[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-981-97-2390-4_14guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Effective Privacy-Preserving and Enhanced Dummy Location Scheme for Semi-trusted Third Parties

Published: 28 April 2024 Publication History

Abstract

Location-Based Services (LBS) have garnered significant attention in recent years, emphasizing the need to improve location services while safeguarding user privacy. In this paper, we propose an effective privacy-preserving and enhanced dummy location scheme specifically designed for semi-trusted third-party scenarios, with a primary focus on defending against inference attacks targeting a user’s private location information. To achieve more effective location privacy preservation and mitigate privacy leaks stemming from a single point of failure, we employ a key information sharing mechanism, introduce a robust dummy location set generation approach, and present a comprehensive covering area construction strategy. To demonstrate the viability and effectiveness of our proposed scheme, we conduct a thorough simulation evaluation and performance analysis based on a practical road network setting.

References

[1]
Wang X, Ma J, Miao Y, Liu X, Zhu D, and Deng RH Fast and secure location-based services in smart cities on outsourced data IEEE Internet Things J. 2021 8 24 17639-17654
[2]
Feng J, Wang Y, Wang J, and Ren F Blockchain-based data management and edge-assisted trusted cloaking area construction for location privacy protection in vehicular networks IEEE Internet Things J. 2021 8 4 2087-2101
[3]
Wu Z et al. A location privacy-preserving system based on query range cover-up or location-based services IEEE Trans. Veh. Technol. 2020 69 5 5244-5254
[4]
Jiang H, Li J, Zhao P, Zeng F, Xiao Z, and Iyengar A Location privacy-preserving mechanisms in location-based services: a comprehensive survey ACM Comput. Surv. (CSUR) 2021 54 1 1-36
[5]
Gao H, Huang W, Liu T, Yin Y, and Li Y PPO2: location privacy-oriented task offloading to edge computing using reinforcement learning for intelligent autonomous transport systems IEEE Trans. Intell. Transp. Syst. 2023 24 7 7599-7612
[6]
Zhang S, Choo KR, Liu Q, and Wang G Enhancing privacy through uniform grid and caching in location-based services Future Gener. Comput. Syst. 2018 86 881-892
[7]
Saravanan PS and Balasundaram SR Protecting privacy in location-based services through location anonymization using cloaking algorithms based on connected components Wirel. Pers. Commun. 2018 102 1 449-471
[8]
Wen, R., Zhang, R., Peng, K., Wang, C.: Protecting locations with differential privacy against location-dependent attacks in continuous LBS queries. In: 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, 20-22 October 2021, pp. 379–386. IEEE (2021)
[9]
Yang D, Ye B, Zhang W, Zhou H, and Qian X Klpps: a k-anonymous location privacy protection scheme via dummies and stackelberg game Sec. Commun. Netw. 2021 2021 1-15
[10]
Qi L, Wang X, Xu X, Dou W, and Li S Privacy-aware cross-platform service recommendation based on enhanced locality-sensitive hashing IEEE Trans. Netw. Sci. Eng. 2020 8 2 1145-1153
[11]
Shao, Z., Wang, H., Zou, Y., Gao, Z., Lv, H.: From centralized protection to distributed edge collaboration: a location difference-based privacy-preserving framework for mobile crowdsensing. Secur. Commun. Netw. 2021, 5855745:1–5855745:18 (2021)
[12]
Zhao D, Jin Y, Zhang K, Wang X, Hung PCK, and Ji W EPLA: efficient personal location anonymity GeoInformatica 2018 22 1 29-47
[13]
Lai H, Xu L, and Zeng Y An efficient location privacy-preserving authentication scheme for cooperative spectrum sensing IEEE Access 2020 8 163472-163482
[14]
Yin C, Xi J, Sun R, and Wang J Location privacy protection based on differential privacy strategy for big data in industrial internet of things IEEE Trans. Industr. Inf. 2018 14 8 3628-3636
[15]
Mendes, R., Cunha, M., Vilela, J.P.: Impact of frequency of location reports on the privacy level of geo-indistinguishability. Proc. Priv. Enhancing Technol. 2020(2), 379–396 (2020)
[16]
Wang, H., Qin, Y., Liu, Z., Li, Y.: Processing private queries based on distributed storage in location-based services. In: Proceedings of the ACM Turing Celebration Conference - China, ACM TUR-C 2019, Chengdu, China, 17-19 May 2019, pp. 2:1–2:6. ACM (2019)
[17]
Zhang J, Li C, and Wang B A performance tunable cpir-based privacy protection method for location based service Inf. Sci. 2022 589 440-458
[18]
Wu Z, Shen S, Lian X, Su X, and Chen E A dummy-based user privacy protection approach for text information retrieval Knowl. Based Syst. 2020 195

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Web and Big Data: 7th International Joint Conference, APWeb-WAIM 2023, Wuhan, China, October 6–8, 2023, Proceedings, Part II
Oct 2023
535 pages
ISBN:978-981-97-2389-8
DOI:10.1007/978-981-97-2390-4
  • Editors:
  • Xiangyu Song,
  • Ruyi Feng,
  • Yunliang Chen,
  • Jianxin Li,
  • Geyong Min

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 28 April 2024

Author Tags

  1. Privacy preservation
  2. Location based service
  3. Game model
  4. Semi-trusted third party
  5. Inference attacks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media