Computer Science ›› 2016, Vol. 43 ›› Issue (3): 137-144.doi: 10.11896/j.issn.1002-137X.2016.03.027

Previous Articles     Next Articles

Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks

DAI Jia-zhu and HUA Liang   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Location information contains personal privacy,and the precise location information may disclose users’ hobby,behavior and other sensitive information.Therefore,the protection of location information privacy is very important.The existing methods of generating anonymous area for location privacy protection are mostly based on the k-anonymous algorithms under Euclidean space.Though they can anonymize user’s location in a certain extent,in real life,the location is influenced by the road networks environment seriously,at the same time,the k-anonymous algorithms under Euclidean space do not consider whether the generated anonymous area is still within sensitive region.This paper proposed a method of generating anonymous area for sensitive location protection under road networks.The method is based on space partition.Firstly,it generates the Voronoi cell for the node of road networks according to the demands of road networks L-diversity.Then combined with the sensitivity of the user’s location,it generates the anonymous area for user’s location.The experiment results show that compared with the existing k-anonymous algorithms,this algorithm achieves the goal that the generated anonymous area is not within sensitive region,therefore,it provides better protection for location privacy.

Key words: Voronoi,Anonymous area,Road networks structure,Location sensitivity,Location privacy

[1] Huo Zheng,Meng Xiao-feng.A Survey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Computers,2011,34(10):1820-1830(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830
[2] Sweeney L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge based Systems,2002,10(5):557-570
[3] Gruteser M,Grunwald D.Anonymous usage of location-basedservices through spatial and temporal cloaking[C]∥Proceedings of the 1st International Conference on Mobile Systems,Applications and Services.ACM,2003:31-42
[4] Zhao Ze-mao,Hu Hui-dong,Zhang Fan,et al.A k-anonymousalgorithm in location privacy protection based on circular zoning[J].Journal of Beijing Jiaotong University,2013,7(5):13-18(in Chinese) 赵泽茂,胡慧东,张帆,等.圆形区域划分的k-匿名位置隐私保护方法[J].北京交通大学学报,2013,7(5):13-18
[5] Wang Jia-hui,Cheng Jiu-jun.The location of the P2P modebased on grid amplification anonymous algorithm[J].Computer Science,2014,1(4):90-94(in Chinese) 王嘉慧,程久军.P2P模式下基于网格扩增的位置匿名算法[J].计算机科学,2014,1(4):90-94
[6] Xu J,Tang X,Hu H,et al.Privacy-conscious location based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(3):313-326
[7] Huang Yi,Huo Zheng,Meng Xiao-feng.CoPrivacy:A Collabo-rative Location Privacy-Preserving Method without Cloaking Region[J].Chinese Journal of Computers,2011,34(10):1976-198(in Chinese) 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-198
[8] Machanvajjhala A,Kifer D,Gehrke J,et al.L-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Konwledge Discovery from Data,2007,1(1):3
[9] Wang Ting,Liu Ling.Privacy-aware mobile services over road networks[J].VLDB Endowment,2009,2(1):1042-1053
[10] Xue Jiao,Liu Xiang-yu,Yang Xiao-chun,et al.A Location Privacy Preserving Approach on Road Network[J].Chinese Journal of Computers,2011,4(5):865-878(in Chinese) 薛姣,刘向宇,杨晓春,等.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,4(5):865-878
[11] Sun Lan,Luo Zhao,Wu Ying-jie,et al.An Algorithm for protection location privacy in road network[J].Journal of Shandong University(Engineering Science),2012,2(5):96-101(in Chinese) 孙岚,罗钊,吴英杰,等.面向路网限制的位置隐私保护算法[J].山东大学学报(工学版),2012,2(5):96-101
[12] Zhao Ping,Ma Chun-guang,Gao Xun-bing,et al.Protecting Location Privacy with Voronoi Diagram over Road Networks[J].Computer Science,2013,40(7):116-120(in Chinese) 赵平,马春光,高训兵,等.路网环境下基于Voronoi图的位置隐私保护方法[J].计算机科学,2013,40(7):116-120
[13] Shun K G,Ju X,Chen Z,et al.Privacy protection for users of location-based services[J].IEEE Communications Society,2012,9(1):30-39
[14] Chow C Y,Mokbel M F,Liu X.A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]∥Procee-dings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems.ACM,2006:171-178
[15] Hu H,Xu J.2PASS:Bandwidth-optimized location cloaking for anonymous location-based services[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(10):1458-1472
[16] Wang Lu,Meng Xiao-feng.Location Privacy Preservation in Big Data Era:A Survey[J].Journal of Software,2014,5(4):693-712(in Chinese) 王璐,孟小峰.位置大数据隐私保护研究综述[J].软件学报,2014,5(4):693-712
[17] Brinkhoff T.A framework for generating network based moving objects[J].Geo Informatic,2002,6(2):153-180
[18] Sousa M,Techmer A,Steinhage A,et al.Human tracking andidentification using a sensitive floor and wearable accelerometers[C]∥2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).IEEE,2013:166-171
[19] Gedik B,Liu L.Protecting location privacy with personalizedk-anonymity:Architecture and algorithms[J].IEEE Transactions on Mobile Computing,2008,7(1):1-18
[20] Xu J,Tang X,Hu H,et al.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(3):313-326
[21] Pan X,Xu J,Meng X.Protecting location privacy against location-dependent attacks in mobile services[J].IEEE Transactions on Knowledge and Data Engineering,2012,24(8):1506-1519
[22] Zhu Qing,Zhao Tong,Wang Shan.Privacy Preservation Algorithm for Service-Oriented Information Search[J].Chinese Journal of Computers,2010,33(8):1315-1323(in Chinese)朱青,赵桐,王珊.面向查询服务的数据隐私保护算法[J].计算机学报,2010,33(8):1315-1323

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!