Trajectory privacy protection method based on location obfuscation
In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location predi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018119/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539437128843264 |
---|---|
author | Shaobo ZHANG Qin LIU Guojun WANG |
author_facet | Shaobo ZHANG Qin LIU Guojun WANG |
author_sort | Shaobo ZHANG |
collection | DOAJ |
description | In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer. |
format | Article |
id | doaj-art-84d5ffba44e24eb5845eb1f3cca9f58e |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-07-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-84d5ffba44e24eb5845eb1f3cca9f58e2025-01-14T07:15:06ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-07-0139819159719375Trajectory privacy protection method based on location obfuscationShaobo ZHANGQin LIUGuojun WANGIn the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018119/trajectory privacylocation obfuscationlocation predictiondummy locationanonymizer |
spellingShingle | Shaobo ZHANG Qin LIU Guojun WANG Trajectory privacy protection method based on location obfuscation Tongxin xuebao trajectory privacy location obfuscation location prediction dummy location anonymizer |
title | Trajectory privacy protection method based on location obfuscation |
title_full | Trajectory privacy protection method based on location obfuscation |
title_fullStr | Trajectory privacy protection method based on location obfuscation |
title_full_unstemmed | Trajectory privacy protection method based on location obfuscation |
title_short | Trajectory privacy protection method based on location obfuscation |
title_sort | trajectory privacy protection method based on location obfuscation |
topic | trajectory privacy location obfuscation location prediction dummy location anonymizer |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018119/ |
work_keys_str_mv | AT shaobozhang trajectoryprivacyprotectionmethodbasedonlocationobfuscation AT qinliu trajectoryprivacyprotectionmethodbasedonlocationobfuscation AT guojunwang trajectoryprivacyprotectionmethodbasedonlocationobfuscation |