Correlation probability indistinguishable location privacy protection algorithm

The attack of corre1ation probabi1ity used by the adversary in snapshot query and continuous query services were measured.Then,on account of these attacks,a privacy protection framework based on the differentia1 privacy and a 1ocation-shift scheme to achieve the indistinguishab1e of corre1ation prob...

Full description

Saved in:
Bibliographic Details
Main Authors: Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017163/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539503850782720
author Lei ZHANG
Chun-guang MA
Song-tao YANG
Zeng-peng LI
author_facet Lei ZHANG
Chun-guang MA
Song-tao YANG
Zeng-peng LI
author_sort Lei ZHANG
collection DOAJ
description The attack of corre1ation probabi1ity used by the adversary in snapshot query and continuous query services were measured.Then,on account of these attacks,a privacy protection framework based on the differentia1 privacy and a 1ocation-shift scheme to achieve the indistinguishab1e of corre1ation probabi1ities was provided,and the protection effectiveness of this method was proved.At 1ast,security ana1ysis and the experiment resu1ts further verify the protection effectiveness and guarantee the execution efficiency of the proposed scheme.
format Article
id doaj-art-53d4967e7bcd47be91e1c3b855e45437
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-53d4967e7bcd47be91e1c3b855e454372025-01-14T07:12:41ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-08-0138374959711330Correlation probability indistinguishable location privacy protection algorithmLei ZHANGChun-guang MASong-tao YANGZeng-peng LIThe attack of corre1ation probabi1ity used by the adversary in snapshot query and continuous query services were measured.Then,on account of these attacks,a privacy protection framework based on the differentia1 privacy and a 1ocation-shift scheme to achieve the indistinguishab1e of corre1ation probabi1ities was provided,and the protection effectiveness of this method was proved.At 1ast,security ana1ysis and the experiment resu1ts further verify the protection effectiveness and guarantee the execution efficiency of the proposed scheme.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017163/1ocation-based servicecorre1ation probabi1itydifferentia1 privacyprivacy protection
spellingShingle Lei ZHANG
Chun-guang MA
Song-tao YANG
Zeng-peng LI
Correlation probability indistinguishable location privacy protection algorithm
Tongxin xuebao
1ocation-based service
corre1ation probabi1ity
differentia1 privacy
privacy protection
title Correlation probability indistinguishable location privacy protection algorithm
title_full Correlation probability indistinguishable location privacy protection algorithm
title_fullStr Correlation probability indistinguishable location privacy protection algorithm
title_full_unstemmed Correlation probability indistinguishable location privacy protection algorithm
title_short Correlation probability indistinguishable location privacy protection algorithm
title_sort correlation probability indistinguishable location privacy protection algorithm
topic 1ocation-based service
corre1ation probabi1ity
differentia1 privacy
privacy protection
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017163/
work_keys_str_mv AT leizhang correlationprobabilityindistinguishablelocationprivacyprotectionalgorithm
AT chunguangma correlationprobabilityindistinguishablelocationprivacyprotectionalgorithm
AT songtaoyang correlationprobabilityindistinguishablelocationprivacyprotectionalgorithm
AT zengpengli correlationprobabilityindistinguishablelocationprivacyprotectionalgorithm