Artificial Impostors for Location Privacy Preservation
نویسندگان
چکیده
The progress of location-based services has led to serious concerns on location privacy leakage. For effective and efficient location privacy preservation (LPP), existing methods are still not fully competent. They are often vulnerable under the identification attack with side information, or hard to be implemented due to the high computational complexity. In this paper, we pursue the high protection efficacy and low computational complexity simultaneously. We propose a scalable LPP method based on the paradigm of counterfeiting locations. To make fake locations extremely plausible, we forge them through synthesizing artificial impostors (AIs). The AIs refer to the synthesized traces which have similar semantic features to the actual traces, and do not contain any target location. Two dedicated techniques are devised: the sampling-based synthesis method and population-level semantic model. They play significant roles in two critical steps of synthesizing AIs. We conduct experiments on real datasets in two cities (Shanghai, China and Asturias, Spain) to validate the high efficacy and scalability of the proposed method. In these two datasets, the experimental results show that our method achieves the preservation efficacy of 97.65% and 96.12%, and its run time of building the generators is only 230.47 and 215.92 seconds, respectively. This study would give the research community new insights into improving the practicality of the state-of-the-art LPP paradigm via counterfeiting locations.
منابع مشابه
improvement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملLocation Data Privacy Preservation in Mobile Networks
Uncontrolled variety of location based service (LBS) applications in mobile networks led to the loss of individual user location data privacy. To preserve privacy in mobile networks data randomization and anonymization must be used because of location data uncertainty. By data randomization additional random data is added to the original location data, desensitizing the precise information cont...
متن کاملLocation Privacy Preserving without Exact Locations in Mobile Services
Privacy preservation has recently received considerable attention in location-based services. A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most of existing cloaking approaches assume that mobile users are trusted. And exact locations are required to protect location privacy, which are just the information mobile ...
متن کاملA Clustering K-Anonymity Scheme for Location Privacy Preservation
The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of LocationBased Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity sche...
متن کاملCryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey
Current research in location-based services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently) mutually exclusive requirements for access control and context privacy (i.e., identity and/or location), while at the same time adopting more conservative assumptions in order to reduce or compl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1801.06827 شماره
صفحات -
تاریخ انتشار 2018