Computer Science ›› 2015, Vol. 42 ›› Issue (2): 108-113.doi: 10.11896/j.issn.1002-137X.2015.02.023

Previous Articles     Next Articles

Mobile Location Privacy Protection Based on Untrusted Environment

LIU Xue-jun, CHEN Yu-feng and LI Bin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: With the development of mobile computing and location equipment technologies,location privacy protection receives extensive attention from academia in recent years.A lot of anonymity algorithm has been put forward to protect users’ privacy information.However,the existing methods is either not suitable for mobile environment,or do not consider the untrusted environment.In light of these problems,this paper put forward Dynamic_p which is dynamic planning anonymity algorithm based on game theory.This method is proposed on the basic of Privacy_1[8] solving the privacy protection in the suspect environment.First it turns anonymous group into anonymous tree,and then child node cooperates with the parent node to calculate the anchor through game from the tree’s bottom to top,finally it calculates the entire anchors of anonymous group through layers of recursive.After that,users initiate location neighbor query through using anchor of anonymous group instead of actual location,then select candidate locations by probability statistics,finally calculate the final ideal location through computation.Simulation results show that this method has better performance,and can be applied to mobile untrusted environment.

Key words: Mobile computing,Location services,Privacy protection,Game,Dynamic planning

[1] Mokbel M F,Chow C Y,Aref W G.The new Casper:Queryprocessing for location services without compromising privacy[C]∥Proc of the 32nd Int Conf on Very Large Data Bases(VLDB).New York:ACM,2006:763-774
[2] Chow C,Mokbel M F.Enabling privacy continuous queries for revealed user locations[C]∥LNCS 4605:Proc of the Int Symp on Advances in Spatial and Temporal Databases(SSTD).Berlin:Springer,2007
[3] Gruteser M,Grunwal D.Anonymous usage of location-basedservices through spatial and temporal cloaking[C]∥Proc of the Int Conf on Mobile Systems,Applications,and Services(MobiSys).New York:ACM,2003:163-168
[4] Xiao Zhen,Xu Jian-liang,Meng Xiao-feng.P-sensitivity:A se-mantic privacy-protection model for location-based services[C]∥Proc of the 2nd Int Workshop on Privacy-Aware Location-Based Mobile Services(PALMS).Piscataway,NJ:IEEE,2008:47-54
[5] 林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量[J].软件学报,2009(4):1058-1068
[6] 彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011(5):1211-1216 (下转第141页)(上接第113页)
[7] 潘晓,郝兴,孟小峰.基于位置服务中的连续查询隐私保护研究[J].计算机研究与发展,2010,7(1):121-129
[8] 陈玉凤,刘学军,李斌.基于博弈论的用户相互协作的位置隐私保护方法[J].计算机科学,2013,40(10):92-97
[9] 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985
[10] 潘晓,肖珍,孟小峰.移动位置隐私保护[J].计算机科学与探索,2007(10):268-281
[11] Bamba B,Liu L.Supporting anonymous location queries in mobile environments with privacy grid[C]∥Proc of Int Conf on World Wide Web(WWW).New York:ACM,2008:237-246
[12] Brinkhoff T.A framework for generating network based moving objects[J].GeoInformatica,2002,6(2):153-180

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!