joint obfuscation of location and its semantic information for privacy protection

被引:11
|
作者
Bostanipour, Behnaz [1 ]
Theodorakopoulos, George [1 ]
机构
[1] Cardiff Univ, Sch Comp Sci & Informat, Cardiff, Wales
关键词
Privacy; Social networks; Location-based services; Location semantics; Bayesian networks; Probabilistic graphical models; Utility;
D O I
10.1016/j.cose.2021.102310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based social networks (LBSNs) such as Foursquare and Facebook enable users to share with each other, their (geographical) locations together with the semantic information associated with their locations. The semantic information captures the type of a location and is usually represented by a semantic tag like "restaurant", "museum", "school", etc. Semantic tag sharing increases the threat to users' location privacy (which is already at risk because of location sharing) and it also puts users' semantic location privacy at risk. The existing solution to protect the location privacy and the semantic location privacy of users in such LBSNs is to obfuscate the location and the semantic tag independently of each other in a so called disjoint obfuscation approach. Thus, in this approach, the semantic tag is obfuscated i.e., replaced by a more general tag. Also, the location is obfuscated i.e., replaced by a generalized area (called the cloaking area ) made of the actual location and some of its nearby locations. However, since in this approach the location obfuscation is performed in a semantic-oblivious manner, an adversary can still increase his chance to infer the actual location and the actual semantic tag by filtering out the locations in the cloaking area that are not semantically compatible with the obfuscated semantic tag. In this work, we address this issue by proposing a joint obfuscation approach in which the location obfuscation is performed based on the result of the semantic tag obfuscation. We also provide a formal framework for evaluation and comparison of our joint approach with the disjoint approach. By running an experimental evaluation on a dataset of real-world user traces collected from six different cities, we show that in almost all cases (i.e., in different cities and with different obfuscation parameters), the joint approach outperforms the disjoint approach in terms of location privacy protection and the semantic location privacy protection. Based on the evaluation results, we also discuss how different obfuscation parameters and the choice of the city can affect the performance of the obfuscation approaches. In particular, we show how changing these parameters can improve the performance of the joint approach. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Location Privacy Protection Game Against Adversary Through Multi-User Cooperative Obfuscation
    Hong, Shu
    Duan, Lingjie
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (03) : 2066 - 2077
  • [22] Semantic Location Privacy Protection Algorithm Based on Edge Cluster Graph
    Lu, Tao
    Xu, Hongyun
    Tian, Kai
    Tian, Cenxi
    Jiang, Rui
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1305 - 1310
  • [23] Trajectory privacy protection method based on sensitive semantic location replacement
    Xing, Ling
    Li, Bing
    Liu, Lulu
    Huang, Yuanhao
    Wu, Honghai
    Ma, Huahong
    Zhang, Xiaohui
    COMPUTER NETWORKS, 2024, 250
  • [24] A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks
    Wu, Hao
    Zhao, Guofeng
    Wang, Shanshan
    Xu, Chuan
    Yu, Shui
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 2294 - 2299
  • [25] A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks
    Zhao G.
    Wu H.
    Wang S.
    Xu C.
    Tang W.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (01): : 155 - 164
  • [26] Location Privacy Using Data Obfuscation in Fog Computing
    Naik, Chandan
    Siddhartha, M.
    Martin, John Paul
    Chandrasekaran, K.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1286 - 1291
  • [27] An Obfuscation-Based Approach for Protecting Location Privacy
    Ardagna, Claudio A.
    Cremonini, Marco
    di Vimercati, Sabrina De Capitani
    Samarati, Pierangela
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) : 13 - 27
  • [28] Demonstration of Indoor Location Privacy Enforcement using Obfuscation
    Goes, Romulo Meira
    Rawlings, Blake C.
    Recker, Nicholas
    Willett, Gregory
    Lafortune, Stephan
    IFAC PAPERSONLINE, 2018, 51 (07): : 145 - 151
  • [29] Research on Location Information and Privacy Protection Based on Big Data
    Yu, Juan
    2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 226 - 229
  • [30] Location privacy protection method based on attribute-based privacy information retrieval
    Du G.
    Zhang L.
    Ma C.
    Zhang G.
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2021, 42 (05): : 680 - 686