A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service

Author(s):  
Jung-Ho Um ◽  
Mi-Young Jang ◽  
Kyoung-Jin Jo ◽  
Jae-Woo Chan
2018 ◽  
Vol 189 ◽  
pp. 10013
Author(s):  
Tao Feng ◽  
Xudong Wang ◽  
Xinghua Li

Location based Service (the Location - -based Service, LBS) is a System is to transform the existing mobile communication network, wireless sensor networks, and Global Positioning System (Global Positioning System, GPS) with the combination of information Service mode, the general improvement in Positioning technology and the high popularity of mobile intelligent terminals, led to the growing market of LBS. This article from the perspective of LBS service privacy security, mainly studies the LBS location privacy protection scheme based on cipher text search, in LBS service location privacy and search information privacy issues, focus on to design the scheme, based on the cryptography in LBS service privacy protection issues in the process, this paper fully and secret cipher text search characteristics, design a new privacy protection of LBS service model, and expounds the system structure and working principle of model, defines the security properties of the privacy protection model and security model, Under the specific security assumptions, the new location privacy protection scheme based on lbspp-bse (LBS location privacy protection based on searchable encryption) is implemented.


2013 ◽  
Vol 411-414 ◽  
pp. 172-176
Author(s):  
Su Duo Li ◽  
Jing Lian Huang ◽  
Ying Xing Li ◽  
Jing Wei Deng ◽  
Kai Ying Deng

How to protect users privacy effectively while providing location based service (LBS) is a very important study of the mobile Internet. Where location k-anonymity algorithm is the most commonly used algorithm at present. However the algorithm also has some disadvantages. Therefore, this paper presents a model of LBS privacy protection based on collaboration. It divides a location-based query into two parts and sends to two entities separately. One is the location cloaking server (LCS) which calculates k-anonymous locations, and the other is location service provider (LSP) which implements the query. Except the user none of the servers could have the complete query information. By this way it protects the users privacy very well. The algorithm partly solved the problems existing in the traditional k-anonymity algorithm, and the algorithms performance was significantly increased.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Jia-Ning Luo ◽  
Ming-Hour Yang

To access location-based service (LBS) and query surrounding points of interest (POIs), smartphone users typically use built-in positioning functions of their phones when traveling at unfamiliar places. However, when a query is submitted, personal information may be leaked when they provide their real location. Current LBS privacy protection schemes fail to simultaneously consider real map conditions and continuous querying, and they cannot guarantee privacy protection when the obfuscation algorithm is known. To provide users with secure and effective LBSs, we developed an unchained regional privacy protection method that combines query logs and chained cellular obfuscation areas. It adopts a multiuser anonymizer architecture to prevent attackers from predicting user travel routes by using background information derived from maps (e.g., traffic speed limits). The proposed scheme is completely transparent to users when performing continuous location-based queries, and it combines the method with actual road maps to generate unchained obfuscation areas that conceal the actual locations of users. In addition to using a caching approach to enhance performance, the proposed scheme also considers popular tourist POIs to enhance the cache data hit ratio and query performance.


2021 ◽  
Author(s):  
Jiabang Liu ◽  
Xutong Jiang ◽  
Song Zhang ◽  
Bowen Liu ◽  
Wanchun Dou

Sign in / Sign up

Export Citation Format

Share Document