Research on User Privacy Protection Algorithm in Location Service

Author(s):  
Jianlan Liu ◽  
Zhen Xu ◽  
Xin Xu ◽  
Zheng Zou
2018 ◽  
Vol 173 ◽  
pp. 03048 ◽  
Author(s):  
Jianjun Wen ◽  
Zhao Li

With the widespread application of location-based services, users 'privacy concerns have become the focus of users' attention. Based on the k-anonymity method and the SpaceTwist algorithm, this paper proposes a method of incremental inquiry user privacy protection. The method preliminarily anonymizes the user's location information and points of interest on the client side, On the anonymous server side, combining the road network environment with the latitude and longitude grid generates the minimum anonymous area of random loop, instead of the user initiating incremental inquiry to the location service provider, Anonymous zones ensure k-anonymity for mobile users and road information to protect user privacy. Security and experimental analysis show that this scheme can improve the effectiveness of user query service while meeting the privacy requirements of users.


Libri ◽  
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Zongda Wu ◽  
Chenglang Lu ◽  
Youlin Zhao ◽  
Jian Xie ◽  
Dongdong Zou ◽  
...  

Abstract This paper reviews a large number of research achievements relevant to user privacy protection in an untrusted network environment, and then analyzes and evaluates their application limitations in personalized information retrieval, to establish the conditional constraints that an effective approach for user preference privacy protection in personalized information retrieval should meet, thus providing a basic reference for the solution of this problem. First, based on the basic framework of a personalized information retrieval platform, we establish a complete set of constraints for user preference privacy protection in terms of security, usability, efficiency, and accuracy. Then, we comprehensively review the technical features for all kinds of popular methods for user privacy protection, and analyze their application limitations in personalized information retrieval, according to the constraints of preference privacy protection. The results show that personalized information retrieval has higher requirements for users’ privacy protection, i.e., it is required to comprehensively improve the security of users’ preference privacy on the untrusted server-side, under the precondition of not changing the platform, algorithm, efficiency, and accuracy of personalized information retrieval. However, all kinds of existing privacy methods still cannot meet the above requirements. This paper is an important study attempt to the problem of user preference privacy protection of personalized information retrieval, which can provide a basic reference and direction for the further study of the problem.


2020 ◽  
Vol 195 ◽  
pp. 105679
Author(s):  
Zongda Wu ◽  
Shigen Shen ◽  
Xinze Lian ◽  
Xinning Su ◽  
Enhong Chen

Author(s):  
Awanthika Senarath ◽  
Nalin Asanka Gamagedara Arachchilage

There could be numerous reasons that drive organizations to provide privacy protections to end users in the applications they develop and maintain. Organizational motivations towards privacy affects the quality of privacy received by end users. Understanding these motivations and the approaches taken by organizations towards privacy protection would assist the policymakers and regulators to define effective frameworks encouraging organizational privacy practices. This study focuses on understanding the motivations behind organizational decisions and the approaches they take to embed privacy into the software applications. The authors analyzed 40 organizations different in size, scope, scale of operation, nature of data used, and revenue. they identified four groups of organizations characterized by the approach taken to provide privacy protection to their users. The taxonomy contributes to the organizational perspective of privacy. The knowledge presented here would help addressing the challenges in the domain of user privacy in software applications and services.


2016 ◽  
pp. 1693-1717
Author(s):  
Wen-Chen Hu ◽  
Naima Kaabouch ◽  
Hung-Jen Yang ◽  
S. Hossein Mousavinezhad

Since the introduction of iPhone in 2007, smartphones have become very popular (e.g., the number of worldwide smartphone sales has surpassed the number of PC sales in 2011). The feature of high mobility and small size of smartphones has created many applications that are not possible or inconvenient for PCs and servers, even laptops. Location-based services (LBS), one of mobile applications, have attracted a great attention recently. This research proposes a location-based service, which predicts a spatial trajectory based on the current and previous trajectories by using a novel matrix representation. Spatial trajectory prediction can be used in a variety of purposes such as travel recommendations and traffic control and planning, but at the same time, just like most location-based services, the user privacy concern is a major issue. Without rigorous privacy protection, users would be reluctant to use the service. The proposed method is simple but effective and user privacy is rigorously preserved at the same time because the trajectory prediction is performed at the user-side. Additionally, this research is not only useful but also pedagogical because it involves a variety of topics like (i) mobile computing, (ii) mobile security, and (iii) human behavior recognition.


Author(s):  
Mingming Guo ◽  
Kianoosh G. Boroojeni ◽  
Niki Pissinou ◽  
Kia Makki ◽  
Jerry Miller ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document