Abstract | ||
---|---|---|
Preserving user location and trajectory privacy while using location-based service (LBS) is an important issue. To address this problem, we first construct three kinds of attack models that can expose a user's trajectory or path while the user is sending continuous queries to a LBS server. Then we propose the k-anonymity trajectory (KAT) algorithm, which is suitable for both single query and continuous queries. Different from existing works, the KAT algorithm selects k-1 dummy locations using the sliding widow based k-anonymity mechanism when the user is making single queries and selects k-1 dummy trajectories using the trajectory selection mechanism for continuous queries. We evaluate and validate the effectiveness of our proposed algorithm by conducting simulations for the single and continuous query scenarios. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/GLOCOM.2015.7417512 | IEEE Global Communications Conference |
Keywords | Field | DocType |
location privacy,trajectory privacy,LBS k-anonymity,single query,continuous queries | Attack model,Algorithm design,Computer science,Computer network,Location-based service,Anonymity,Pound (mass),Trajectory | Conference |
ISSN | Citations | PageRank |
2334-0983 | 2 | 0.38 |
References | Authors | |
7 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Dan Liao | 1 | 286 | 22.88 |
Hui Li | 2 | 46 | 5.75 |
Gang Sun | 3 | 463 | 36.98 |
Vishal Anand | 4 | 431 | 32.49 |