Journal on Communications ›› 2016, Vol. 37 ›› Issue (12): 124-141.doi: 10.11959/j.issn.1000-436x.2016279
• Overview • Previous Articles Next Articles
Sheng WAN1,Feng-hua LI1,2,Ben NIU2(),Zhe SUN2,Hui LI1
Online:
2016-12-25
Published:
2017-05-15
Supported by:
Sheng WAN,Feng-hua LI,Ben NIU,Zhe SUN,Hui LI. Research progress on location privacy-preserving techniques[J]. Journal on Communications, 2016, 37(12): 124-141.
[1] | 王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4):693-712. WANG L , MENG X F . Location privacy preservation in big data era: a survey[J]. Journal of Software, 2014,25(4):693-712. |
[2] | HOH B , GRUTESER M . Protecting location privacy through path confusion[C]// 1st IEEE International Conference on Security and Pri-vacy for Emerging Areas in Communications Networks (Secure-Comm'05). Athens, Greece, 2005:194-205. |
[3] | KRUMM J . Inference attacks on location tracks[C]// 5th Springer International Conference on Pervasive Computing(PERVASIVE'07). Toronto, Canada, 2007:127-143. |
[4] | FAWAZ K , SHIN K G . Location privacy protection for smartphone users[C]// 21st ACM Conference on Computer and Communications Security(CCS'14). Scottsdale, United States, 2014:239-250. |
[5] | SHIN K G , JU X , CHEN Z , et al. Privacy protection for users of loca-tion-based services[J]. IEEE Wireless Communications, 2012,19(1):30-39. |
[6] | ZHANG Y , TAN C C , XU F , et al. VProof: lightweight pri-vacy-preserving vehicle location proofs[J]. IEEE Transactions on Ve-hicular Technology, 2015,64(1):378-385. |
[7] | WANG X , PANDE A , ZHU J , et al. STAMP: enabling pri-vacy-preserving location proofs for mobile users[J]. IEEE Transac-tions on Networking, 2016,PP(99):1-14. |
[8] | DICKINSON A , LOCHRIE M , EGGLESTONE P . UKKO: enriching persuasive location based games with environmental sensor data[C]// 2th ACM Annual Symposium on Computer-Human Interaction in Play(CHI Play'15). London, United Kingdom, 2015:493-498. |
[9] | 周傲英, 杨彬, 金澈清 , 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011,34(7):1155-1171. ZHOU A Y , YANG B , JIN C Q , et al. Location-based services: archi-tecture and progress[J]. Journal of Software, 2011,34(7):1155-1171. |
[10] | WERNKE M , SKVORTSOV P , DüRR F , et al. A classification of location privacy attacks and approaches[J]. Personal and Ubiquitous Computing, 2014,18(1):163-175. |
[11] | MACHANAVAJJHALA A , KIFER D , GEHRKE J , et al. L-diversity:privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007,1(1):3. |
[12] | CHOW C Y , MOKBEL M F , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011,15(2):351-380. |
[13] | MOKBEL M F . Privacy in location-based services: state-of the-art and research directions[C]// 8th IEEE International Conference on Mobile Data Management (MDM'07). Mannheim, Germany, 2007:228-228. |
[14] | THEODORAKOPOULOS G . The same-origin attack against location privacy[C]// 14th ACM Workshop on Privacy in the Electronic Soci-ety(WPES'15). Denver, United States, 2015:49-53. |
[15] | SHOKRI R , THEODORAKOPOULOS G , BOUDEC J Y LE , et al. Quantifying location privacy[C]// 32nd IEEE Symposium on Security and Privacy(S&P'11). Berkeley, United States, 2011:247-262. |
[16] | LEE B , OH J , YU H , et al. Protecting location privacy using location semantics[C]// 17th ACM international conference on Knowledge dis-covery and data mining(SIGKDD'11). San Diego, United States, 2011:1289-1297. |
[17] | PAN X , XU J , MENG X . Protecting location privacy against loca-tion-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012,24(8):1506-1519. |
[18] | 刘海, 李兴华, 王二蒙 , 等. 连续服务请求下基于假位置的用户隐私增强方法[J]. 通信学报, 2016,37(7):140-150. LIU H , LI X H , WANG E M , et al. Privacy enhancing method for dummy based privacy protection with continuous location-based ser-vice queries[J]. Journal on Communications, 2016,37(7):140-150. |
[19] | 潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1):121-129. PAN X , HAO X , MENG X F . Primacy prospering towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1):121-129. |
[20] | GRUTESER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking[C]// 1st ACM International Conference on Mobile Systems, Applications, and Services(MobiSys'03). San Francisco, United States, 2003:31-42. |
[21] | SWEENEY L . k-anonymity: a model for protecting privacy[J]. Inter-national Journal on Uncertainty, Fuzziness and Knowledge-based Sys-tems, 2002,10(5):557-570. |
[22] | CHOW C Y , MOKBEL M F , AREF W G . Casper*: query processing for location services without compromising privacy[J]. ACM Transac-tions on Database Systems, 2009,34(4):1-48. |
[23] | XU T , CAI Y . Feeling-based location privacy protection for loca-tion-based services[C]// 16th ACM Conference on Computer and Communications Security(CCS'09). Chicago, United States, 2009:348-357. |
