A personalized two-tier cloaking scheme for privacy-aware location-based services
- 1 February 2015
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The ubiquity of modern mobile devices with GPS modules and Internet connectivity such as 3G/4G techniques have resulted in rapid development of Location-Based Services (LBSs). However, users enjoy the convenience provided by the untrusted LBS server at the cost of their privacy. To protect user's sensitive information against adversaries with side information, we design a personalized spatial cloaking scheme, termed TTcloak, which provides k-anonymity for user's location privacy, 1-diversity for query privacy and desired size of cloaking region for mobile users in LBSs, simultaneously. TTcloak uses Dummy Query Determining (DQD) algorithm and Dummy Location Determining (DLD) algorithm to find out a set of realistic cells as candidates, and employs a CR-refinement Module (CRM) to guarantee that dummy users are assigned into the cloaking region with desired size. Finally, thorough security analysis and empirical evaluation results verify our proposed TTcloak.Keywords
This publication has 19 references indexed in Scilit:
- EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based ServicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based ServicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Collaborative Location PrivacyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- CachéPublished by Association for Computing Machinery (ACM) ,2011
- Protection of query privacy for continuous location based servicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Casper*ACM Transactions on Database Systems, 2009
- On the Levy-Walk Nature of Human MobilityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Protecting Location Privacy with Personalized k-Anonymity: Architecture and AlgorithmsIEEE Transactions on Mobile Computing, 2007
- L-diversity: privacy beyond k-anonymityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006