Paper Title:
Measuring User Trajectory Privacy in LBSs with Adversarial Background Knowledge
  Abstract

This paper proposes a novel entropy-based metric for evaluating silent cascade which is a prevalent trajectory privacy preserving method in LBSs (location-based services). Within this measure, the trajectory privacy is quantified as the probability of the relevance between the user’s pseudonym before and after each mix-zone. After a period of time, the tracked user may take many potential trajectories from the perspective of the adversary. The user’s trajectory privacy level is calculated using information entropy. The most distinguishable aspect of the measure is to take into account the adversarial background knowledge. We develop methods to describe and quantify the adversarial background knowledge. Simulation results reflect the impact of background knowledge on the privacy level in the metric, and show that this metric is effective and valuable to measure the user’s trajectory privacy level correctly even the adversary has variable background knowledge.

  Info
Periodical
Advanced Materials Research (Volumes 143-144)
Edited by
H. Wang, B.J. Zhang, X.Z. Liu, D.Z. Luo, S.B. Zhong
Pages
38-42
DOI
10.4028/www.scientific.net/AMR.143-144.38
Citation
C. M. Wang, Y. M. Guo, Y. J. Guo, Y. H. Guo, "Measuring User Trajectory Privacy in LBSs with Adversarial Background Knowledge", Advanced Materials Research, Vols. 143-144, pp. 38-42, 2011
Online since
October 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Gui Hua Peng, He Chen, Qiang Wu
Chapter 3: Advanced Test and Measurement
Abstract:This paper presents an algorithm for detecting the small infrared target under complex background. An method, Local Mutation Weighted...
615
Authors: Yan Lu, Ming Dai, Lei Jiang
Chapter 5: Information Processing and Computational Science
Abstract:In order to solve the Gaussian kernel density-based background modeling, we propose a background modeling method based on an 8-neighborhood...
743
Authors: Tia Nai Wu, Yun Rong Wu, Yun Yu Wu
Chapter 5: Measurements, Monitoring and Sensor
Abstract:Moving object detection is the basic of video applications such as computer vision, object recognition and tracking, surveillance security...
1166
Authors: Xiu Rong Li, Shuang Zheng, Ya Li Liu
Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development
Abstract:In this paper, we describe some privacy threats in the Internet of Things and some research works on privacy protection. We present a new...
2462