Journal on Communications ›› 2018, Vol. 39 ›› Issue (7): 81-91.doi: 10.11959/j.issn.1000-436x.2018119

• Papers • Previous Articles     Next Articles

Trajectory privacy protection method based on location obfuscation

Shaobo ZHANG1,Qin LIU2,Guojun WANG3()   

  1. 1 School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan 411201,China
    2 College of Computer Science and Electronic Engineering,Hunan University,Changsha 410082,China
    3 School of Computer Science and Educational Software,Guangzhou University,Guangzhou 510006,China
  • Revised:2018-05-11 Online:2018-07-01 Published:2018-08-08
  • Supported by:
    The National Natural Science Foundation of China(61632009);The National Natural Science Foundation of China(61472451);The National Natural Science Foundation of China(61402161);The National Natural Science Foundation of China(61772194);The Natural Science Foundation of Hunan Province(2016JJ3046);The Natural Science Foundation of Guangdong Province(2017A030308006);The High Level Talents Program of Higher Education in Guangdong Province(2016ZJ01)

Abstract:

In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.

Key words: trajectory privacy, location obfuscation, location prediction, dummy location, anonymizer

CLC Number: 

No Suggested Reading articles found!