TY - GEN
T1 - A new cloaking method based on weighted adjacency graph for preserving user location privacy in LBS
AU - Jang, Miyoung
AU - Chang, Jae Woo
PY - 2012
Y1 - 2012
N2 - The propagation of position identifying devices, such as Global Positioning System (GPS), becomes increasingly a privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/her exact location to the LBS. So, it is a key challenge to efficiently preserve user's privacy while accessing LBS. For this, the existing method employs a framework that not only hides the actual user location but also reduces bandwidth consumption. However, it suffers from privacy attack for a long term observation of user behaviour. Therefore, we aim to provide the solutions which can preserve user privacy by utilizing k-anonymity mechanism. In this paper, we propose a weighted adjacency graph based k-anonymous cloaking technique that can provide protection to user and also reduce bandwidth usages. Our cloaking approach efficiently supports k-nearest neighbor queries without revealing private information of the query initiator. We demonstrate via experimental results that our algorithm yields much better performance than the existing one.
AB - The propagation of position identifying devices, such as Global Positioning System (GPS), becomes increasingly a privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/her exact location to the LBS. So, it is a key challenge to efficiently preserve user's privacy while accessing LBS. For this, the existing method employs a framework that not only hides the actual user location but also reduces bandwidth consumption. However, it suffers from privacy attack for a long term observation of user behaviour. Therefore, we aim to provide the solutions which can preserve user privacy by utilizing k-anonymity mechanism. In this paper, we propose a weighted adjacency graph based k-anonymous cloaking technique that can provide protection to user and also reduce bandwidth usages. Our cloaking approach efficiently supports k-nearest neighbor queries without revealing private information of the query initiator. We demonstrate via experimental results that our algorithm yields much better performance than the existing one.
KW - k-Anonymity
KW - Location cloaking
KW - Location privacy
KW - Location-based services (LBS)
KW - Privacy preservation
KW - Voronoi diagram
UR - https://www.scopus.com/pages/publications/84868587719
U2 - 10.1007/978-94-007-5699-1_14
DO - 10.1007/978-94-007-5699-1_14
M3 - Conference paper
AN - SCOPUS:84868587719
SN - 9789400756984
T3 - Lecture Notes in Electrical Engineering
SP - 129
EP - 138
BT - Computer Science and Its Applications, CSA 2012
T2 - 4th FTRA International Conference on Computer Science and Its Applications, CSA 2012
Y2 - 22 November 2012 through 25 November 2012
ER -