Location Privacy Protection in Mobile Social Networks Based on l-diversity

被引:1
|
作者
Li, Hong-Tao [1 ]
Gong, Lin-Xia [1 ]
Guo, Feng [2 ]
Miao, Quan-Li [3 ]
Wang, Jie [5 ]
Zhang, Tao [4 ]
机构
[1] Shanxi Normal Univ, Coll Math & Comp Sci, Linfen 041000, Shanxi, Peoples R China
[2] Linyi Univ, Sch Informat Sci & Engn, Linyi 276000, Shandong, Peoples R China
[3] Veoneer China Co Ltd, Shanghai 201499, Peoples R China
[4] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[5] Shanxi Normal Univ, Linfen 041000, Shanxi, Peoples R China
关键词
location based services; mobile social network; location privacy; l-diversity; privacy protection; SCHEME;
D O I
10.6688/JISE.202007_36(4).0004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, location-based service has been widely used in social networks. However, people's locations or trajectory may be disclosed when they continuously use LBS to retrieve point of interests. The privacy disclosure problem not only restricts the development of LBS, but also reduces the quality of service. Recently, location privacy protection has attracted more and more attention. In this paper, aiming at dealing with the location privacy problem in mobile social network applications, we propose a location privacy protection method for multi-sensitive attributes based on l-diversity privacy protection model, and protect the user's location information in client side and server respectively. On the client side, the decomposition algorithm of minimum distance grouping is used to lighten the location data, which makes the processed data satisfy the l(1)-diversity principle and upload the data to the server in the form of QIT(1) (Quasi-Identifier attribute Table) and ST1 (Sensitive attribute Table) to achieve the initial protection of the user's location data. On the server side, the minimum selection priority strategy is adopted to form the l(2)-diversity group satisfying the multi-sensitive attributes, and the data is uploaded in the form of QIT(2) and ST2 to further protect the user location data (where l(1) < l(2)). The experimental results show that this method not only can effectively protect location privacy data, but also has high data availability.
引用
收藏
页码:745 / 763
页数:19
相关论文
共 50 条
  • [1] (a, d)-Diversity: Privacy Protection Based on l-Diversity
    Wang, Qian
    Shi, Xiangling
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 367 - 372
  • [2] An anonymous entropy-based location privacy protection scheme in mobile social networks
    Ni, Lina
    Tian, Fulong
    Ni, Qinghang
    Yan, Yan
    Zhang, Jinquan
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [3] A Blind Signature-based Location Privacy Protection Scheme for Mobile Social Networks
    Xu, Xin
    Wen, Mi
    Wang, Liangliang
    International Journal of Network Security, 2021, 23 (05) : 867 - 877
  • [4] An anonymous entropy-based location privacy protection scheme in mobile social networks
    Lina Ni
    Fulong Tian
    Qinghang Ni
    Yan Yan
    Jinquan Zhang
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [5] Co-location Privacy Protection Method in Mobile Social Networks
    Li J.
    Xiong D.
    Cao J.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2019, 47 (02): : 92 - 97and105
  • [6] Location Privacy Protection on Social Networks
    Zhan, Justin
    Fang, Xing
    SOCIAL COMPUTING, BEHAVIORAL-CULTURAL MODELING AND PREDICTION, 2011, 6589 : 78 - 85
  • [7] A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Services
    Um, Jung-Ho
    Jang, Mi-Young
    Jo, Kyoung-Jin
    Chang, Jae-Woo
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 79 - 85
  • [8] An Enhanced l-Diversity Privacy Preservation
    Yang, Gaoming
    Li, Jingzhao
    Zhang, Shunxiang
    Yu, Li
    2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2013, : 1115 - 1120
  • [9] Location privacy protection algorithm for mobile networks
    Gao, Kun
    Zhu, Yiwei
    Gong, Songjie
    Tan, Hengsong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [10] Location privacy protection algorithm for mobile networks
    Kun Gao
    Yiwei Zhu
    Songjie Gong
    Hengsong Tan
    EURASIP Journal on Wireless Communications and Networking, 2016