Peng Zhi-Yu, Li Shan-Ping. Protecting Location Privacy in Location-based Services in Mobile Environments[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146.2010.01050
Citation:
Peng Zhi-Yu, Li Shan-Ping. Protecting Location Privacy in Location-based Services in Mobile Environments[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146.2010.01050
Peng Zhi-Yu, Li Shan-Ping. Protecting Location Privacy in Location-based Services in Mobile Environments[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146.2010.01050
Citation:
Peng Zhi-Yu, Li Shan-Ping. Protecting Location Privacy in Location-based Services in Mobile Environments[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146.2010.01050
The k-anonymity model is employed to protect the location privacy in Location-Based Services (LBS) in recent years. A Moving-Pattern Attack (MPA) is presented, in a scenario that the moving user keeps delivering queries. It is shown that traditional algorithms fail in this attack. In order to protect against MPA, a novel anonymity measurement based on entropy is proposed, which leads to a cloaking algorithm under mobile environments, i.e. Mclique. Experiments show that Mclique protects effectively user privacy against MPA. By simplifying the computing of entropy in Mclique, a fast cloaking algorithm, Fclique, is proposed. Experiments show that Fclique is capable of surviving MPA, and reduces greatly the time complexity as well.
Sweeney L. K-anonymity: a model for protecting privacy[J].International Journal on Uncertainty, Fuzziness and Knowledge-based Systems.2002, 10(5):557-570[10]Xu J, Tang X, Hu H, and Du J. Privacy-conscious location- based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems.2010, 21(3):313-326[12]Brinkhoff T. A framework for generating network-based moving objects[J].Geoinformatica.2002, 6(2):153-180