[24] | GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1):1-18. |
[25] | GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1):1-18. |
[26] | 倪巍伟, 马中希, 陈萧 . 面向路网隐私保护连续近邻查询的安全区域构建[J]. 计算机学报, 2016,39(3):628-642. NI W W , MA Z X , CHEN X . Safe region scheme for pri-vacy-preserving continuous recent neighbor query on road networks[J]. Journal of Computers, 2016,39(3):628-642. |
[27] | NIU B , LI Q H , ZHU X Y , et al. A fine-grained spatial cloaking scheme for privacy-aware users in location-based ser-vices[C]// 23rd IEEE International Conference on Computer Communication and Networks (ICCCN'14). Shanghai, China, 2014:1-8. |
[28] | KIDO H , YANGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[C]// 2nd IEEE International Conference on Pervasive Services(ICPS'05). Santorini, Greece, 2005:88-97. |
[29] | LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy-based location privacy in mobile services[C]// 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access( MobiDE'08). Vancouver, Canada, 2008:16-23. |
[30] | NIU B , ZHU X Y , LI Q H , et al. A novel attack to spatial cloaking schemes in location-based services[J]. Future Generation Computer Systems, 2015,49(1):125-132. |
[31] | CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based services[C]// 14th ACM In-ternational Symposium on Advances in Geographic information Sys-tems(ACM-GIS'06). Arlington, USA, 2006:171-178. |
[32] | CICEK A E , NERGIZ M E , SAYGIN Y . Ensuring location diversity in privacy-preserving spatio-temporal data publishing[J]. The VLDB Journal, 2014,23(4):609-625. |
[33] | ZHANG X , XIA Y , BAE H Y . A novel location privacy preservation method for moving object[J]. International Journal of Security and Its Applications, 2015,9(2):1-12. |
[34] | ZHANG C , HUANG Y . Cloaking locations for anonymous location based services: a hybrid approach[J]. GeoInformatica, 2009,13(2):159-182. |
[35] | BERESFORD A , STAJANO F . Location privacy in pervasive com-puting[J]. IEEE Pervasive Computing, 2003,2(1):46-55. |
[36] | NIU B , LI Q H , ZHU X Y , et al. Achieving k-anonymity in pri-vacy-aware location-based services[C]// 33th IEEE International Con-ference on Computer Communications(INFOCOM'14). Toronto, Canada, 2014:754-762. |
[37] | NIU B , LI Q H , ZHU X Y , et al. Enhancing privacy through caching in location-based services[C]// 34th IEEE International Conference on Computer Communications(INFOCOM'15). Hong Kong, China, 2015:1017-1025. |
[38] | NIU B , ZHU X Y , LI W H , et al. EPcloak: an efficient and pri-vacy-preserving spatial cloaking scheme for LBSs[C]// 11th IEEE In-ternational Conference on Mobile Ad Hoc and Sensor Sys-tems(MASS'14). Philadelphia, United States, 2014:398-406. |
[39] | PALANISAMY B , LIU L . Attack-resilient mix-zones over road net-works: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3):495-508. |
[40] | 彭长根, 丁红发, 朱义杰 , 等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8):1891-1903. PENG C G , DING H F , ZHU Y J , et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of Software, 2016,27(8):1891-1903. |
[41] | SHOKRI R , FREUDIGER J , JADLIWALA M , et al. A distor-tion-based metric for location privacy[C]// 8th ACM Workshop on Pri-vacy in the Electronic Society(WPES'09). Chicago, United States, 2009:21-30. |
[42] | DWORK C , LEI J . Differential privacy and robust statistics[C]// 41st Annual ACM Symposium on Theory of Computing(STOC'09). Be-thesda, United States, 2009:371-380. |
[43] | ANDRES M E , BORDENABE N E , CHATZIKOKOLAKIS K , et al. Geo-indistinguishability: differential privacy for location-based sys-tems[C]// 20th ACM Conference on Computer and Communications Security(CCS'13). Berlin, Germany, 2013:901-914. |
[44] | XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations[C]// 22nd ACM Conference on Computer and Communications Security(CCS'15). Denver, United States, 2015:1298-1309. |
[45] | IETF. Geographic location/privacy (geopriv)[EB/OL]. . |
[46] | World Wide Web Consortium(W3C). Platform for privacy prefer-ences(P3P) project[EB/OL]. . |
[47] | PAULET R , KAOSAR M G , YI X , et al. Privacy-preserving and con-tent-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5):1200-1210. |
[48] | GHINITA G , KALNIS P , KHOSHGOZARAN A , et al. Private queries in location based services: anonymizers are not necessary[C]// 27th ACM Conference on Management of Data(SIGMOD'08). Vancouver, Canada, 2008:121-132. |
[49] | YI X , PAULET R , BERTINO E , et al. Practical approximate k nearest neighbor queries with location and query privacy[J]. IEEE Transac-tions on Knowledge and Data Engineering, 2016,PP(99):1-14. |
