Skip to main content

2016 | OriginalPaper | Buchkapitel

Learning-Based Privacy-Preserving Location Sharing

verfasst von : Nan Shen, Xuan Chen, Shuang Liang, Jun Yang, Tong Li, Chunfu Jia

Erschienen in: Computational Intelligence and Intelligent Systems

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the improvement of mobile communication technology, mobile Online Social Networks (mOSNs) provide users with the corresponding location based services when compared with traditional social networks. Location sharing becomes a fundamental component of mOSNs now, and some practical methods and techniques have been proposed to protect user’s privacy information. Some of these methods can accommodate privacy protection based on the input user profile and user’s privacy preferences through personalization, but user may be unlikely to use them without easy operation and strong privacy guarantee. In this article, we make a further research on privacy-preserving location sharing in mOSNs and develop a framework to help user to choose his desired degree of the privacy protection based on context aware. An adaptive learning model is established to provide user privacy right decisions, based on analyzing a series of factors that influence the choice of user’s privacy profile. This model will manage the different contexts of different user privacy preference with minimal user intervention and can achieve self-perfection gradually. So our proposed model can effectively protect users’ privacy and motivate users to make use of privacy preferences available to them.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dinh, H.T., Lee, C., Niyato, D., et al.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)CrossRef Dinh, H.T., Lee, C., Niyato, D., et al.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)CrossRef
2.
Zurück zum Zitat Tang, K.P., Lin, J., Hong, J.I., et al.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing. pp. 85–94, ACM (2010) Tang, K.P., Lin, J., Hong, J.I., et al.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing. pp. 85–94, ACM (2010)
3.
Zurück zum Zitat Brooker, D., Carey, T., Warren, I.: Middleware for social networking on mobile devices. In: 2010 21st Australian Software Engineering Conference (ASWEC), pp. 202–211. IEEE (2010) Brooker, D., Carey, T., Warren, I.: Middleware for social networking on mobile devices. In: 2010 21st Australian Software Engineering Conference (ASWEC), pp. 202–211. IEEE (2010)
4.
Zurück zum Zitat Xiao, X., Zheng, Y., Luo, Q., et al.: Inferring social ties between users with human location history. J. Ambient Intell. Humanized Comput. 5(1), 3–19 (2014)CrossRef Xiao, X., Zheng, Y., Luo, Q., et al.: Inferring social ties between users with human location history. J. Ambient Intell. Humanized Comput. 5(1), 3–19 (2014)CrossRef
5.
Zurück zum Zitat Gu, J., He, L., Yang, J., et al.: Location aware mobile cooperation-design and system[J]. Int. J. Sig. Proc. Image Proc. Pattern Recogn. 2(4), 49–60 (2009) Gu, J., He, L., Yang, J., et al.: Location aware mobile cooperation-design and system[J]. Int. J. Sig. Proc. Image Proc. Pattern Recogn. 2(4), 49–60 (2009)
6.
Zurück zum Zitat Liu, L.: From data privacy to location privacy: models and algorithms. In: VLDB Endowment Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 1429–1430 (2007) Liu, L.: From data privacy to location privacy: models and algorithms. In: VLDB Endowment Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 1429–1430 (2007)
7.
Zurück zum Zitat Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: INTERACT, vol. 3, pp. 702–712 (2003) Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: INTERACT, vol. 3, pp. 702–712 (2003)
8.
Zurück zum Zitat Natesan, G., Liu, J.: An adaptive learning model for k-anonymity location privacy protection. In: IEEE 39th Annual Computer Software and Applications Conference (COMPSAC), vol. 3, pp. 10–16. IEEE (2015) Natesan, G., Liu, J.: An adaptive learning model for k-anonymity location privacy protection. In: IEEE 39th Annual Computer Software and Applications Conference (COMPSAC), vol. 3, pp. 10–16. IEEE (2015)
9.
Zurück zum Zitat Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)CrossRefMathSciNetMATH Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)CrossRefMathSciNetMATH
10.
Zurück zum Zitat Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003) Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)
11.
Zurück zum Zitat Cox, L.P., Dalton, A., Marupadi, V.: Smokescreen: flexible privacy controls for presence-sharing. In: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 233–245. ACM (2007) Cox, L.P., Dalton, A., Marupadi, V.: Smokescreen: flexible privacy controls for presence-sharing. In: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 233–245. ACM (2007)
12.
Zurück zum Zitat Wei, W., Xu, F., Li, Q.: Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: 2012 Proceedings IEEE INFOCOM, pp. 2616–2620. IEEE (2012) Wei, W., Xu, F., Li, Q.: Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: 2012 Proceedings IEEE INFOCOM, pp. 2616–2620. IEEE (2012)
13.
Zurück zum Zitat Ejigu, D., Scuturici, M., Brunie, L.: An ontology-based approach to context modeling and reasoning in pervasive computing. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 14–19. IEEE (2007) Ejigu, D., Scuturici, M., Brunie, L.: An ontology-based approach to context modeling and reasoning in pervasive computing. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 14–19. IEEE (2007)
14.
Zurück zum Zitat Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)CrossRef Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)CrossRef
15.
Zurück zum Zitat Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB Endowment Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774 (2006) Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB Endowment Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774 (2006)
16.
Zurück zum Zitat Knijnenburg, B.P., Kobsa, A., Jin, H.: Preference-based location sharing: are more privacy options really better?. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2667–2676. ACM (2013) Knijnenburg, B.P., Kobsa, A., Jin, H.: Preference-based location sharing: are more privacy options really better?. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2667–2676. ACM (2013)
17.
Zurück zum Zitat Xu, H., Gupta, S., Pan, S.: Balancing user privacy concerns in the adoption of location-based services: an empirical analysis across pull-based and push-based applications (2009) Xu, H., Gupta, S., Pan, S.: Balancing user privacy concerns in the adoption of location-based services: an empirical analysis across pull-based and push-based applications (2009)
18.
Zurück zum Zitat Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 348-357. ACM (2009) Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 348-357. ACM (2009)
Metadaten
Titel
Learning-Based Privacy-Preserving Location Sharing
verfasst von
Nan Shen
Xuan Chen
Shuang Liang
Jun Yang
Tong Li
Chunfu Jia
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0356-1_70

Premium Partner