Efficient Algorithms for K-Anonymous Location Privacy in Participatory Sensing

被引:0
|
作者
Khuong Vu [1 ]
Zheng, Rong [1 ]
Gao, Jie [2 ]
机构
[1] Univ Houston, Dept Comp Sci, Houston, TX 77204 USA
[2] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Location privacy is an important concern in participatory sensing applications, where users can both contribute valuable information (data reporting) as well as retrieve (Iocation-dependent) information (query) regarding their surroundings. K-anonymity is an important measure for privacy to prevent the disclosure of personal data. In this paper, we propose a mechanism based on locality-sensitive hashing (LSH) to partition user locations into groups each containing at least K users (called spatial cloaks). The mechanism is shown to preserve both locality and K-anonymity. We then devise an efficient algorithm to answer kNN queries for any point in the spatial cloaks of arbitrary polygonal shape. Extensive simulation study shows that both algorithms have superior performance with moderate computation complexity.
引用
收藏
页码:2399 / 2407
页数:9
相关论文
共 50 条
  • [41] How anonymous is k-anonymous? Look at your quasi-ID
    Bettini, Claudio
    Wang, X. Sean
    Jajodia, Sushil
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 1 - +
  • [42] LTPPM: a location and trajectory privacy protection mechanism in participatory sensing
    Gao, Sheng
    Ma, Jianfeng
    Shi, Weisong
    Zhan, Guoxing
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (01): : 155 - 169
  • [43] Location privacy-preserving Mobile Crowd Sensing with Anonymous Reputation
    Mille, Arthur
    Karim, Lutful
    Almhana, Jalal
    Khan, Nargis
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1812 - 1817
  • [44] Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation
    Yi, Xun
    Lam, Kwok-Yan
    Bertino, Elisa
    Rao, Fang-Yu
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 387 - 411
  • [45] K-anonymous multi-party secret handshakes
    Xu, Shouhuai
    Yung, Moti
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 72 - +
  • [46] A k-anonymous rule clustering approach for data publishing
    Ohki M.
    Inuiguchi M.
    1600, Fuji Technology Press (21): : 980 - 988
  • [47] Generating k-Anonymous Microdata by Fuzzy Possibilistic Clustering
    Abidi, Balkis
    Ben Yahia, Sadok
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT II, 2017, 10439 : 3 - 17
  • [48] Mobile Systems Location Privacy: "MobiPriv" A Robust K Anonymous System
    Stenneth, Leon
    Yu, Phillip S.
    Wolfson, Ouri
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 54 - 63
  • [49] User-side adaptive protection of location privacy in participatory sensing
    Agir, Berker
    Papaioannou, Thanasis G.
    Narendula, Rammohan
    Aberer, Karl
    Hubaux, Jean-Pierre
    GEOINFORMATICA, 2014, 18 (01) : 165 - 191
  • [50] User-side adaptive protection of location privacy in participatory sensing
    Berker Agir
    Thanasis G. Papaioannou
    Rammohan Narendula
    Karl Aberer
    Jean-Pierre Hubaux
    GeoInformatica, 2014, 18 : 165 - 191