PDF (3.9 MB)
Collect
Submit Manuscript
Open Access

A Differential Privacy Protection Protocol Based on Location Entropy

State Key Laboratory of Public Big Data, School of Computer Science and Technology, Guizhou University, Guiyang 550025, China
Information Technology Innovation Service Center of Guizhou Province, Guiyang 550025, China
School of Cyberspace Security, Beijing University of Posts and Telecommnuications, Beijing 100000, China
Guizhou CoVision Science & Technology Co., Ltd., Guiyang 550025, China
School of Information Science and Engineering, Shandong Normal University, Jinan 250000, China
Show Author Information

Abstract

A Location-Based Service (LBS) refers to geolocation-based services that bring both convenience and vulnerability. With an increase in the scale and value of data, most existing location privacy protection protocols cannot balance privacy and utility. To solve the revealing problems in LBS, we propose a differential privacy protection protocol based on location entropy. First, we design an algorithm of the best-assisted user selection for constructing anonymity sets. Second, we employ smart contracts to evaluate the credibility of participants, which ensures the honesty of participants. Moreover, we provide a comprehensive experiment; the theoretical analysis and experiments show that the proposed protocol effectively resists background knowledge attacks. Generally, our protocol improves data availability. Particularly, it realizes user-controllable privacy protection, which improves privacy protection and strengthens security.

