Privacy Protection Through k-anonymity in Location-based Services

被引:8
|
作者
Zuberi, Rubina Shahin [1 ]
Lall, Brejesh [2 ]
Ahmad, Syed Naseem [1 ]
机构
[1] Jamia Millia Islamia, Dept Elect & Commun Engn, New Delhi 110025, India
[2] Indian Inst Technol, Dept Elect Engn, Delhi, India
关键词
Global positioning systems; k-anonymity; Location-based services; OBFUSCATION;
D O I
10.4103/0256-4602.98861
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The advent of Location-based Services (LBS), especially in wireless communications systems, has raised a growing concern for user about his privacy. As for every location-based query, the user has to reveal his location coordinates (through technologies like Global Positioning Systems); if this information could be revealed to anybody, it becomes a privacy breach. To take care of these issues, several techniques have come up among which k-anonymity has been most widely used and studied in different forms and different contexts. In this paper, we have reviewed the application of k-anonymity for LBS and its recent advancements. While doing so, we have recognized three perspectives for the applicability of k-anonymity for LBS: the application of k-anonymity based on the architecture, based on the algorithms for anonymization, and based on the types of k-anonymity (according to the different query processing techniques). Hence, the review has been done within the framework of these perspectives. These -perspectives have covered almost all the aspects of the works which have been reviewed in this paper. This review can arm the privacy providers with the latest techniques and possible modifications in their present techniques.
引用
收藏
页码:196 / 201
页数:6
相关论文
共 50 条
  • [21] Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity
    Jiang, Nanlan
    Zhai, Yinan
    Wang, Yujun
    Yin, Xuesong
    Yang, Sai
    Xu, Pingping
    SENSORS, 2024, 24 (18)
  • [22] A Distributed k-Anonymity Protocol for Location Privacy
    Zhong, Ge
    Hengartner, Urs
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
  • [23] Resilient Privacy Protection for Location-Based Services through Decentralization
    Jin, Hongyu
    Papadimitratos, Panos
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2019, 22 (04)
  • [24] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [25] Resilient Privacy Protection for Location-Based Services Through Decentralization
    Jin, Hongyu
    Papadimitratos, Panos
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 253 - 258
  • [26] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [27] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [28] A trusted de-swinging k-anonymity scheme for location privacy protection
    Manxiang Yang
    Baopeng Ye
    Yuling Chen
    Tao Li
    Yixian Yang
    Xiaobin Qian
    Xiaomei Yu
    Journal of Cloud Computing, 11
  • [29] Achieving Personalized k-anonymity against Long-term Observation in Location-Based Services
    Li, Fenghua
    Chen, Yahong
    Niu, Ben
    He, Yuanyuan
    Geng, Kui
    Cao, Jin
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [30] LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection
    Wang, Yunfeng
    Li, Mingzhen
    Luo, Shoushan
    Xin, Yang
    Zhu, Hongliang
    Chen, Yuling
    Yang, Guangcan
    Yang, Yixian
    IEEE ACCESS, 2019, 7 : 182886 - 182905