Combining Spatial Cloaking and Dummy Generation for Location Privacy Preserving
详细信息    查看全文
  • 作者:Nana Xu (22) (23)
    Dan Zhu (22) (23)
    Hongyan Liu (24)
    Jun He (22) (23)
    Xiaoyong Du (22) (23)
    Tao Liu (22) (23)
  • 关键词:Location Privacy ; k ; Anonymity ; Spatial Cloaking ; Dummy Generation
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2012
  • 出版时间:2012
  • 年:2012
  • 卷:7713
  • 期:1
  • 页码:713-725
  • 全文大小:351KB
  • 参考文献:1. Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with PrivacyGrid. In: Proceedings of the International Conference on World Wide Web (2008)
    2. Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica聽15(2), 351鈥?80 (2011) CrossRef
    3. Duckham, M., Kulik, L.: Simulation of Obfuscation and Negotiation for Location Privacy. In: Cohn, A.G., Mark, D.M. (eds.) COSIT 2005. LNCS, vol.聽3693, pp. 31鈥?8. Springer, Heidelberg (2005) CrossRef
    4. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys聽42(4), 14:1鈥?4:53 (2010)
    5. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (2003)
    6. Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS (2005)
    7. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of IEEE International Conference on Pervasive Services (2005)
    8. Kido, H., Yanagisawa, Y., Satoh, T., Satoh, T.: Protection of Location Privacy using Dummies for Location-based Services. In: ICDE (2005)
    9. Lu, H., Jensen, C.S., Yiu, M.L.: PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services. In: MobiDE (2008)
    10. Mano, M., Ishikawa, Y.: Anonymizing User Location and Profile Information for Privacy-aware Mobile Services. In: LBSN (2010)
    11. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query procesing for location services without compromising privacy. In: Proceedings of the International Conference on Very Large Data Bases (2006)
    12. Brinkhoff, T.: Network-based Generator of Moving Objects, http://iapg.jade-hs.de/personen/brinkhoff/generator/
    13. Wang, T., Liu, L.: Privacy-aware mobile services over road networks. In: Proceedings of the International Conference on Very Large Data Bases (2009)
    14. Yiu, M.L., Jensen, C., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of the IEEE International Conference on Data Engineering (2008)
    15. You, T.H., Peng, W.C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of the International Workshop on Privacy-Aware Location-Based Mobile Services (2007)
  • 作者单位:Nana Xu (22) (23)
    Dan Zhu (22) (23)
    Hongyan Liu (24)
    Jun He (22) (23)
    Xiaoyong Du (22) (23)
    Tao Liu (22) (23)

    22. Key Labs of Data Engineering and Knowledge Engineering, Ministry of Education, China
    23. School of Information, Renmin University of China, China
    24. Department of Management Science and Engineering, Tsinghua University, China
  • ISSN:1611-3349
文摘
Location privacy preserving is attracting more and more attentions with the wide use of accurate positioning devices. Two kinds of methods based on k-anonymity have been proposed for location privacy preserving. One is spatial cloaking and the other is dummy generation. However, simple cloaking may result in large cloaking region, especially when user distribution is sparse. Large cloaking region means low efficiency and high time cost. Dummy generation will also arouse great extra system cost. In this paper, we propose an approach that combines the two techniques to achieve an ideal complement. On one hand, cloaking algorithm is used to blur precise location into a region so that location privacy can be well protected. On the other hand, to those users whose cloaking region is large, generating limited number of dummies can help decrease the size of region. The effectiveness of our methods has been demonstrated by comprehensive experiments.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700