[50] | KALNIS P , GHINITA G , MOURATIDIS K , et al. Preventing loca-tion-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007,19(12):1719-1733. |
[51] | NGO H , KIM J . Location privacy via differential private perturbation of cloaking area[C]// 28th IEEE Computer Security Foundations Sym-posium(CSF'15). Verona, Italy, 2015:63-74. |
[52] | YIU M L , JENSEN C S , M?LLER J , et al. Design and analysis of a ranking approach to private location-based services[J]. ACM Transac-tions on Database Systems, 2011,36(2):1-42. |
[53] | PERAZZO P , DINI G . A uniformity-based approach to location pri-vacy[J]. Computer Communications, 2015,64(1):21-32. |
[54] | ARDAGNA C A , CREMONINI M , DE CAPITANI DI VIMERCATI S , et al. An obfuscation-based approach for protecting location pri-vacy[J]. IEEE Transactions on Dependable and Secure Computing, 2011,8(1):13-27. |
[55] | DüRR F , SKVORTSOV P , ROTHERMEL K . Position sharing for location privacy in non-trusted systems[C]// 9th IEEE International Conference on Pervasive Computing and Communica-tions(PerCom'11). Seattle, United States, 2011:189-196. |
[56] | PINGLEY A , YU W , ZHANG N , et al. Cap: a context-aware privacy protection system for location-based services[C]// 29th IEEE Interna-tional Conference on Distributed Computing Systems(ICDCS'09). Montreal, Canada, 2009:49-57. |
[57] | 周长利, 马春光, 杨松涛 . 基于敏感位置多样性的LBS位置隐私保护方法研究[J]. 通信学报, 2015,36(4):14-25. ZHOU C L , MA C G , YANG S T . Research of LBS privacy preserving based on sensitive location diversity[J]. Journal on Communications, 2015,36(4):14-25. |
[58] | SHOKRI R , THEODORAKOPOULOS G , TRONCOSO C , et al. Protecting location privacy: optimal strategy against localization at-tacks[C]// 19th ACM Conference on Computer and Communications Security(CCS'12). Raleigh, United States, 2012:617-627. |
[59] | BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location privacy[C]// 21st ACM Conference on Computer and Communications Secu-rity(CCS'14). Scottsdale, United States, 2014:251-262. |
[60] | 倪巍伟, 陈萧, 马中希 . 支持偏好调控的路网隐私保护k近邻查询方法[J]. 计算机学报, 2015,38(4):884-896. NI W W , CHENG X , MA Z X . Location privacy preserving k-nearest neighbor query method on road network in presence of user's prefer-ence[J]. Chinese Journal of Computers, 2015,38(4):884-896. |
[61] | PINGLEY A , ZHANG N , FU X , et al. Protection of query privacy for continuous location based services[C]// 30th IEEE International Con-ference on Computer Communications (INFOCOM'11). Shanghai, China, 2011:1710-1718. |
[62] | MA C Y T , YAU D K Y , YIP N K , et al. Privacy vulnerability of pub-lished anonymous mobility traces[J]. IEEE Transactions on Network-ing, 2013,21(3):720-733. |
[63] | LIU X , LIU K , GUO L , et al. A game-theoretic approach for achieving k-anonymity in location based services[C]// 32nd IEEE International Conference on Computer Communications(INFOCOM'13). Turin, It-aly, 2013:2985-2993. |
[64] | MANWEILER J , SCUDELLARI R , COX L P . Smile: encounter-based trust for mobile social services[C]// 16th ACM Conference on Com-puter and Communications Security(CCS'09). Chicago, United States, 2009:246-255. |
[65] | SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P , et al. Hiding in the mobile crowd: location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(3):266-279. |
[66] | 黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10):1976-1985. HUANG Y , HUO Z , MENG X F . CoPrivacy: a collaborative cocation privacy-preserving method without clocking region[J]. Chinese Jour-nal of Computers, 2011,34(10):1976-1985. |
[67] | 李凤华, 李晖, 贾焰 , 等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4):1-11. LI F H , LI H , JIA Y , et al. Privacy computing: concept, connotation and its research trend[J]. Journal on Communications, 2016,37(4):1-11. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[6] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[7] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[8] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[9] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[10] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[11] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[12] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[13] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
[14] | Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU. Android application privacy protection mechanism based on virtual machine bytecode injection [J]. Journal on Communications, 2021, 42(6): 171-181. |
[15] | Youhuizi LI, Yuyu YIN, Honghao GAO, Yi JIN, Xinheng WANG. Survey on privacy protection in non-aggregated data sharing [J]. Journal on Communications, 2021, 42(6): 195-212. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|