Location privacy protection scheme for LBS users based ondifferential privacy

In order to take into account the availability of shared location data and privacy protection requirements,aiming at the shared location information collected by the third party,a location privacy protection scheme of LBS users was proposed based on differential privacy.Firstly,the shared location d...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Naiwen YU, Shaojie YANG, Zhenguo CHEN, Guanghua ZHANG
Formato: article
Lenguaje:ZH
Publicado: Hebei University of Science and Technology 2021
Materias:
T
Acceso en línea:https://doaj.org/article/0b70fa95cbf94c82af79f3dfe4165033
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:0b70fa95cbf94c82af79f3dfe4165033
record_format dspace
spelling oai:doaj.org-article:0b70fa95cbf94c82af79f3dfe41650332021-11-23T07:08:47ZLocation privacy protection scheme for LBS users based ondifferential privacy1008-154210.7535/hbkd.2021yx03003https://doaj.org/article/0b70fa95cbf94c82af79f3dfe41650332021-06-01T00:00:00Zhttp://xuebao.hebust.edu.cn/hbkjdx/ch/reader/create_pdf.aspx?file_no=b202103003&flag=1&journal_https://doaj.org/toc/1008-1542In order to take into account the availability of shared location data and privacy protection requirements,aiming at the shared location information collected by the third party,a location privacy protection scheme of LBS users was proposed based on differential privacy.Firstly,the shared location data set was preprocessed,the dictionary query mode was used to build the location transaction database,and the trie tree structure was adopted to store the location data and frequency,so as to improve the query efficiency and reduce the number of noise.Secondly,frequent location selection was carried out in the Trie tree,and Laplacian mechanism under differential privacy was used to disturb the location frequency.Finally,the perturbed data was optimized based on the two techniques of upward post-processing and consistency constrained post-processing,and theoretically prove that the proposed scheme satisfies ε[KG-*4]-differential privacy.The experimental results show that,compared with the existing methods,this scheme improves the efficiency of data processing,generalizes the sensitive locations,and has higher accuracy and lower rejection rate.This scheme has a certain reference value in user location privacy protection and shared location data availability.Naiwen YUShaojie YANGZhenguo CHENGuanghua ZHANGHebei University of Science and Technologyarticledata security and computer security; location data; privacy protection; differential privacy; availabilityTechnologyTZHJournal of Hebei University of Science and Technology, Vol 42, Iss 3, Pp 222-230 (2021)
institution DOAJ
collection DOAJ
language ZH
topic data security and computer security; location data; privacy protection; differential privacy; availability
Technology
T
spellingShingle data security and computer security; location data; privacy protection; differential privacy; availability
Technology
T
Naiwen YU
Shaojie YANG
Zhenguo CHEN
Guanghua ZHANG
Location privacy protection scheme for LBS users based ondifferential privacy
description In order to take into account the availability of shared location data and privacy protection requirements,aiming at the shared location information collected by the third party,a location privacy protection scheme of LBS users was proposed based on differential privacy.Firstly,the shared location data set was preprocessed,the dictionary query mode was used to build the location transaction database,and the trie tree structure was adopted to store the location data and frequency,so as to improve the query efficiency and reduce the number of noise.Secondly,frequent location selection was carried out in the Trie tree,and Laplacian mechanism under differential privacy was used to disturb the location frequency.Finally,the perturbed data was optimized based on the two techniques of upward post-processing and consistency constrained post-processing,and theoretically prove that the proposed scheme satisfies ε[KG-*4]-differential privacy.The experimental results show that,compared with the existing methods,this scheme improves the efficiency of data processing,generalizes the sensitive locations,and has higher accuracy and lower rejection rate.This scheme has a certain reference value in user location privacy protection and shared location data availability.
format article
author Naiwen YU
Shaojie YANG
Zhenguo CHEN
Guanghua ZHANG
author_facet Naiwen YU
Shaojie YANG
Zhenguo CHEN
Guanghua ZHANG
author_sort Naiwen YU
title Location privacy protection scheme for LBS users based ondifferential privacy
title_short Location privacy protection scheme for LBS users based ondifferential privacy
title_full Location privacy protection scheme for LBS users based ondifferential privacy
title_fullStr Location privacy protection scheme for LBS users based ondifferential privacy
title_full_unstemmed Location privacy protection scheme for LBS users based ondifferential privacy
title_sort location privacy protection scheme for lbs users based ondifferential privacy
publisher Hebei University of Science and Technology
publishDate 2021
url https://doaj.org/article/0b70fa95cbf94c82af79f3dfe4165033
work_keys_str_mv AT naiwenyu locationprivacyprotectionschemeforlbsusersbasedondifferentialprivacy
AT shaojieyang locationprivacyprotectionschemeforlbsusersbasedondifferentialprivacy
AT zhenguochen locationprivacyprotectionschemeforlbsusersbasedondifferentialprivacy
AT guanghuazhang locationprivacyprotectionschemeforlbsusersbasedondifferentialprivacy
_version_ 1718416865059930112