期刊文献+

Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services 被引量:6

Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services
原文传递
导出
摘要 Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real-life scenarios. In this paper, we introduce a new location privacy problem: Location-aware Location Privacy Protection (L2P2) problem, where users can define dynamic and diverse privacy requirements for different locations. The goal of the L2P2 problem is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user. In this paper, we formalize two versions of the L2P2 problem, and propose several efficient heuristics to provide such location-aware location privacy protection for mobile users. Through extensive simulations over large synthetic and real-life datasets, we confirm the effectiveness and efficiency of the proposed L2P2 algorithms. Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real-life scenarios. In this paper, we introduce a new location privacy problem: Location-aware Location Privacy Protection (L2P2) problem, where users can define dynamic and diverse privacy requirements for different locations. The goal of the L2P2 problem is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user. In this paper, we formalize two versions of the L2P2 problem, and propose several efficient heuristics to provide such location-aware location privacy protection for mobile users. Through extensive simulations over large synthetic and real-life datasets, we confirm the effectiveness and efficiency of the proposed L2P2 algorithms.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期243-259,共17页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China (Nos.61370192,61432015,61428203,and 61572347) the US National Science Foundation (Nos.CNS-1319915 and CNS-1343355)
关键词 location privacy K-ANONYMITY cloaking algorithm location-based service mobile networks location privacy k-anonymity cloaking algorithm location-based service mobile networks
  • 相关文献

参考文献30

  • 1K.M.Heussner,Google,Apple track users’location information,but why?http://abcnews.go.com/Technology/,April 29,2011. 被引量:1
  • 2B.Guo,Z.Wang,Z.Yu,Y.Wang,N.Yen,R.Huang,and X.Zhou,Mobile crowd sensing and computing:The review of an emerging human-powered sensing paradigm,ACM Computing Surveys,vol.48,no.1,p.7,2015. 被引量:1
  • 3X.Su,H.Tong,and P.Ji,Activity recognition with smartphone sensors,Tsinghua Science and Technology,vol.19,no.3,pp.235-249,2014. 被引量:1
  • 4Y.Wang,F.Li,and T.Dahlberg,Energy-efficient topology control for three-dimensional sensor networks,International Journal of Sensor Networks,vol.4,nos.1&2,pp.68-78,2008. 被引量:1
  • 5Y.Wang,W.-Z.Song,W.Wang,X.-Y.Li,and T.Dahlberg,LEARN:Localized energy aware restricted neighborhood routing for ad hoc networks,in Proc.of IEEE SECON,2006. 被引量:1
  • 6Y.Zhu,C.Zhang,F.Li,and Y.Wang,Geo-Social:Routing with location and social metrics in mobile opportunistic networks,in Proc.of IEEE ICC,2015. 被引量:1
  • 7A.R.Beresford and F.Stajano,Location privacy in pervasive computing,IEEE Pervasive Computing,vol.2,pp.46-55,2003. 被引量:1
  • 8M.Gruteser and D.Grunwald,Anonymous usage of location-based services through spatial and temporal cloaking,in Proc.of ACM Mobi Sys,2003. 被引量:1
  • 9T.Xu and Y.Cai,Feeling-based location privacy protection for location-based services,in Proc.of ACM CCS’09,2009. 被引量:1
  • 10T.Brinkhoff,A framework for generating network-based moving objects,Geo Informatica,vol.6,pp.153-180,2002. 被引量:1

同被引文献22

引证文献6

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部