scholarly journals Query-Dependency-Aware Location Privacy Protection for Road Networks

2018 ◽  
Vol 12 (2) ◽  
pp. 29-44
Author(s):  
Hui Chen ◽  
Xiaolin Qin
2018 ◽  
Vol 220 ◽  
pp. 10001
Author(s):  
Yu Lili ◽  
Zhang Lei ◽  
Su Xiaoguang ◽  
Li Jing ◽  
Zhang Xu ◽  
...  

Compared with the Euclidean space, road network is restricted by its direction in traveling, velocity and some other attribute profiles. So the algorithms that designed for the Euclidean space are usually invalid and difficult to provide privacy protection services. In order to cope with this problem, we have proposed an algorithm to provide the service of collecting anonymous users that their directions in traveling similar with the initiator in the road networks. In this algorithm, the shortest distance between multiple road segments is calculated, and then utilizes the distance to select the user who has the same direction in traveling with the initiator. Consequently, the problem of the discrepancy of the anonymous users in the routing that invalidates the location privacy protection is solved. At last, we had compared this algorithm with other similar algorithms, and through the results of the comparison and the cause of this phenomenon, we have concluded that this algorithm is better not only in the level of privacy protection, but in the performance of execution efficiency.


2017 ◽  
Vol 77 (5) ◽  
pp. 5563-5607 ◽  
Author(s):  
Qasim Ali Arain ◽  
Imran Memon ◽  
Zhongliang Deng ◽  
Muhammad Hammad Memon ◽  
Farman Ali Mangi ◽  
...  

Author(s):  
Meiyu Pang ◽  
Li Wang ◽  
Ningsheng Fang

Abstract This paper proposes a collaborative scheduling strategy for computing resources of the Internet of vehicles considering location privacy protection in the mobile edge computing environment. Firstly, a multi area multi-user multi MEC server system is designed, in which a MEC server is deployed in each area, and multiple vehicle user equipment in an area can offload computing tasks to MEC servers in different areas by a wireless channel. Then, considering the mobility of users in Internet of vehicles, a vehicle distance prediction based on Kalman filter is proposed to improve the accuracy of vehicle-to-vehicle distance. However, when the vehicle performs the task, it needs to submit the real location, which causes the problem of the location privacy disclosure of vehicle users. Finally, the total cost of communication delay, location privacy of vehicles and energy consumption of all users is formulated as the optimization goal, which take into account the system state, action strategy, reward and punishment function and other factors. Moreover, Double DQN algorithm is used to solve the optimal scheduling strategy for minimizing the total consumption cost of system. Simulation results show that proposed algorithm has the highest computing task completion rate and converges to about 80% after 8000 iterations, and its performance is more ideal compared with other algorithms in terms of system energy cost and task completion rate, which demonstrates the effectiveness of our proposed scheduling strategy.


2019 ◽  
Vol 28 (09) ◽  
pp. 1950147
Author(s):  
Lei Zhang ◽  
Jing Li ◽  
Songtao Yang ◽  
Yi Liu ◽  
Xu Zhang ◽  
...  

The query probability of a location which the user utilizes to request location-based service (LBS) can be used as background knowledge to infer the real location, and then the adversary may invade the privacy of this user. In order to cope with this type of attack, several algorithms had provided query probability anonymity for location privacy protection. However, these algorithms are all efficient just for snapshot query, and simply applying them in the continuous query may bring hazards. Especially that, continuous anonymous locations which provide query probability anonymity in continuous anonymity are incapable of being linked into anonymous trajectories, and then the adversary can identify the real trajectory as well as the real location of each query. In this paper, the query probability anonymity and anonymous locations linkable are considered simultaneously, then based on the Markov prediction, we provide an anonymous location prediction scheme. This scheme can cope with the shortage of the existing algorithms of query probability anonymity in continuous anonymity locations difficult to be linked, and provide query probability anonymity service for the whole process of continuous query, so this scheme can be used to resist the attack of both of statistical attack as well as the infer attack of the linkable. At last, in order to demonstrate the capability of privacy protection in continuous query and the efficiency of algorithm execution, this paper utilizes the security analysis and experimental evaluation to further confirm the performance, and then the process of mathematical proof as well as experimental results are shown.


Sign in / Sign up

Export Citation Format

Share Document