A k-anonymous location privacy protection method of dummy based on geographical semantics

被引:9
|
作者
Zhang, Yong-Bing [1 ,2 ]
Zhang, Qiu-Yu [1 ]
Li, Zong-Yi [2 ]
Yan, Yan [1 ]
Zhang, Mo-Yi [1 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology, No. 287, Lan-Gong-Ping Road, Lanzhou,730050, China
[2] Gansu Institute of Mechanical and Electrical Engineering, No. 107, Chi-Yu Road, Tianshui, Gansu,741001, China
关键词
Location - Efficiency - Clustering algorithms;
D O I
10.6633/IJNS.20191121(6).07
中图分类号
学科分类号
摘要
Dummy is one of the main methods used to protect location privacy. In existing methods, the efficiency of dummy generation is low, and the geographical semantic information of location is not fully taken into account. In order to solve these problems, a k-anonymous location privacy protection method of dummy based on geo-graphical semantics was proposed in this paper. Firstly, the location data set in the rectangle region containing the real location is obtained from WiFi APs. Secondly, adopting the multicenter clustering algorithm based on max-min distance, some locations are selected. Its geo-graphical distance between them is the farthest, and a candidate set of dummies is generated. Finally, by calculating the edit-distance between geographic name's information of locations, the semantic similarity between any two locations in the candidate set is obtained, and k-1 locations with the minimum semantic similarity are selected as dummies. Experimental results show that the proposed method can ensure the physical dispersion and semantic diversity of locations, as well as the improvement of the efficiency of dummy generation. Meanwhile, the balance between privacy protection security and query service quality is achieved. © 2019 Femto Technique Co., Ltd.
引用
收藏
页码:937 / 946
相关论文
共 50 条
  • [21] Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries
    Liu H.
    Li X.-H.
    Wang E.-M.
    Ma J.-F.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (07): : 140 - 150
  • [22] Location privacy protection method of anonymous region hierarchy expansion
    Zhang L.
    Ma C.
    Yin G.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (02): : 561 - 566
  • [23] Research on privacy protection of dummy location interference for Location-Based Service location
    Zhang, Ai
    Li, XiaoHui
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (09)
  • [24] Private Location-Based Information Retrieval via k-Anonymous Clustering
    Rebollo-Monedero, David
    Forne, Jordi
    Soriano, Miguel
    INTERNET OF THINGS-BOOK, 2010, : 421 - 430
  • [25] K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
    Meng, Linghang
    Hong, Xueshu
    Chen, Yingwen
    Ding, Yuke
    Zhang, Chengzhuo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 381 - 393
  • [26] SLICER: A Slicing-Based K-Anonymous Privacy Preserving Scheme for Participatory Sensing
    Qiu, Fudong
    Wu, Fan
    Chen, Guihai
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 113 - 121
  • [27] An Anonymous Authentication Protocol for Privacy Protection in Location Based Services
    Cao, Yang
    Li, Yan
    Li, Hui
    Wang, Xingfang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4748 - 4752
  • [28] A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
    Zhang, Shiwen
    Li, Mengling
    Liang, Wei
    Sandor, Voundi Koe Arthur
    Li, Xiong
    SENSORS, 2022, 22 (16)
  • [29] K-anonymous Privacy Protection Based on You Only Look Once Network and Random Forest for Sports Data Security Analysis
    Cao, Jie
    Ren, Jie
    Guan, Fuyu
    Li, Xueyan
    Wang, Nan
    International Journal of Network Security, 2025, 27 (02) : 264 - 273
  • [30] K-anonymous Location-based Fine-grained Access Control for Mobile Cloud
    Baseri, Yaser
    Hafid, Abdelhakim
    Cherkaoui, Soumaya
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,