Skip to main content
Erschienen in: Soft Computing 14/2017

29.01.2016 | Methodologies and Application

An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism

verfasst von: Xinghua Li, Meixia Miao, Hai Liu, Jianfeng Ma, Kuan-Ching Li

Erschienen in: Soft Computing | Ausgabe 14/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the location-based service (LBS) privacy protection, the most common and classic solution is K-anonymity, however, existing schemes rarely consider the issue that whether other mobile users are willing to provide assistance to the requesters to form the K-anonymity set, thus leading to their poor practicability. In this paper, an incentive mechanism based on credit is introduced into the distributed K-anonymity, and only providing assistance to the others, a user can gain and accumulate his credit. Based on the fuzzy logic in the soft computing, a probability threshold is introduced to reflect a user’s reputation, and only when a user’s reputation reaches this threshold, can he get the assistance from other neighbors. Security analysis shows that our scheme is secure with respect to various typical attacks. And because of not relying on a trusted third party, our scheme can avoid the security issue resulting from its breach. Extensive experiments indicate that the time to form the anonymity set is short and it increases slowly as the value of K increases. Finally, the additional traffic introduced by this scheme is very limited.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Adar E, Huberman BA (2000) Free riding on Gnutella. First Monday 5(10):1–22 Adar E, Huberman BA (2000) Free riding on Gnutella. First Monday 5(10):1–22
Zurück zum Zitat Ahmad MW, Ansari MA (2012) A survey: soft computing in intelligent information retrieval systems. In: Proceedings of the 12th International Conference on Computational Science and Its Applications, pp 783–796 Ahmad MW, Ansari MA (2012) A survey: soft computing in intelligent information retrieval systems. In: Proceedings of the 12th International Conference on Computational Science and Its Applications, pp 783–796
Zurück zum Zitat Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of the 17th International Conference on World Wide Web, pp 237–246 Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of the 17th International Conference on World Wide Web, pp 237–246
Zurück zum Zitat Bernstein, Curve DJ (2006) New Diffie-Hellman speed records. In: Proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, pp 207–228 Bernstein, Curve DJ (2006) New Diffie-Hellman speed records. In: Proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, pp 207–228
Zurück zum Zitat Chow CY, Mokbel MF, Aref WG (2009) Casper: query processing for location services without compromising privacy. ACM Trans Database Syst 34(4):1–24CrossRef Chow CY, Mokbel MF, Aref WG (2009) Casper: query processing for location services without compromising privacy. ACM Trans Database Syst 34(4):1–24CrossRef
Zurück zum Zitat Daniel J, Bernstein Niels D, Lange TJ (2012) High-speed high-security signatures. J Cryptogr Eng 2(2):77–89CrossRefMATH Daniel J, Bernstein Niels D, Lange TJ (2012) High-speed high-security signatures. J Cryptogr Eng 2(2):77–89CrossRefMATH
Zurück zum Zitat Ficco M, Palmieri F, Castiglione A (2014) Hybrid indoor and outdoor location services for new generation mobile terminals. J Person Ubiquitiou Comput 18(2):271–285CrossRef Ficco M, Palmieri F, Castiglione A (2014) Hybrid indoor and outdoor location services for new generation mobile terminals. J Person Ubiquitiou Comput 18(2):271–285CrossRef
Zurück zum Zitat Freudiger J, Shokri R, Hubaux J (2009) On the optimal placement of mix zones. In: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, pp 216–234 Freudiger J, Shokri R, Hubaux J (2009) On the optimal placement of mix zones. In: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, pp 216–234
Zurück zum Zitat Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18CrossRef Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18CrossRef
Zurück zum Zitat Golle P, Leyton-Brown K, Mironov I (2001) Incentives for sharing in peer-to-peer networks. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, pp 264–267 Golle P, Leyton-Brown K, Mironov I (2001) Incentives for sharing in peer-to-peer networks. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, pp 264–267
Zurück zum Zitat Gruteser M, Grunwal D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications,and Services, pp 163–168 Gruteser M, Grunwal D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications,and Services, pp 163–168
