Trajectory privacy protection method based on location obfuscation

In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location predi...

Full description

Saved in:
Bibliographic Details
Main Authors: Shaobo ZHANG, Qin LIU, Guojun WANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-07-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018119/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539437128843264
author Shaobo ZHANG
Qin LIU
Guojun WANG
author_facet Shaobo ZHANG
Qin LIU
Guojun WANG
author_sort Shaobo ZHANG
collection DOAJ
description In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.
format Article
id doaj-art-84d5ffba44e24eb5845eb1f3cca9f58e
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-07-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-84d5ffba44e24eb5845eb1f3cca9f58e2025-01-14T07:15:06ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-07-0139819159719375Trajectory privacy protection method based on location obfuscationShaobo ZHANGQin LIUGuojun WANGIn the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018119/trajectory privacylocation obfuscationlocation predictiondummy locationanonymizer
spellingShingle Shaobo ZHANG
Qin LIU
Guojun WANG
Trajectory privacy protection method based on location obfuscation
Tongxin xuebao
trajectory privacy
location obfuscation
location prediction
dummy location
anonymizer
title Trajectory privacy protection method based on location obfuscation
title_full Trajectory privacy protection method based on location obfuscation
title_fullStr Trajectory privacy protection method based on location obfuscation
title_full_unstemmed Trajectory privacy protection method based on location obfuscation
title_short Trajectory privacy protection method based on location obfuscation
title_sort trajectory privacy protection method based on location obfuscation
topic trajectory privacy
location obfuscation
location prediction
dummy location
anonymizer
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018119/
work_keys_str_mv AT shaobozhang trajectoryprivacyprotectionmethodbasedonlocationobfuscation
AT qinliu trajectoryprivacyprotectionmethodbasedonlocationobfuscation
AT guojunwang trajectoryprivacyprotectionmethodbasedonlocationobfuscation