K-anonymous cloaking algorithm based on weighted adjacency graph for preserving location privacy

  • Amina Hossain*
  • , Al Amin Hossain
  • , Sung Jae Jang
  • , Young Sung Shin
  • , Jae Woo Chang
  • *Corresponding author for this work

    Research output: Contribution to conferenceConference paperpeer-review

    Abstract

    The propagation of position identifying devices, such as GPS (Global Positioning System), becomes increasingly a privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/her exact location to the LBS. So, it is a key challenge to efficiently preserve user's privacy while accessing LBS. For this, the existing method employs a 2PASS cloaking framework that not only hides the actual user location but also reduces bandwidth consumption. However, it suffers from privacy attack. Therefore, we aim to provide the solutions which can preserve user privacy by utilizing k-anonymity mechanism. In this paper, we propose a weighted adjacency graph based k-anonymous cloaking technique that can provide protection to user and also reduce bandwidth usages. Our cloaking approach efficiently supports k-nearest neighbor queries without revealing private information of the query initiator. We demonstrate via experimental results that our algorithm yields much better performance than the existing one.

    Original languageEnglish
    Title of host publicationProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
    Pages358-365
    Number of pages8
    DOIs
    StatePublished - 2012
    Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
    Duration: 2012.06.252012.06.27

    Publication series

    NameProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

    Conference

    Conference11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
    Country/TerritoryUnited Kingdom
    CityLiverpool
    Period12.06.2512.06.27

    Keywords

    • bandwidth
    • cloaking
    • component
    • k-anonymity
    • location privacy
    • location-based services (LBS)
    • Privacy threat
    • weighted adjacency graph

    Quacquarelli Symonds(QS) Subject Topics

    • Computer Science & Information Systems
    • Data Science

    Fingerprint

    Dive into the research topics of 'K-anonymous cloaking algorithm based on weighted adjacency graph for preserving location privacy'. Together they form a unique fingerprint.

    Cite this