Efficient Algorithms for K-Anonymous Location Privacy in Participatory Sensing

被引:0
|
作者
Khuong Vu [1 ]
Zheng, Rong [1 ]
Gao, Jie [2 ]
机构
[1] Univ Houston, Dept Comp Sci, Houston, TX 77204 USA
[2] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Location privacy is an important concern in participatory sensing applications, where users can both contribute valuable information (data reporting) as well as retrieve (Iocation-dependent) information (query) regarding their surroundings. K-anonymity is an important measure for privacy to prevent the disclosure of personal data. In this paper, we propose a mechanism based on locality-sensitive hashing (LSH) to partition user locations into groups each containing at least K users (called spatial cloaks). The mechanism is shown to preserve both locality and K-anonymity. We then devise an efficient algorithm to answer kNN queries for any point in the spatial cloaks of arbitrary polygonal shape. Extensive simulation study shows that both algorithms have superior performance with moderate computation complexity.
引用
收藏
页码:2399 / 2407
页数:9
相关论文
共 50 条
  • [31] A new k-anonymous message transmission protocol
    Yao, G
    Feng, DG
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 388 - 399
  • [32] Current Developments of k-Anonymous Data Releasing
    Li, Jiuyong
    Wang, Hua
    Jin, Huidong
    Yong, Jianming
    ELECTRONIC JOURNAL OF HEALTH INFORMATICS, 2008, 3 (01):
  • [33] Secure distributed k-anonymous pattern mining
    Jiang, Wei
    Atzori, Maurizio
    ICDM 2006: SIXTH INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2006, : 319 - 329
  • [34] Utility Evaluation of K-anonymous Data by Microaggregation
    Wang Lixia
    Han Jianmin
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 381 - +
  • [35] A modification of the Lloyd algorithm for k-anonymous quantization
    Rebollo-Monedero, David
    Forne, Jordi
    Pallares, Esteve
    Parra-Arnau, Javier
    INFORMATION SCIENCES, 2013, 222 : 185 - 202
  • [36] An improved k-anonymous message transmission protocol
    School of Computer Sci., Xidian Univ., Xi'an 710071, China
    不详
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban), 2007, 2 (145-149):
  • [37] k-Anonymous microaggregation with preservation of statistical dependence
    Rebollo-Monedero, David
    Forne, Jordi
    Soriano, Miguel
    Puiggali Allepuz, Jordi
    INFORMATION SCIENCES, 2016, 342 : 1 - 23
  • [38] K-anonymous Location-based Fine-grained Access Control for Mobile Cloud
    Baseri, Yaser
    Hafid, Abdelhakim
    Cherkaoui, Soumaya
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [39] Participatory Privacy: Enabling Privacy in Participatory Sensing
    De Cristofaro, Emiliano
    Soriente, Claudio
    IEEE NETWORK, 2013, 27 (01): : 32 - 36
  • [40] Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis
    Rebollo Monedero, David
    Mohamad Mezher, Ahmad
    Casanova Colome, Xavier
    Forne, Jordi
    Soriano, Miguel
    INFORMATION SCIENCES, 2019, 503 : 417 - 443