References

[1]
X. Pan, Z. Huo, and X. F. Meng, Location Big Data Privacy Management, (in Chinese). Beijing, China: Machine Press, 2017.
[2]
J. Li, X. Pei, X. J. Wang, D. Y. Yao, Y. Zhang, and Y. Yue, Transportation mode identification with GPS trajectory data and GIS information, Tsinghua Science and Technology, vol. 26, no. 4, pp. 403416, 2021.
[3]
M. Azrour, J. Mabrouki, A. Guezzaz, and Y. Farhaoui, New enhanced authentication protocol for internet of things, Big Data Mining and Analytics, vol. 4, no. 1, pp. 19, 2021.
[4]
L. Y. Qi, C. H. Hu, X. Y. Zhang, M. R. Khosravi, S. Sharma, S. N. Pang, and T. Wang, Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment, IEEE Trans. Industr. Inform., vol. 17, no. 6, pp. 41594167, 2021.
[5]
Y. L. Chen, J. Sun, Y. X. Yang, T. Li, X. X. Niu, and H. Y. Zhou, PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs, Int. J. Intell. Syst., vol. 37, no. 2, pp. 12041221, 2022.
[6]
J. Mabrouki, M. Azrour, D. Dhiba, Y. Farhaoui, and S. El Hajjaji, IoT-based data logger for weather monitoring using arduino-based wireless sensor networks with remote graphical application and alerts, Big Data Mining and Analytics, vol. 4, no. 1, pp. 2532, 2021.
[7]
Y. Khazbak, J. Y. Fan, S. C. Zhu, and G. H. Cao, Preserving personalized location privacy in ride-hailing service, Tsinghua Science and Technology, vol. 25, no. 6, pp. 743757, 2020.
[8]
Y. W. Liu, A. X. Pei, F. Wang, Y. H. Yang, X. Y. Zhang, H. Wang, H. N. Dai, L. Y. Qi, and R. Ma, An attention-based category-aware GRU model for the next poi recommendation, Int. J. Intell. Syst., vol. 36, no. 7, pp. 31743189, 2021.
[9]
P. Nitu, J. Coelho, and P. Madiraju, Improvising personalized travel recommendation system with recency effects, Big Data Mining and Analytics, vol. 4, no. 3, pp. 139154, 2021.
[10]
R. Kumari, S. Kumar, R. C. Poonia, V. Singh, L. Raja, V. Bhatnagar, and P. Agarwal, Analysis and predictions of spread, recovery, and death caused by covid-19 in India, Big Data Mining and Analytics, vol. 4, no. 2, pp. 6575, 2021.
[11]
H. S. Chen, Y. P. Zhang, Y. R. Cao, and J. Xie, Security issues and defensive approaches in deep learning frameworks, Tsinghua Science and Technology, vol. 26, no. 6, pp. 894905, 2021.
[12]
S. Y. Xu, X. Chen, and Y. H. He, EVchain: An anonymous blockchain-based system for charging-connected electric vehicles, Tsinghua Science and Technology, vol. 26, no. 6, pp. 845856, 2021.
[13]
C. Dwork, Differential privacy, in Proc. 33rd Int. Colloquium on Automata, Languages and Programming, Venice, Italy, 2006, pp. 112.
[14]
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, Our data, ourselves: Privacy via distributed noise generation, in Proc. 24th Annu. Int. Conf. on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 2006, pp. 486503.
[15]
C. Dwork and G. N. Rothblum, Concentrated differential privacy, arXiv preprint arXiv: 1603.01887, 2016.
[16]
P. Austrin, Towards sharp inapproximability for any 2-CSP, in Proc. 48th Annu. IEEE Symp. on Foundations of Computer Science (FOCS’07), Providence, RI, USA, 2007, pp. 307317.
[17]
Q. Geng and P. Viswanath, The optimal noise-adding mechanism in differential privacy, IEEE Trans. Inf. Theory, vol. 62, no. 2, pp. 925951, 2016.
[18]
C. Li, G. Miklau, M. Hay, A. McGregor, and V. Rastogi, The matrix mechanism: Optimizing linear counting queries under differential privacy, VLDB J., vol. 24, no. 6, pp. 757781, 2015.
[19]
Y. L. Chen, S. Dong, T. Li, Y. L. Wang, and H. Y. Zhou, Dynamic multi-key FHE in asymmetric key setting from LWE, IEEE Trans. Inf. Foren. Sec., vol. 16, pp. 52395249, 2021.
[20]
R. Shokri, G. Theodorakopoulos, C. Troncoso, J. P. Hubaux, and J. Y. Le Boudec, Protecting location privacy: Optimal strategy against localization attacks, in Proc. 2012 ACM Conf. on Computer and Communications Security, Raleigh, NC, USA, 2012, pp. 617627.
[21]
K. Chatzikokolakis, C. Palamidessi, and M. Stronati, Geo-indistinguishability: A principled approach to location privacy, in Proc. 11th Int. Conf. on Distributed Computing and Internet Technology, Bhubaneswar, India, 2015, pp. 4972.
[22]
R. Shokri, Privacy games: Optimal user-centric data obfuscation, Proc. Priv. Enhanc. Technol., vol. 2015, no. 2, pp. 299315, 2015.
[23]
L. N. Ni, C. Li, X. Wang, H. L. Jiang, and J. G. Yu, DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data, IEEE Access, vol. 6, pp. 2105321063, 2018.
