Journal on Communications ›› 2019, Vol. 40 ›› Issue (12): 51-59.doi: 10.11959/j.issn.1000-436x.2019235
• Papers • Previous Articles Next Articles
Wenjing ZHANG,Qiao LIU(),Hui ZHU
Revised:
2019-10-08
Online:
2019-12-25
Published:
2020-01-16
Supported by:
CLC Number:
Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach[J]. Journal on Communications, 2019, 40(12): 51-59.
[1] | KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location based services[C]// 21st International Conference on Data Engineering Workshops. 2005: 1248-1248. |
[2] | AHAMED S I , HAQUE M M , HASAN C S . A novel location privacy framework without trusted third party based on location anonymity prediction[J]. ACM SIGAPP Applied Computing Review, 2012,12(1): 24-34. |
[3] | BAMBA B , LIU L , PESTI P ,et al. Supporting anonymous location queries in mobile environments with privacygrid[C]// The 17th International Conference on World Wide Web. 2008: 237-246. |
[4] | CHENG R , ZHANG Y , BERTINO E ,et al. Preserving user location privacy in mobile data management infrastructures[C]// International Workshop on Privacy Enhancing Technologies. 2006: 393-412. |
[5] | GEDIK B , LIU L . A customizable k-anonymity model for protecting location privacy[R]. Georgia Institute of Technology, 2004. |
[6] | GHINITA G , KALNIS P , SKIADOPOULOS S . PRIVE:anonymous location-based queries in distributed mobile systems[C]// The 16th International Conference on World Wide Web. 2007: 371-380. |
[7] | KALNIS P , GHINITA G , MOURATIDIS K ,et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007,19(12): 1719-1733. |
[8] | MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy[C]// The 32nd International Conference on Very Large Data Bases. 2006: 763-774. |
[9] | ANDR?S M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// ACM Conference on Computer and Communications Security. ACM, 2013. |
[10] | BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location privacy[C]// The 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 251-262. |
[11] | SWEENEY L . k-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570. |
[12] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile systems,Applications and Services. 2003: 31-42. |
[13] | XIAO Z , MENG X , XU J . Quality aware privacy protection for location-based services[C]// International Conference on Database Systems for Advanced Applications. 2007: 434-446. |
[14] | LI C , PALANISAMY B . ReverseCloak:Protecting multi-level location privacy over road networks[C]// The 24th ACM International on Conference on Information and Knowledge Management. 2015: 673-682. |
[15] | SANKAR L , RAJAGOPALAN S R , POOR H V . Utility-privacy tradeoffs in databases:an information-theoretic approach[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 838-852. |
[16] | CALMON F D P , FAWAZ N . Privacy against statistical inference[C]// The 50th Annual Allerton Conference on Communication,Control,and Computing. 2012: 1401-1408. |
[17] | OYA S , TRONCOSO C , P?REZ-GONZ?LEZ F . Back to the drawing board:revisiting the design of optimal location privacy-preserving mechanisms[C]// The 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 1959-1972. |
[18] | COVER T M , THOMAS J A . Elements of Information Theory[M]. New Jersey: John Wiley & SonsPress, 2012. |
[19] | CSISZ I,TUSN?DY G . Information geometry and alternating minimization procedures[J]. Statistics and Decisions, 1984(1): 205-237. |
[20] | BLAHUT R . Computation of channel capacity and rate-distortion functions[J]. IEEE Transactions on Information Theory, 1972,18(4): 460-473. |
[21] | ANDR?S M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// The 20th ACM conference on Computer and Communications Security. 2013: 901-914. |
[1] | Jingbo LI, Li MA, Yang LI, Yingxun FU, Dongchao MA. Optimized design of sensing transmission and computing collaborative industrial Internet [J]. Journal on Communications, 2023, 44(6): 12-22. |
[2] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[3] | Zhen CHEN, Wenhui CHEN, Xiaowei LIU, Dianlong YOU, Linlin LIU, Limin SHEN. Functional complementarity relationship enhanced cloud API recommendation method [J]. Journal on Communications, 2023, 44(6): 125-137. |
[4] | Debin WEI, Chengsheng PAN, Li YANG, Zuoren YAN. Adaptive random early detection algorithm based on network traffic level grade prediction [J]. Journal on Communications, 2023, 44(6): 154-166. |
[5] | Yuancheng LI, Yongtai QIN. Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform [J]. Journal on Communications, 2023, 44(5): 181-192. |
[6] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[7] | Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG. Survey on rail transit mobile edge computing network security [J]. Journal on Communications, 2023, 44(4): 201-215. |
[8] | Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG. Study of SDN intrusion intent identification algorithm based on Bayesian attack graph [J]. Journal on Communications, 2023, 44(4): 216-225. |
[9] | Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN, Yongliang ZHOU, Jiali MA. Method based on contrastive incremental learning for fine-grained malicious traffic classification [J]. Journal on Communications, 2023, 44(3): 1-11. |
[10] | Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU. Design, implementation and formal verification of BGP proxy for mimic router [J]. Journal on Communications, 2023, 44(3): 33-44. |
[11] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[12] | Jian SHU, Jiawei SHI, Linlan LIU, Al-Kali Manar. Topology prediction for opportunistic network based on spatiotemporal convolution [J]. Journal on Communications, 2023, 44(3): 145-156. |
[13] | Dongbin WANG, Dongzhe WU, Hui ZHI, Kun GUO, Xu ZHANG, Jinqiao SHI, Yu ZHANG, Yueming LU. Preventing flow table overflow against denial of service attack in software defined network [J]. Journal on Communications, 2023, 44(2): 1-11. |
[14] | Haiyan KANG, Molan LONG. Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Journal on Communications, 2023, 44(2): 122-135. |
[15] | Yuntao ZHANG, Binxing FANG, Chunlai DU, Zhongru WANG, Zhijian CUI, Shouyou SONG. Container escape detection method based on heterogeneous observation chain [J]. Journal on Communications, 2023, 44(1): 49-63. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|