Privacy metric for user's trajectory in location-based services

被引:3
|
作者
Wang, Cai-Mei [1 ]
Guo, Ya-Jun [1 ]
Guo, Yan-Hua [1 ]
机构
[1] Department of Computer Science, Huazhong Normal University, Wuhan 430079, China
来源
Ruan Jian Xue Bao/Journal of Software | 2012年 / 23卷 / 02期
关键词
Trajectories - Association rules - Location - Error analysis - Telecommunication services - Information use - Encoding (symbols) - Privacy-preserving techniques;
D O I
10.3724/SP.J.1001.2012.03946
中图分类号
学科分类号
摘要
This paper proposes a trajectory privacy measure for Silent Cascade, which is a prevalent trajectory privacy preserving method in LBS (location-based services). In this measure, the user's trajectory is modeled as a weighted undirected graph, and the user's trajectory privacy level is calculated through the use of information entropy. It is pointed out in literatures that any privacy preserving methods will be subject to privacy threats once the attacker has new background knowledge. Therefore, adversarial background knowledge is hierarchically integrated into this measure. The privacy metric result composes of the assumptive background knowledge and the corresponding trajectory privacy level. (KUL(Ki+, Ki-), KL(Ki+, Ki-)) association rules is also proposed to describe the assumptive background knowledge. Simulation results show that this metric is an effective and valuable tool for mobile users and the designers of trajectory privacy preserving methods to measure the user's trajectory privacy level correctly, even the attacker has variable background knowledge. © 2012 ISCAS.
引用
收藏
页码:352 / 360
相关论文
共 50 条
  • [31] From location to location pattern privacy in location-based services
    Osman Abul
    Cansın Bayrak
    Knowledge and Information Systems, 2018, 56 : 533 - 557
  • [32] Resilient Collaborative Privacy for Location-Based Services
    Jin, Hongyu
    Papadimitratos, Panos
    SECURE IT SYSTEMS, NORDSEC 2015, 2015, 9417 : 47 - 63
  • [33] Evaluating the Privacy Risk of Location-Based Services
    Freudiger, Julien
    Shokri, Reza
    Hubaux, Jean-Pierre
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2012, 7035 : 31 - 46
  • [34] Method for privacy protection in location-based services
    He, Jing-Sha
    Xu, Fei
    Xu, Jing
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (08): : 1130 - 1134
  • [35] Protecting query privacy in location-based services
    Chen, Xihui
    Pang, Jun
    GEOINFORMATICA, 2014, 18 (01) : 95 - 133
  • [36] Pricing Privacy Leakage in Location-Based Services
    Li, Fenghua
    Liu, Jiawen
    Fang, Liang
    Niu, Ben
    Geng, Kui
    Li, Hui
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 406 - 418
  • [37] Privacy through Uncertainty in Location-Based Services
    Merrill, Shawn
    Basalp, Nilguen
    Biskup, Joachim
    Buchmann, Erik
    Clifton, Chris
    Kuijpers, Bart
    Othman, Walied
    Savas, Erkay
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 67 - 72
  • [38] Approaches to Privacy Protection in Location-Based Services
    Rohunen, Anna
    Markkula, Jouni
    NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 402 - 409
  • [39] Investigation of Privacy Issues in Location-Based Services
    Rathod, Ajaysinh
    Jariwala, Vivaksha
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 55 - 65
  • [40] Preserving Users' Privacy for Location-Based Services
    Agarwal, Pranay
    Kumar, Abhinav
    Yamaguchi, Rie Shigetomi
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,