Skip to main content
Top

2015 | OriginalPaper | Chapter

A Personalized k-Anonymity with Fake Position Generation for Location Privacy Protection

Authors : Zhi Luo, Xiaohong Huang

Published in: Frontiers in Internet Technologies

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Privacy protection has become one of the important issues for location-based services (LBS) nowadays. In order to meet the requirements of humanization, security and quick response, this paper proposes an improved personalized k-anonymous location privacy protection algorithm with fake position generation mechanism. Compared to the normal personalized k-anonymity algorithm, our improved algorithm has higher success rate of anonymity. By generating fake queries for the source queries that expire, our algorithm guarantees that no source query will be dropped, namely all the source queries can get anonymized. The experimental results show that the algorithm proposed by this paper is able to achieve better performance in terms of success rate of anonymity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms, IEEE Trans. Mob. Comput. 7(1), 1–18, (2008) Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms, IEEE Trans. Mob. Comput. 7(1), 1–18, (2008)
5.
go back to reference Xiao, P., Zhen, X., Xiaofeng, M.: Survey of location privacy preserving. J. Comput. Sci. Front. 1(3), 268–281 (2007) Xiao, P., Zhen, X., Xiaofeng, M.: Survey of location privacy preserving. J. Comput. Sci. Front. 1(3), 268–281 (2007)
6.
go back to reference Xiao, Z., Meng, X., Xu, J.: Quality Aware Privacy Protection for Location—Based Services, pp. 434–446. Springer, Heidelberg (2007) Xiao, Z., Meng, X., Xu, J.: Quality Aware Privacy Protection for Location—Based Services, pp. 434–446. Springer, Heidelberg (2007)
7.
go back to reference Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location based services. In: IEEE International Conference on Pervasive Services, pp. 88–97 (2005) Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location based services. In: IEEE International Conference on Pervasive Services, pp. 88–97 (2005)
8.
go back to reference Jang, M.Y., Jang, S.J., Chang, J.W.: A New KNN query processing algorithm enhancing privacy protection in location based services. In: IEEE First International Conference on Mobile Services, pp. 17–24 (2012) Jang, M.Y., Jang, S.J., Chang, J.W.: A New KNN query processing algorithm enhancing privacy protection in location based services. In: IEEE First International Conference on Mobile Services, pp. 17–24 (2012)
9.
go back to reference Kalnis, P., Ghinita, G., Mouratidis, K., et al.: Preventing location based identify inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)CrossRef Kalnis, P., Ghinita, G., Mouratidis, K., et al.: Preventing location based identify inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)CrossRef
10.
go back to reference Samarati, P., Sweeney L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of IEEE Symposium on Research in Security and Privacy (1998) Samarati, P., Sweeney L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of IEEE Symposium on Research in Security and Privacy (1998)
11.
12.
go back to reference Gruteser, M., Grunwald, D.: Anonymous usage of location based services through spatial and temporal cloaking. In: ACM/USENIX MobiSys (2003) Gruteser, M., Grunwald, D.: Anonymous usage of location based services through spatial and temporal cloaking. In: ACM/USENIX MobiSys (2003)
13.
go back to reference Kang, H.: The research and implementation of personalized k-anonymous location privacy protection technology based on the internet of things. J. Nanjing Univ. Posts Telecommun. (Natural Science Edition) TP393.08, 28(6), 78–82 (2012) Kang, H.: The research and implementation of personalized k-anonymous location privacy protection technology based on the internet of things. J. Nanjing Univ. Posts Telecommun. (Natural Science Edition) TP393.08, 28(6), 78–82 (2012)
14.
go back to reference Beckmann, N., Kriegel, H.-P., Schneider, R., Seeger, B.: R±Tree: an efficient and robust access method for points and rectangles. In: Proceeding of ACM International Conference Management of Data (Sigmod 1990), pp. 322–331 (1990) Beckmann, N., Kriegel, H.-P., Schneider, R., Seeger, B.: R±Tree: an efficient and robust access method for points and rectangles. In: Proceeding of ACM International Conference Management of Data (Sigmod 1990), pp. 322–331 (1990)
Metadata
Title
A Personalized k-Anonymity with Fake Position Generation for Location Privacy Protection
Authors
Zhi Luo
Xiaohong Huang
Copyright Year
2015
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-46826-5_4

Premium Partner