A Model of LBS Privacy Protection Based on Collaboration

Article Preview

Abstract:

How to protect users privacy effectively while providing location based service (LBS) is a very important study of the mobile Internet. Where location k-anonymity algorithm is the most commonly used algorithm at present. However the algorithm also has some disadvantages. Therefore, this paper presents a model of LBS privacy protection based on collaboration. It divides a location-based query into two parts and sends to two entities separately. One is the location cloaking server (LCS) which calculates k-anonymous locations, and the other is location service provider (LSP) which implements the query. Except the user none of the servers could have the complete query information. By this way it protects the users privacy very well. The algorithm partly solved the problems existing in the traditional k-anonymity algorithm, and the algorithms performance was significantly increased.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

172-176

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Information on http: /baike. baidu. com/view/3214499. htm.

Google Scholar

[2] Xiao Pan, Zhen Xiao, Xiaofeng Meng. Survey of Location Privacy-Preserving[J]. Journal of Computer Science and Frontiers, in Chinese, Mar (2007).

Google Scholar

[3] Bamba B, Liu L. PrivacyGrid: Supporting Anonymous Location Queries in Mobile Environments[R]. Technical Report, Georgia Institute of Technology, May (2007).

DOI: 10.21236/ada470490

Google Scholar

[4] J Xu, X Tang, H Hu, and J Du. Privacy-Conscious Location Based Queries in Mobile Environments[J]. IEEE Transactions on Parallel and Distributed Systems, Vol. 21(3): 313-326(2010).

DOI: 10.1109/tpds.2009.65

Google Scholar

[5] Xiao Pan, Xing Hao, and Xiaofeng Meng. Privacy Preserving Towards Continuous Query in Location-Based Services[J]. Journal of Computer Research and Development, in Chinese, Jan (2010).

Google Scholar