Journal on Communications ›› 2015, Vol. 36 ›› Issue (12): 114-123.doi: 10.11959/j.issn.1000-436x.2015320
• privacy protection • Previous Articles Next Articles
Feng-hua LI1,Cui ZHANG1,Ben NIU1,Hui LI2,Jia-feng HUA2,Guo-zhen SHI3
Online:
2015-12-25
Published:
2017-07-17
Supported by:
Feng-hua LI,Cui ZHANG,Ben NIU,Hui LI,Jia-feng HUA,Guo-zhen SHI. Efficient scheme for user's trajectory privacy[J]. Journal on Communications, 2015, 36(12): 114-123.
[1] | ZHANG H , XU L , HUANG H ,et al. Mining spatial association rules from LBS anonymity data set for improving utilization[A]. Proceedings of the 21th IEEE International Conference on Geoinformatics[C]. Kaifeng,China, 2013. 1-6. |
[2] | WERNKE M , SKVORTSOV P , DURR F ,et al. A classification of location privacy attacks and approaches[J]. Personal & Ubiquitous Computing, 2014,18(1): 163-175. |
[3] | HIDETOSHI K , YANAGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[A]. Proceedings of International Conference on Pervasive Services[C]. Santorini,Greece, 2005. 88-97. |
[4] | JIA J , ZHANG F . Nonexposure accurate location k-anonymity algorithm in LBS[J]. The Scientific World Journal, 2014,2014(1): 619357-619357. |
[5] | PAN X , MENG X F , XU J L . Distortion-based anonymity for continuous queries in location-based mobile services[A]. Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems[C]. New York,USA, 2009. 256-265. |
[6] | GAO S , MA J F , SHI W ,et al. TRPF:a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 874-887. |
[7] | XU T , CAI Y . Exploring historical location data for anonymity preservation in location-based services[A]. Proceedings of the 27th IEEE International Conference on Computer Communications 2008[C]. Phoenix,USA, 2008. 1220-1228. |
[8] | HWANG R H , HSUEH Y L . A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014,7(22): 126-139. |
[9] | PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3): 495-508. |
[10] | YANG N , CAO Y , LIU Q ,et al. A novel personalized TTP-free location privacy preserving method[J]. International Journal of Security &Its Applications, 2014,8(2): 387. |
[11] | CHOW C Y , MOKBEL M F , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. Geoinformatica, 2011,15(2): 351-380. |
[12] | NIU B , ZHU X Y , LI W H ,et al. A personalized two-tier cloaking scheme for privacy-aware location-based services[A]. Proceedings of International Conference on Computing,Networking and Communications[C]. Garden Grove,USA, 2015. 94-98. |
[13] | YOU T H , PENG W C , LEE W C . Protecting moving trajectories with dummies[A]. Proceedings of IEEE 14th International Conference on Mobile Data Management[C]. Mannheim,Germany, 2007. 278-282. |
[14] | DONG K , GU T , TAO X ,et al. Jointcache:collaborative path confusion through lightweight P2P communication[A]. Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops[C]. San Diego,USA, 2013. 352-355. |
[15] | PALANISAMY B , LIU L . Road network mix-zones for anonymous location based services[A]. Proceedings of the 29th International Conference on Data Engineering[C]. Brisbane,Australia, 2013. 1300-1303. |
[16] | HOH B , GRUSTESER M . Protecting location privacy through path confusion[A]. Security and Privacy for Emerging Areas in Communications Networks[C]. Athens,Greece, 2005. 345-356. |
[17] | WU X , SUN G . A novel dummy-based mechanism to protect privacy on trajectories[A]. Proceedings of IEEE International Conference on Data Mining series[C]. Shenzhen,China, 2014. 1120-1125. |
[18] | NIU B , LI Q H , ZHU X Y ,et al. Achieving k-anonymity in privacy-aware location-based service[A]. Proceedings of the 33rd IEEE International Conference on Computer Communications[C]. Toronto,Canada, 2014. 754-762. |
[19] | PINGLEY A . Protection of query privacy for continuous location based services[A]. Proceedings of the 30th IEEE International Conference on Computer Communications 2011[C]. Shanghai,China, 2011. 1710-1718. |
[20] | HARA T , YAMAMOTO A , ARASEL Y ,et al. Location anonymization using real car trace data for location based services[A]. Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication[C]. Siem Reap,Cambodia, 2014. 1-8. |
[21] | SHARMA V , SHEN C . Evaluation of an entropy-based k-anonymity model for location based services[A]. Proceedings of International Conference on Computing,Networking and Communications[C]. Garden Grove,USA, 2015. 374-378. |
[22] | SHOKRI R , THEODORAKOPOULOS G , BOUDEC J Y L ,et al. Quantifying location privacy[A]. Proceedings of the 32nd IEEE Symposium on Security & Privacy[C]. Claremont Resort,USA, 2011. 247-262. |
[23] | FREUDIGER J . When Whereabouts is no Longer Thereabouts:Location Privacy in Wireless Networks[D]. PhD thesis EPFL, 2011. |
[24] | FREUDIGER J , SHOKRI R , HUBAUX J P . Evaluating the Privacy risk of Location-based Services[M]. Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. 31-46. |
[25] | NIU B , LI Q H , ZHU X Y ,et al. Enhancing privacy through caching in location-based services[A]. Proceedings of the 34rd IEEE International Conference on Computer Communications[C]. Hong Kong,China, 2015. 1017-1025. |
[26] | FREJINGER E . Route Choice Analysis:Data,Models,Algorithms and Applications[D]. PhD thesis EPFL, 2008. |
[27] | KATO R , IWATA M , HARA T ,et al. A dummy-based anonymization method based on user trajectory with pauses[A]. Proceedings of the 20th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems[C]. Redondo Beach,USA, 2012. 249-258. |
[1] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[2] | Si CHEN, Anmin FU, Mang SU, Huaijiang SUN. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. |
[3] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[4] | Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. |
[5] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[6] | Jie WANG,Chunru WANG,Jianfeng MA,Hongtao LI. Dummy location selection algorithm based on location semantics and query probability [J]. Journal on Communications, 2020, 41(3): 53-61. |
[7] | Weihao LI,Jin CAO,Hui LI. Privacy self-correlation privacy-preserving scheme in LBS [J]. Journal on Communications, 2019, 40(5): 57-66. |
[8] | Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach [J]. Journal on Communications, 2019, 40(12): 51-59. |
[9] | Shaobo ZHANG,Qin LIU,Guojun WANG. Trajectory privacy protection method based on location obfuscation [J]. Journal on Communications, 2018, 39(7): 81-91. |
[10] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[11] | Qian ZHOU,Xiaolin QIN,Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network [J]. Journal on Communications, 2018, 39(1): 101-116. |
[12] | Zhen-peng LIU,Xuan ZHAO,Ya-wei DONG,Bin ZHANG. Improved SpaceTwist privacy protection method based on anchor optimization algorithm [J]. Journal on Communications, 2017, 38(Z1): 32-38. |
[13] | Lei ZHANG,Chun-guang MA,Song-tao YANG,Zeng-peng LI. CP-ABE based users collaborative privacy protection scheme for continuous query [J]. Journal on Communications, 2017, 38(9): 76-85. |
[14] | Nan SHEN,Chun-fu JIA,Shuang LIANG,Rui-qi LI,Zhe-li LIU. Approach of location privacy protection based on order preserving encryption of the grid [J]. Journal on Communications, 2017, 38(7): 78-88. |
[15] | Xiao-guang NIU,Chuan-bo WEI,Ya-lan YAO. Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN [J]. Journal on Communications, 2016, 37(4): 23-33. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|