Abstract
AbstractWith the rapid development of location-based services in the field of mobile network applications, users enjoy the convenience of location-based services on one side, and they are exposed to the risk of privacy disclosure on the other side. Attackers may attack based on the semantic of the user’s location and user’s query location. A few of existing works on location privacy protection consider to protect the user’s location and his query location simultaneously, while the query location may reflect his requirement. In this paper, based on the existing location privacy protection framework, we first generate sensitive weight documents based on the user’s sensitivity to different location semantics automatically, then obtain the best collaborative segment for k-anonymity of the user’s location by using the reinforcement learning algorithm, and finally, the bidirectional k-disturbance of the user’s location and query location is performed based on the location semantics in real road network environment. The experiment verifies the effectiveness of the proposed method.
Funder
National Natural Science Foundation of China
National Key R&D Program of China
Natural Science Foundation of Hunan Province
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference47 articles.
1. M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceedings of the 1st international conference on Mobile systems, applications and services. ACM, 31–42 (2003)
2. Yiu M L, Jensen C S, Huang X, et al. Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services[C]//Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on. IEEE, 2008: 366-375.
3. M.F. Mokbel, C.Y. Chow, W.G. Aref, The new casper: query processing for location services without compromising privacy[C]//Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment, 763–774 (2006)
4. Z. Gong, G.Z. Sun, X. Xie, Protecting privacy in location-based services using k-anonymity without cloaked region[C]// Eleventh International Conference on Mobile Data Management. IEEE Comput Society, 366–371 (2010)
5. A. Khoshgozaran, C. Shahabi, H. Shirani-Mehr, Location privacy: going beyond K-anonymity, cloaking and anonymizers[J]. Knowledge Inform Syst 26(3), 435–465 (2011)
Cited by
94 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献