A K-Anonymity Based Schema for Location Privacy Preservation

نویسندگان

  • Fan Fei
  • Haipeng Dai
  • Wanchun Dou
چکیده

In recent years, with the development of mobile devices, the location based services (LBSs) have become more and more prevailing and most applications installed on these devices call for location information. Yet, the untrusted LBS provider can collect these location information, which may potentially threaten users’ location privacy. In view of this challenge, we propose a two-tier schema for the privacy preservation based on k−anonymity principle meanwhile reduce the cost for privacy protection. Concretely, we divide the users into groups in order to maximize the privacy level and in each group one proxy is selected to generate dummy locations and share the returned results from LBS provider; then, on each group, an auction mechanism is proposed to determine the payment of each user to the proxy as the compensation, which satisfies budget balance and incentive compatibility. To evalue the performance of the proposed schema, a simulated experiment is conducted.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Clustering K-Anonymity Scheme for Location Privacy Preservation

The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of LocationBased Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity sche...

متن کامل

Research on Privacy Preserving on K-anonymity

The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...

متن کامل

Anonymization Based Location Privacy Preservation in Vehicular Ad Hoc Networks

The Vehicular Adhoc Networks (VANETs) are used for many safety related applications like accident avoidance, controlling traffic and emergency warning. All these applications require vehicles to broadcast their position, velocity, direction and identity during fixed intervals. It becomes necessary to preserve the location privacy of the vehicle since global attackers can collect obtain these va...

متن کامل

An Effective Scheme for Location Privacy in VANETs

Location privacy is an important concern in VANETs(Vehicular Ad hoc Networks). Anonymity is one of commonly adopted solution to protect location privacy. In this paper, we present a mechanism based on an ID-based cryptosystem in order to ensure vehicles’ anonymity by pseudonyms. In this mechanism, we adopt Pseudonyms Synchronously Change ( PSC ) scheme, which improves anonymity. In the schemes,...

متن کامل

Quality Aware Privacy Protection for Location-Based Services

Protection of users’ privacy has been a central issue for location-based services (LBSs). In this paper, we classify two kinds of privacy protection requirements in LBS: location anonymity and identifier anonymity. While the location cloaking technique under the k-anonymity model can provide a good protection of users’ privacy, it reduces the resolution of location information and, hence, may d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017