Efficient Algorithms for K-Anonymous Location Privacy in Participatory Sensing

被引:0
|
作者
Khuong Vu [1 ]
Zheng, Rong [1 ]
Gao, Jie [2 ]
机构
[1] Univ Houston, Dept Comp Sci, Houston, TX 77204 USA
[2] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Location privacy is an important concern in participatory sensing applications, where users can both contribute valuable information (data reporting) as well as retrieve (Iocation-dependent) information (query) regarding their surroundings. K-anonymity is an important measure for privacy to prevent the disclosure of personal data. In this paper, we propose a mechanism based on locality-sensitive hashing (LSH) to partition user locations into groups each containing at least K users (called spatial cloaks). The mechanism is shown to preserve both locality and K-anonymity. We then devise an efficient algorithm to answer kNN queries for any point in the spatial cloaks of arbitrary polygonal shape. Extensive simulation study shows that both algorithms have superior performance with moderate computation complexity.
引用
收藏
页码:2399 / 2407
页数:9
相关论文
共 50 条
  • [21] Similarity-based privacy protection for publishing k-anonymous trajectories
    WANG Shuai
    CHEN Chunyi
    ZHANG Guijie
    Frontiers of Computer Science, 2022, 16 (03)
  • [22] Similarity-based privacy protection for publishing k-anonymous trajectories
    Shuai Wang
    Chunyi Chen
    Guijie Zhang
    Frontiers of Computer Science, 2022, 16
  • [23] k-Anonymous data collection
    Zhong, Sheng
    Yang, Zhiqiang
    Chen, Tingting
    INFORMATION SCIENCES, 2009, 179 (17) : 2948 - 2963
  • [24] Hardness of k-anonymous microaggregation
    Thaeter, Florian
    Reischuk, Ruediger
    DISCRETE APPLIED MATHEMATICS, 2021, 303 : 149 - 158
  • [25] On Location Privacy and Quality of Information in Participatory Sensing
    Rodhe, Ioana
    Rohner, Christian
    Ngai, Edith C. -H.
    PROCEEDINGS OF THE 8TH ACM SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2012, : 55 - 62
  • [26] k-Anonymous Crowd Flow Analytics
    Stanciu, Valeriu-Daniel
    van Steen, Maarten
    Dobre, Ciprian
    Peter, Andreas
    PROCEEDINGS OF THE 17TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2020), 2021, : 376 - 385
  • [27] Private Location-Based Information Retrieval via k-Anonymous Clustering
    Rebollo-Monedero, David
    Forne, Jordi
    Soriano, Miguel
    INTERNET OF THINGS-BOOK, 2010, : 421 - 430
  • [28] A Practical k-Anonymous Recommender System
    Igomitros, Athanasios
    Papageorgiou, Achilleas
    Patsakis, Constantinos
    2016 7TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2016,
  • [29] K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
    Meng, Linghang
    Hong, Xueshu
    Chen, Yingwen
    Ding, Yuke
    Zhang, Chengzhuo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 381 - 393
  • [30] k-ARQ: k-Anonymous Ranking Queries
    Jung, Eunjin
    Ahn, Sukhyun
    Hwang, Seung-won
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT I, PROCEEDINGS, 2010, 5981 : 414 - +