Privacy protection methods of location services in big data
Author:
Liu Wenfeng1, Wu Juanjuan2, Xi Zhong3
Affiliation:
1. Student Affairs Office, Hunan College of Foreign Studies , Changsha , 410203, Hunan , China 2. School of Humanities and Arts, Hunan Institute of Transportation Engineering , Hengyang , 421000, Hunan , China 3. College of Western Languages, Hunan College of Foreign Languages , Changsha , 410203, Hunan , China
Abstract
Abstract
The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure. Therefore, it is very necessary to study the privacy protection method based on location service to strengthen the security of location privacy. The purpose of this work is to improve the security of location privacy and prevent the disclosure of user privacy by studying the characteristics of location services and privacy protection methods. This article first describes the characteristics of the important location privacy protection law, and then studies the structural characteristics and operation process of the location privacy protection law. This work evaluates the advantages and disadvantages of different methods, and finally compares the performance of several privacy protection algorithms through experimental analysis. Through the research of hiding space method, two-level cache method based on user grid, differential privacy protection method and experimental analysis of the algorithm, an effective privacy protection algorithm can be obtained. It can better protect the location privacy of users. For example, dual-active in the hidden space algorithm has the best privacy protection performance. Compared with other algorithms, the success rate of generating hidden space is increased by more than 10%, and the time of generating hidden space is shortened by about a quarter. The algorithm It has certain practical value and significance for use in the privacy protection of users.
Publisher
Walter de Gruyter GmbH
Subject
General Computer Science
Reference26 articles.
1. O. Ruan, L. Zhang, and Y. Zhang, “Location-sharing protocol for privacy protection in mobile online social networks,” EURASIP J. Wirel. Commun. Netw., vol. 2021, no. 1, pp. 1–14, 2021. 2. X. Xue, H. Li, Z. Li, and J. Xiong, “Location privacy protection scheme for LBS in IoT ,” Wirel. Commun. Mob. Comput., vol. 2021, no. 5, pp. 1–18, 2021. 3. M. R. Lee, W. W. Lee, and B. Jang, “Anonymization algorithms for location privacy protection: A survey,” JP J. Heat. Mass. Transf., vol. 15, no. 2, pp. 291–298, 2018. 4. Z. Wu, R. Wang, Q. Li, X. Lian, G. Xu, E. Chen, et al., “A location privacy-preserving system based on query range cover-up or location-based services,” IEEE Trans. Veh. Technol., vol. 69, no. 5, pp. 5244–5254, 2020. 5. H. Li, Y. Wang, F. Guo, J. Wang, and C. Wu, “Differential privacy location protection method based on the Markov model,” Wirel. Commun. Mob. Comput., vol. 2021, no. 4, pp. 1–12, 2021.
|
|