A location privacy protection model was proposed based on the central server structure
designed a location privacy protection scheme based on pseudo-random permutation for the model. Proposed scheme builds on k-anonymous and secret information retrieval technology design concept and methods
achieves a blind query and perfect anonymous. This scheme has been proven to have untraceability and unlinkability
and the efficiency is analyzed as well.
关键词
Keywords
references
HARRISON B , DEY A . What have you done with location-based services lately [J ] . IEEE Pervasive Computing , 2009 , 8 ( 4 ): 66 - 70 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [A ] . Proceedings of the 1st International Conference on Mobile Systems, Applications and Ser-vices , A Francisco, California 2003 . 21 - 42 .
BAMBA B , LIU L , PESTI P , et al . Supporting anonymous location queries in mobile environments with privacygrid [A ] . Proceedings of the 17th International Conference on World Wide Web [C ] . Beijing, China , 2008 . 237 - 246 .
LIU F , HUA K A , CAI Y . Query l-diversity in location-based ser-vices [A ] . Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware [C ] . 2009 . 436 - 442 .
LEE B , OH J , YU H , et al . Protecting location privacy using location semantics [A ] . Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining [C ] . 2011 . 1289 - 1297 .
KALNIS P , GHINITA G . MOURATIDIS K, et al. Preventing loca-tion-based identity inference in anonymous spatial queries [J ] . IEEE Transactions on Knowledge and Data Engineering , 2007 , 19 ( 12 ): 1719 - 1733 .
PINGLEY A , YU W , ZHANG N , et al . A context-aware scheme for privacy-preserving location-based services [J ] . Computer Networks , 2012 , 56 ( 11 ): 2551 - 2568 .
NI W , ZHENG J , CHONG Z . HilAnchor: location privacy protection in the presence of users' preferences [J ] . Computer Science and Tech-nology , 2012 , 27 ( 2 ): 413 - 427 .
CHOW C , MOKBEL M F , LIU X . A peer to peer spatial cloaking algorithm for anonymous location based services [A ] . Proceedings of the ACM Symposium on Advances in Geographic Information Sys-tems , Arlington, VA 2006 . 171 - 178 .
HUANG Y , HUO Z , MENG X F . CoPrivacy : a collaborative location privacy-preserving method without cloaking region [J ] . Chinese Jour-nal of Computers , 2011 , 34 ( 10 ): 1976 - 1985 .
HU H B , XU J L . Non-exposure location anonymity [A ] . IEEE 25th International Conference on Data Engineering [C ] . 2009 . 1120 - 1131 .
HASHEM T , KULIK L . “Don't trust anyone”: privacy protection for location-based services [A ] . Pervasive and Mobile Computing , 2011 , 7 ( 1 ): 44 - 59 .
NERGIZ M E , ATZORI M , SAYGIN Y , et al . Towards trajectory anonymization: a generalization-based approach [A ] . Transactions on Data Privacy , 2009 , 2 ( 1 ): 47 - 75 .
MEYEROWITZ J , CHOUDHURY R R . Hiding stars with fireworks:location privacy through camouflage [A ] . Proceedings of the 15th An-nual International Conference on Mobile Computing and Network-ing [C ] . Beijing, China , 2009 . 345 - 356 .
BERESFORD A R , STAJANO F . Location privacy in pervasive com-puting [A ] . IEEE Pervasive Computing , 2003 , 2 ( 1 ): 46 - 55 .
HOH B , GRUTESER M , XIONG H , et al . Preserving privacy in GPS traces via uncertainty-aware path cloaking [A ] . Proceedings of the 14th ACM Conference on Computer and Communications Security [C ] . Alexandria, Virginia, USA , 2007 . 161 - 171 .
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al . Private queries in location-based services: anonymizers are not necessary [A ] . Pro-ceedings of the 2008 ACM SIGMOD International Conference on Management of Data , Vancouver, Canada: ACM , 2008 . 121 - 132 .
KHOSHGOZARA A , SHAHABI C , SHIRANI-MEHR H . Location privacy: going beyond k-anonymity, cloaking and anonymizers [A ] . Knowledge and Information Systems , 2011 , 26 ( 3 ): 435 - 465 .
ASHOURI-TALOUKI M , BARAANI-DASTJERDI A , SELCUK A . GLP: a cryptographic approach for group location privacy [J ] . Com-puter Communications , 2012 , 35 ( 12 ): 1527 - 1533 .
LIN X , LI S P , YANG Z H . Attacking algorithms against continuous queries in LBS and anonymity measurement [J ] . Chinese Journal of Software , 2009 , 20 ( 4 ): 1058 - 1068 .
ASONOV D . Querying Databases Privately: a New Approach to Pri-vate Information Retrieval [J ] . Springer , 2004 .