Privacy Protection Through k-anonymity in Location-based Services

被引:8
|
作者
Zuberi, Rubina Shahin [1 ]
Lall, Brejesh [2 ]
Ahmad, Syed Naseem [1 ]
机构
[1] Jamia Millia Islamia, Dept Elect & Commun Engn, New Delhi 110025, India
[2] Indian Inst Technol, Dept Elect Engn, Delhi, India
关键词
Global positioning systems; k-anonymity; Location-based services; OBFUSCATION;
D O I
10.4103/0256-4602.98861
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The advent of Location-based Services (LBS), especially in wireless communications systems, has raised a growing concern for user about his privacy. As for every location-based query, the user has to reveal his location coordinates (through technologies like Global Positioning Systems); if this information could be revealed to anybody, it becomes a privacy breach. To take care of these issues, several techniques have come up among which k-anonymity has been most widely used and studied in different forms and different contexts. In this paper, we have reviewed the application of k-anonymity for LBS and its recent advancements. While doing so, we have recognized three perspectives for the applicability of k-anonymity for LBS: the application of k-anonymity based on the architecture, based on the algorithms for anonymization, and based on the types of k-anonymity (according to the different query processing techniques). Hence, the review has been done within the framework of these perspectives. These -perspectives have covered almost all the aspects of the works which have been reviewed in this paper. This review can arm the privacy providers with the latest techniques and possible modifications in their present techniques.
引用
收藏
页码:196 / 201
页数:6
相关论文
共 50 条
  • [31] Research on uncertain data privacy protection based on K-anonymity
    Jing, Yang
    Xiangmin, Ren
    Jianpei, Zhang
    Kechao, Wang
    Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
  • [32] A semantic k-anonymity privacy protection method for publishing sparse location data
    Yang, Xudong
    Gao, Ling
    Wang, Hai
    Zheng, Jie
    Guo, Hongbo
    2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2019, : 216 - 222
  • [33] A trusted de-swinging k-anonymity scheme for location privacy protection
    Yang, Manxiang
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    Yu, Xiaomei
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [34] Dummy Location Selection Scheme for K-anonymity in Location based Services
    Wu, Di
    Zhang, Yu
    Liu, Yinlong
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 441 - 448
  • [35] An Improved Location-Based Service Authentication Algorithm with Personalized K-Anonymity
    Ye, Yu-Meng
    Pan, Chang-Chun
    Yang, Gen-Ke
    CHINA SATELLITE NAVIGATION CONFERENCE (CSNC) 2016 PROCEEDINGS, VOL I, 2016, 388 : 257 - 266
  • [36] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
  • [37] Truthful Incentive Mechanisms for K-Anonymity Location Privacy
    Yang, Dejun
    Fang, Xi
    Xue, Guoliang
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2994 - 3002
  • [38] Method for privacy protection in location-based services
    He, Jing-Sha
    Xu, Fei
    Xu, Jing
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (08): : 1130 - 1134
  • [39] Approaches to Privacy Protection in Location-Based Services
    Rohunen, Anna
    Markkula, Jouni
    NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 402 - 409
  • [40] Privacy Protection Model for Location-Based Services
    Ni, Lihao
    Liu, Yanshen
    Liu, Yi
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2020, 16 (01): : 96 - 112