Computer Science ›› 2013, Vol. 40 ›› Issue (7): 116-120.

Previous Articles     Next Articles

Protecting Location Privacy with Voronoi Diagram over Road Networks

ZHAO Ping,MA Chun-guang,GAO Xun-bing and ZHU Wei   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Location privacy disclosure has become main constraint of LBS applications,while most existing location privacyprotection methods do not consider the background of mobile users——the road network.A location privacy protection method over road networks was presented.This method consists of three phases.First,in order to meet the requirement of segment l-diversity,the road-network Voronoi diagram is constructed based on the structure of the road network.Second,VK-privacy model is put forward.It satisfies all the users’ privacy requirement in the cloaking set and effectively insures the QoS of LBS.Finally,a clocking algorithm based on VK-privacy model is presented,which improves processing efficiency and safety by cloaking multiple users in the same V-region together.The method takes full account of the structure characteristics of road networks and leverages users’ privacy requirement and QoS of LBS.The robustness against inference attacksof the method was proved through theoretical analysis,and the feasibility of the method was proved by the experimental data.

Key words: LBS,Location privacy,Road network,Voronoi diagram

[1] Freudiger J,Shokri R,Hubaux J-P.Evaluating the Privacy Risk of Location-Based Services[A]∥15th International Conference on Financial Cryptography and Data Security[C].Gros Islet,St.Lucia,2012:31-46
[2] Cvrcek D,Kumpost M,Matyas V,et al.A study on the value of location privacy[A]∥WPES ’06:Proceedings of the 5th ACM workshop on Privacy in electronic society[C].New York,USA:ACM,2006:109-118
[3] Gruteser M,Grunwald D.Anonymous usage of location-based servicesthrough spatial and temporal cloaking[A]∥Proceedings of the 1st International Conference on Mobile Systems,Applicatio-ns and Services[C].San Francisco,USA:ACM,2003:163-168
[4] Sweeney L.k-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570
[5] Mokbel M F,Chow C Y.Casper*:query processing for location services without compromising privacy[J].ACM Transactions on Data Systems,2009,34(4):24-48
[6] Machanavajjhala A,Kifer D,Gehrke J,et al.l-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):3
[7] Gedik B,Liu L.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[A]∥IEEE Transactions on Mobile Computing[C].California,USA,2008:1-18
[8] Shin K G,Ju X,Chen Z,et al.Privacy protection for users of location-based services[J].IEEE Communications Society,2012,19(1):30-39
[9] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location-based identity inference in anonymous spatial queries[J].Knowledge and Data Engineering,2007,19(12):1719-1733
[10] Wang Ting,Liu Ling.Privacy-aware mobile services over road networks[J].VLDB Endowment,2009,2(1):1042-1053
[11] 徐建,徐明,林欣.路网限制环境中基于匿名蜂窝的位置隐私保护[J].浙江大学学报,2011,5(3):429-434
[12] 薛姣,刘向宇,杨晓春.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,4(5):865-878
[13] 魏琼,卢炎生.位置隐私保护技术研究进展[J].计算机科学,2008,5(9):21-25
[14] Wu Xiao-jun,Luo Xue-fang.The Algorithm for Creating Weighted Voronoi Diagrams based on Cellular Automata[A]∥The 6th World Congress on Intelligent Control and Automation[C].Dalian China:Luo Xue-fang,2006:4630-4633
[15] Brinkhoff T.Network-based generator of moving objects[A]∥Proceedings of the 12th International Conference on Scientific and Statistical Database Management[C].Oldenburg,Germany,2000:253-255

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!