[24]
B. Niu, Q. H. Li, X. Y. Zhu, G. H. Cao, and H. Li, Achieving k-anonymity in privacy-aware location-based services, in Proc. IEEE Conf. on Computer Communications, Toronto, Canada, 2014, pp. 754762.
[25]
B. Niu, Q. H. Li, X. Y. Zhu, G. H. Cao, and H. Li, Enhancing privacy through caching in location-based services, in Proc. 2015 IEEE Conf. on Computer Communications (INFOCOM), Hong Kong, China, 2015, pp. 10171025.
[26]
H. To, K. Nguyen, and C. Shahabi, Differentially private publication of location entropy, in Proc. 24th ACM SIGSPATIAL Int. Conf. on Advances in Geographic Information Systems, Burlingame, CA, USA, 2016, p. 35.
[27]
Y. L. Wang, G. Y. Yang, T. Li, F. Y. Li, Y. L. Tian, and X. M. Yu, Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices, J. Netw. Comput. Appl., vol. 161, p. 102641, 2020.
[28]
G. J. Han, H. Wang, M. Guizani, S. Chan, and W. B. Zhang, KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT, IEEE Wirel. Commun., vol. 25, no. 6, pp. 8490, 2018.
[29]
L. N. Ni, F. L. Tian, Q. H. Ni, Y. Yan, and J. Q. Zhang, An anonymous entropy-based location privacy protection scheme in mobile social networks, EURASIP J. Wirel. Commun. Netw., vol. 2019, p. 93, 2019.
[30]
H. Liu, X. H. Li, B. Luo, Y. W. Wang, Y. B. Ren, J. F. Ma, and H. F. Ding, Distributed k-anonymity location privacy protection scheme based on blockchain, (in Chinese), Chin. J. Comput., vol. 42, no. 5, pp. 942960, 2019.
[31]
T. Li, Z. J. Wang, G. Y. Yang, Y. Cui, Y. L. Chen, and X. M. Yu, Semi-selfish mining based on hidden Markov decision process, Int. J. Intell. Syst., vol. 36, no. 7, pp. 35963612, 2021.
[32]
T. Li, Z. J. Wang, Y. L. Chen, C. M. Li, Y. L. Jia, and Y. X. Yang, Is semi-selfish mining available without being detected? Int. J. Intell. Syst., .
[33]
Y. L. Wang, G. Y. Yang, A. Bracciali, H. F. Leung, H. B. Tian, L. S. Ke, and X. M. Yu, Incentive compatible and anti-compounding of wealth in proof-of-stake, Inf. Sci., vol. 530, pp. 8594, 2020.
[34]
T. Li, Y. L. Chen, Y. L. Wang, Y. L. Wang, M. H. Zhao, H. J. Zhu, Y. L. Tian, X. M. Yu, and Y. X. Yang, Rational protocols and attacks in blockchain system, Sec. Commun. Netw., vol. 2020, p. 8839047, 2020.
[35]
X. J. Zhu, E. Ayday, and R. Vitenberg, A privacy-preserving framework for outsourcing location-based services to the cloud, IEEE Trans. Dependable Secure Comput., vol. 18, no. 1, pp. 384399, 2021.
[36]
Z. Huo and X. F. Meng, A trajectory data publication method under differential privacy, (in Chinese), Chin. J. Comput., vol. 41, no. 2, pp. 400412, 2018.
[37]
X. D. Bi, Y. Liang, H. Z. Shi, and H. Tian, A parameterized location privacy protection method based on two-level anonymity, (in Chinese), J. Shandong Univ. (Nat. Sci.), vol. 52, no. 5, pp. 7584, 2017.
[38]
C. E. Shannon, A mathematical theory of communication, ACM Sigmobile Mobile Comput. Commun. Rev., vol. 5, no. 1, pp. 355, 2001.
[39]
Y. F. Wang, Y. L. Luo, Q. Y. Yu, Q. Q. Liu, and W. Chen, Trajectory privacy-preserving method based on information entropy suppression, (in Chinese), J. Comput. Appl., vol. 38, no. 11, pp. 32523257, 2018.
[40]
L. W. Ouyang, S. Wang, Y. Yuan, X. C. Ni, and F. Y. Wang, Smart contracts: Architecture and research progresses, (in Chinese), Acta Automat. Sin., vol. 45, no. 3, pp. 445457, 2019.
[41]
F. Y. Li, D. F. Wang, Y. L. Wang, X. M. Yu, N. Wu, J. G. Yu, and H. Y. Zhou, Wireless communications and mobile computing blockchain-based trust management in distributed internet of things, Wirel. Commun. Mobile Comput., vol. 2020, p. 8864533, 2020.
[42]
F. Y. Li, R. Ge, H. Y. Zhou, Y. L. Wang, Z. X. Liu, and X. M. Yu, Tesia: A trusted efficient service evaluation model in internet of things based on improved aggregation signature, Concurr. Comput.: Pract. Exp., .
[43]
B. K. Samanthula, D. Karthikeyan, B. X. Dong, and K. A. Kumari, ESPADE: An efficient and semantically secure shortest path discovery for outsourced location-based services, Cryptography, vol. 4, no. 4, p. 29, 2020.
Tsinghua Science and Technology
Pages 452-463
Cite this article:
Guo P, Ye B, Chen Y, et al. A Differential Privacy Protection Protocol Based on Location Entropy. Tsinghua Science and Technology, 2023, 28(3): 452-463. https://doi.org/10.26599/TST.2022.9010003
Metrics & Citations  
Article History
Copyright
Rights and Permissions
Return