Protecting User Privacy Better with Query l-Diversity

被引:6
|
作者
Liu, Fuyu [1 ]
Hua, Kien [1 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
基金
美国国家科学基金会;
关键词
Cloaking; Location-Based Services; Location k-anonymity; Privacy Protection; Query Processing;
D O I
10.4018/jisp.2010040101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper examines major privacy concerns in location-based services. Most user privacy techniques are based on cloaking, which achieves location k-anonymity. The key is to reduce location resolution by ensuring that each cloaking area reported to a service provider contains at least k mobile users. However, maintaining location k-anonymity alone is inadequate when the majority of the k mobile users are interested in the same query subject. In this paper, the authors address this problem by defining a novel concept called query l-diversity, which requires diversified queries submitted from the k users. The authors propose two techniques: Expand Cloak and Hilbert Cloak to achieve query l-diversity. To show the effectiveness of the proposed techniques, they compare the improved Interval Cloak technique through extensive simulation studies. The results show that these techniques better protect user privacy.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [41] An Improved l-Diversity Model for Numerical Sensitive Attributes
    Han, Jianmin
    Yu, Huiqun
    Yu, Juan
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 891 - +
  • [42] Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility
    Gangarde, Rupali
    Sharma, Amit
    Pawar, Ambika
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 2171 - 2190
  • [43] Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing
    Farnan, Nicholas L.
    Lee, Adam J.
    Chrysanthis, Panos K.
    Yu, Ting
    COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 628 - 647
  • [44] Algorithm to satisfy l-diversity by combining dummy records and grouping
    Oishi, Keiichiro
    Sei, Yuichi
    Andrew, J.
    Tahara, Yasuyuki
    Ohsuga, Akihiko
    SECURITY AND PRIVACY, 2024, 7 (03)
  • [45] Effective L-Diversity Anonymization Algorithm Based on Improved Clustering
    Zheng, Wantong
    Ma, Yong
    Wang, Zhongyue
    Jia, Chunfu
    Li, Peng
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 318 - 329
  • [46] Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy
    Chang, Yan
    Zhang, Shi-Bin
    Wan, Guo-gen
    Yan, Li-Li
    Zhang, Yan
    Li, Xue-Yang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (07) : 2069 - 2080
  • [47] Protecting Privacy in Trajectories with a User-Centric Approach
    Romero-Tris, Cristina
    Megias, David
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2018, 12 (06)
  • [48] Practical Two-Way QKD-Based Quantum Private Query with Better Performance in User Privacy
    Yan Chang
    Shi-Bin Zhang
    Guo-gen Wan
    Li-Li Yan
    Yan Zhang
    Xue-Yang Li
    International Journal of Theoretical Physics, 2019, 58 : 2069 - 2080
  • [49] Protecting trajectory privacy: A user-centric analysis
    Shen, Hang
    Bai, Guangwei
    Yang, Mei
    Wang, Zhonghui
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 : 128 - 139
  • [50] A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Services
    Um, Jung-Ho
    Jang, Mi-Young
    Jo, Kyoung-Jin
    Chang, Jae-Woo
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 79 - 85