Abstract
When the user getting location based services by the traditional technology, his location information of region is always be exposed. However, in modern mobile networks, even the current geographical region is a part of privacy information. To solve this problem, a new generalized k-anonymity location privacy protection scheme in location based services (LPPS-GKA) with the third trust servicer is proposed. And it can guarantee the users get good location-based services (LBS) without leaking the information of the geo-location region, which has protected the perfect privacy. Analysis shows that LPPS-GKA is more secure in protecting location privacy, including region information, and is more efficient than other similar schemes in computational and communicational aspects. It is suitable for dynamic environment for different user’s various privacy protection requests.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jabeur, N., Zeadally, S., Sayed, B.: Mobile social networking applications. Commun. ACM 56(3), 71–79 (2013). doi:10.1145/2428556.2428573
Suzuki, A., Iwata, M., Arase, Y., Hara, T., Xie, X., Nishio, S.: A user location anonymization method for location based services in a real environment. In: Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, San Jose, pp. 398–401 (2010). doi:10.1145/1869790.1869846
Gredik, B., Liu, L.: Protecing location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008). doi:10.1109/TMC.2007.1062
Pan, X., Xu, J., Meng, X.: Protecing location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506–1519 (2012). doi:10.1109/TKDE.2011.105
Wang, Y., Zhang, H., Yu, X.: KAP: location privacy-preserving approach in location services. J. Commun. 35(11), 182–190 (2014). (in Chinese)
Wernke, M., Skvortsov, P., Durr, F., et al.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2012)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MOBISYS 2003), San Francisco, California, pp. 31–42 (2003)
Huang, Y., Huo, Z., Meng, X.F.: Coprivacy: a collaborative location privacy preserving method without cloaking region. Chin. J. Comput. 34(10), 1977–1985 (2011). (in Chinese)
Damiani, M.L., Cuijpers, C.: Privacy challenges in third-party location services. In: IEEE 14th International Conference on Mobile Data Management (MDM 2013), Milan, Italy, pp. 213–225 (2013)
Peng, Z.T., Kaji, K., Kawaguchi, N.: Privacy protection in Wi-Fi based location estimation. In: The 7th International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2014), Singapore, pp. 62–67 (2014)
Yang, S.-T., Ma, C.-G., Zhou, C.-L.: LBS-oriented location privacy protection model and scheme. Chin. J. Commun. 35(8), 116–127 (2014)
Wang, L., Meng, X.F.: Location privacy preservation in big data era: a survey. J. Softw. 25(4), 693–712 (2014). doi:10.13328/j.cnki.jos.004551. (in Chinese)
Acknowledgment
This work was supported in part by the National Natural Science Foundation of China (Nos. 61272492 and 61572521), Shaanxi Province Natural Science Foundation of China (No. 2015JM6353) and the Basic Foundation of Engineering University of CAPF (No. WJY201521).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Wang, JJ., Han, YL., Chen, JY. (2016). A Generalized Location Privacy Protection Scheme in Location Based Services. In: Chen, W., et al. Big Data Technology and Applications. BDTA 2015. Communications in Computer and Information Science, vol 590. Springer, Singapore. https://doi.org/10.1007/978-981-10-0457-5_20
Download citation
DOI: https://doi.org/10.1007/978-981-10-0457-5_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0456-8
Online ISBN: 978-981-10-0457-5
eBook Packages: Computer ScienceComputer Science (R0)