Zurück zum Zitat Hernandez J, Moreno MV, Jara AJ, Skarmeta AF (2014) A soft computing based location-aware access control for smart buildings. Soft Comput 18(9):1659–1674CrossRef Hernandez J, Moreno MV, Jara AJ, Skarmeta AF (2014) A soft computing based location-aware access control for smart buildings. Soft Comput 18(9):1659–1674CrossRef
Zurück zum Zitat Hu H, Chen Q, Xu J (2013) VERDICT: privacy-preserving authentication of range queries in location-based services. In: Proceedings of the 29th IEEE International Conference on Data Engineering, pp 1312–1315 Hu H, Chen Q, Xu J (2013) VERDICT: privacy-preserving authentication of range queries in location-based services. In: Proceedings of the 29th IEEE International Conference on Data Engineering, pp 1312–1315
Zurück zum Zitat Jung T, Li XY (2013) Search me if you can: privacy-preserving location query service. In: Proceedings of the 32nd IEEE International Conference on Computer Communications, pp 2760–2768 Jung T, Li XY (2013) Search me if you can: privacy-preserving location query service. In: Proceedings of the 32nd IEEE International Conference on Computer Communications, pp 2760–2768
Zurück zum Zitat Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. Proc Int Conf Pervasive Serv 2005:88–97 Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. Proc Int Conf Pervasive Serv 2005:88–97
Zurück zum Zitat Levin D, LaCurts K (2008) BitTorrent is an Auetion:Analyzing and Improving BitTorrent’s Incentives. In: Proeeedings of the ACM SIGCOMM 2008 Conference on Data Communication, pp 243–254 Levin D, LaCurts K (2008) BitTorrent is an Auetion:Analyzing and Improving BitTorrent’s Incentives. In: Proeeedings of the ACM SIGCOMM 2008 Conference on Data Communication, pp 243–254
Zurück zum Zitat Lien IT, Lin YH, Shieh JR (2005) A novel privacy preserving location-based service protocol with secret circular shift for k-nn search. IEEE Trans Inf Forensics Secur 8(6):863–873CrossRef Lien IT, Lin YH, Shieh JR (2005) A novel privacy preserving location-based service protocol with secret circular shift for k-nn search. IEEE Trans Inf Forensics Secur 8(6):863–873CrossRef
Zurück zum Zitat Metre PB, Radhika KR, Gowrishankar G (2012) Survey of soft computing techniques for joint radio resource management. In: Proceedings of 2012 International Conference on Multimedia Computing and System, pp 562–565 Metre PB, Radhika KR, Gowrishankar G (2012) Survey of soft computing techniques for joint radio resource management. In: Proceedings of 2012 International Conference on Multimedia Computing and System, pp 562–565
Zurück zum Zitat Paulet R, Kaosar MG, Yi X, Bertino E (2012) Privacy-preserving and content-protecting location based queries. In: Proceedings of the 28th IEEE International Conference on Data Engineering, pp 44–53 Paulet R, Kaosar MG, Yi X, Bertino E (2012) Privacy-preserving and content-protecting location based queries. In: Proceedings of the 28th IEEE International Conference on Data Engineering, pp 44–53
Zurück zum Zitat Tang F, Li J, You L, Guo M (2015) Long-term location privacy protection for location-based services in mobile cloud computing. J Soft Comput (published online) Tang F, Li J, You L, Guo M (2015) Long-term location privacy protection for location-based services in mobile cloud computing. J Soft Comput (published online)
Zurück zum Zitat Trawinski K, Alonso JK, Hernandez N (2013) A multiclassifier approach for topology-based wifi indoor localization. Soft Comput 17(10):1817–1831CrossRef Trawinski K, Alonso JK, Hernandez N (2013) A multiclassifier approach for topology-based wifi indoor localization. Soft Comput 17(10):1817–1831CrossRef
Zurück zum Zitat Yang DJ, Fang X, Xue GL (2013) Truthful Incentive Mechanisms for K-Anonymity Location Privacy. In: Proceedings of the 32nd IEEE International Conference on Computer Communications, pp 783–796 Yang DJ, Fang X, Xue GL (2013) Truthful Incentive Mechanisms for K-Anonymity Location Privacy. In: Proceedings of the 32nd IEEE International Conference on Computer Communications, pp 783–796
Metadaten
Titel
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
verfasst von
Xinghua Li
Meixia Miao
Hai Liu
Jianfeng Ma
Kuan-Ching Li
Publikationsdatum
29.01.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 14/2017
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-016-2040-2

Weitere Artikel der Ausgabe 14/2017

Soft Computing 14/2017 Zur Ausgabe