Location Privacy Protection in Mobile Social Networks Based on l-diversity

被引:1
|
作者
Li, Hong-Tao [1 ]
Gong, Lin-Xia [1 ]
Guo, Feng [2 ]
Miao, Quan-Li [3 ]
Wang, Jie [5 ]
Zhang, Tao [4 ]
机构
[1] Shanxi Normal Univ, Coll Math & Comp Sci, Linfen 041000, Shanxi, Peoples R China
[2] Linyi Univ, Sch Informat Sci & Engn, Linyi 276000, Shandong, Peoples R China
[3] Veoneer China Co Ltd, Shanghai 201499, Peoples R China
[4] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[5] Shanxi Normal Univ, Linfen 041000, Shanxi, Peoples R China
关键词
location based services; mobile social network; location privacy; l-diversity; privacy protection; SCHEME;
D O I
10.6688/JISE.202007_36(4).0004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, location-based service has been widely used in social networks. However, people's locations or trajectory may be disclosed when they continuously use LBS to retrieve point of interests. The privacy disclosure problem not only restricts the development of LBS, but also reduces the quality of service. Recently, location privacy protection has attracted more and more attention. In this paper, aiming at dealing with the location privacy problem in mobile social network applications, we propose a location privacy protection method for multi-sensitive attributes based on l-diversity privacy protection model, and protect the user's location information in client side and server respectively. On the client side, the decomposition algorithm of minimum distance grouping is used to lighten the location data, which makes the processed data satisfy the l(1)-diversity principle and upload the data to the server in the form of QIT(1) (Quasi-Identifier attribute Table) and ST1 (Sensitive attribute Table) to achieve the initial protection of the user's location data. On the server side, the minimum selection priority strategy is adopted to form the l(2)-diversity group satisfying the multi-sensitive attributes, and the data is uploaded in the form of QIT(2) and ST2 to further protect the user location data (where l(1) < l(2)). The experimental results show that this method not only can effectively protect location privacy data, but also has high data availability.
引用
收藏
页码:745 / 763
页数:19
相关论文
共 50 条
  • [31] A New Mobile Online Social Network based Location Sharing with Enhanced Privacy Protection
    Son, Junggab
    Kim, Donghyun
    Tashakkori, Rahman
    Tokuta, Alade O.
    Oh, Heekuck
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [32] An Algorithm to achieve k-anonymity and l-diversity anonymisation in Social Networks
    Tripathy, B. K.
    Mitra, Anirban
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 126 - 131
  • [33] Protection of location privacy for moving kNN queries in social networks
    Ma, Tinghuai
    Jia, Jing
    Xue, Yu
    Tian, Yuan
    Al-Dhelaan, Abdullah
    Al-Rodhaan, Mznah
    APPLIED SOFT COMPUTING, 2018, 66 : 525 - 532
  • [34] Location Privacy Management and Protection in Geo-Social Networks
    Bertolaja, Letizia
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 19 - 22
  • [35] Privacy Enhanced Location Sharing for Mobile Online Social Networks
    Son, Junggab
    Kim, Donghyun
    Bhuiyan, Md Zakirul Alam
    Tashakkori, Rahman
    Seo, Jungtaek
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02): : 279 - 290
  • [36] The Quest for Location-Privacy in Opportunistic Mobile Social Networks
    Zakhary, Sameh
    Radenkovic, Milena
    Benslimane, Abderrahim
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 667 - 673
  • [37] Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks
    He, Xiaofan
    Jin, Richeng
    Dai, Huaiyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1524 - 1534
  • [38] Research on LBS Privacy Protection Technology in Mobile Social Networks
    He, Wen
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 73 - 76
  • [39] Privacy-Preserving Data Publication with Features of Independent l-Diversity
    Zhu, Hong
    Tian, Shengli
    Lue, Kevin
    COMPUTER JOURNAL, 2015, 58 (04): : 549 - 571
  • [40] Automated k-Anonymization and l-Diversity for Shared Data Privacy
    Kayem, Anne V. D. M.
    Vester, C. T.
    Meinel, Christoph
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2016, PT I, 2016, 9827 : 105 - 120