AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (782.3 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem

Department of Electronic Technology, the Key Laboratory of Network & Information Security of Armed Police Force, Engineering University of Armed Police Force, Xi’an 710086, China.
Show Author Information

Abstract

Traditional k-anonymity schemes cannot protect a user’s privacy perfectly in big data and mobile network environments. In fact, existing k-anonymity schemes only protect location in datasets with small granularity. But in larger granularity datasets, a user’s geographical region-location is always exposed in realizations of k-anonymity because of interaction with neighboring nodes. And if a user could not find enough adjacent access points, most existing schemes would be invalid. How to protect location information has become an important issue. But it has not attracted much attention. To solve this problem, two location-privacy protection models are proposed. Then a new generalized k-anonymity Location Privacy Protection Scheme based on the Chinese Remainder Theorem (LPSS-CRT) in Location-Based Services (LBSs) is proposed. We prove that it can guarantee that users can access LBSs without leaking their region-location information, which means the scheme can achieve perfect anonymity. Analysis shows that LPPS-CRT is more secure in protecting location privacy, including region information, and is more efficient, than similar schemes. It is suitable for dynamic environments for different users’ privacy protection requests.

References

[1]
Zhang X., Gui X., Tian F., Yu S., and An J., Privacy quantification model based on the Bayes conditional risk in location-based services, Tsinghua Science and Technology, vol. 19, no. 5, pp. 452-462, 2014.
[2]
Jabeur N., Zeadally S., and Sayed B., Mobile social networking applications, Communications of the ACM, vol. 56, no. 3, pp. 71-79, 2013.
[3]
Suzuki A., Iwata M., Arase Y., Hara T., Xie X., and Nishio S., A user location anonymization method for location based services in a real environment, in Proc. of the 18th ACM SIGSPATIAL Int’1 Symp. on Advances in Geographic Information Systems, 2010, pp. 398–401.
[4]
Gredik B. and Liu L., Protecting location privacy with personalized k-anonymity: Architecture and algorithms, IEEE Trans. on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008.
[5]
Pan X., Xu J., and Meng X., Protecting location privacy against location-dependent attacks in mobile services, IEEE Trans. on Knowledge and Data Engineering, vol. 24, no. 8, pp. 1506-1519, 2012.
[6]
Wang Y., Zhang H., and Yu X.. KAP: Location privacy-preserving approach in location services, (in Chinese), Chinese Journal on Communication, vol. 35, no. 11, pp. 182-190, 2014.
[7]
Wernke M., Skvortsov P., and Durr F., A classification of location privacy attacks and approaches, Personal and Ubiquitous Computing, vol. 18, no. 1, pp. 163-175, 2012.
[8]
Gruteser M. and Grunwald D., Anonymous usage of location-based services through spatial and temporal cloaking, in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MOBISYS 2003), San Franciso, CA, USA, 2003, pp. 31-42.
[9]
Huang Y., Huo Z., and Meng X., CoPrivacy: A collaborative location privacy preserving method without cloaking region, (in Chinese), Chinese Journal of Computers, vol. 34, no. 10, pp. 1977-1985, 2011.
[10]
Damiani M. L. and Cuijpers C., Privacy challenges in third-party location services, in IEEE 14th International Conference on Mobile Data Management (MDM 2013), Milan, Italy, 2013, pp. 213-225.
[11]
Yang S., Ma C., and Zhou C., LBS-oriented location privacy protection model and scheme, (in Chinese), Chinese Journal of Communication, vol. 35, no. 8, pp. 116-127, 2014.
[12]
Peng Z. T., Kaji K., and Kawaguchi N., Privacy protection in Wi-Fi based location estimation, in the 7th International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2014), Singapore, 2014, pp. 62-67.
[13]
Lin X., Li S. P., and Yang Z. H., Attacking algorithms against continuous queries in LBs and anonymity measurement, (in Chinese), Chinese Journal of Software, vol. 20, no. 4, pp. 1058-1068, 2009
[14]
Wang L. and Meng X., Location privacy preservation in big data era: A survey, (in Chinese), Chinese Journal of Software, vol. 5, no. 4, pp. 693-712, 2014.
[15]
Andrés M. E. and Bordenabe N. E., Geo-indistinguishabilty: Differential privacy for location-based system, in Proceeding of the 2013 ACM SIGSAC Conference on Computer Communications Security, 2013, pp. 901-914.
Tsinghua Science and Technology
Pages 260-269
Cite this article:
Wang J, Han Y, Yang X. An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem. Tsinghua Science and Technology, 2016, 21(3): 260-269. https://doi.org/10.1109/TST.2016.7488737

644

Views

20

Downloads

5

Crossref

N/A

Web of Science

6

Scopus

1

CSCD

Altmetrics

Received: 09 February 2016
Accepted: 26 April 2016
Published: 13 June 2016
© The author(s) 2016
Return