Journal on Communications ›› 2015, Vol. 36 ›› Issue (12): 114-123.doi: 10.11959/j.issn.1000-436x.2015320

• privacy protection • Previous Articles     Next Articles

Efficient scheme for user's trajectory privacy

Feng-hua LI1,Cui ZHANG1,Ben NIU1,Hui LI2,Jia-feng HUA2,Guo-zhen SHI3   

  1. 1 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100195,China
    2 State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
    3 Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
  • Online:2015-12-25 Published:2017-07-17
  • Supported by:
    The National Natural Science Foundation of China—Guangdong Union Foundation;The National High Technology Research and Development Program of China (863 Program);The Key Program of Scientific and Technology Research of Ministry of Education

Abstract:

As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k?1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k?1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency.

Key words: wireless network security, location-based services, location privacy, trajectory privacy

No Suggested Reading articles found!