CY(2013)On providing location privacy for mobile sinks in wireless sensor networks Wirel. Netw 19 115-1519