Protecting User Privacy Better with Query l-Diversity

被引:6
|
作者
Liu, Fuyu [1 ]
Hua, Kien [1 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
基金
美国国家科学基金会;
关键词
Cloaking; Location-Based Services; Location k-anonymity; Privacy Protection; Query Processing;
D O I
10.4018/jisp.2010040101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper examines major privacy concerns in location-based services. Most user privacy techniques are based on cloaking, which achieves location k-anonymity. The key is to reduce location resolution by ensuring that each cloaking area reported to a service provider contains at least k mobile users. However, maintaining location k-anonymity alone is inadequate when the majority of the k mobile users are interested in the same query subject. In this paper, the authors address this problem by defining a novel concept called query l-diversity, which requires diversified queries submitted from the k users. The authors propose two techniques: Expand Cloak and Hilbert Cloak to achieve query l-diversity. To show the effectiveness of the proposed techniques, they compare the improved Interval Cloak technique through extensive simulation studies. The results show that these techniques better protect user privacy.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [31] Protecting query privacy in location-based services
    Xihui Chen
    Jun Pang
    GeoInformatica, 2014, 18 : 95 - 133
  • [32] Location l-Diversity against Multifarious Inference Attacks
    Miyakawa, Shinya
    Saji, Nobuyuki
    Mori, Takuya
    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 1 - 10
  • [33] Geosocial Query with User-Controlled Privacy
    Hu, Peizhao
    Chow, Sherman S. M.
    Aloufi, Asma
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 163 - 172
  • [34] Correcting Finite Sampling Issues in Entropy l-diversity
    Stammler, Sebastian
    Katzenbeisser, Stefan
    Hamacher, Kay
    PRIVACY IN STATISTICAL DATABASES: UNESCO CHAIR IN DATA PRIVACY, 2016, 9867 : 135 - 146
  • [35] Clustering-Based Frequency l-Diversity Anonymization
    Zare-Mirakabad, Mohammad-Reza
    Jantan, Aman
    Bressan, Stephane
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 159 - +
  • [36] DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark
    Ashkouti, Farough
    khamforoosh, Keyhan
    Sheikhahmadi, Amir
    INFORMATION SCIENCES, 2021, 546 (546) : 1 - 24
  • [37] Protecting User Privacy in WiFi Sharing Networks
    Elsner, Till
    Luetke-Wiesmann, Denis
    Scheuermann, Bjoern
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1979 - 1983
  • [38] BSGI: An effective algorithm towards stronger l-diversity
    Ye, Yang
    Deng, Qiao
    Wang, Chi
    Lv, Dapeng
    Liu, Yu
    Feng, Jianhua
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, 5181 : 19 - +
  • [39] An improved V-MDAV algorithm for l-diversity
    Han Jian-min
    Cen Ting-ting
    Yu Hui-qun
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 733 - +
  • [40] An l-MDAV Microaggregation Algorithm for Sensitive Attribute l-Diversity
    Han Jianmin
    Cen Tingting
    Yu Juan
    PROCEEDINGS OF THE 27TH CHINESE CONTROL CONFERENCE, VOL 5, 2008, : 713 - 718