Location privacy protection scheme for LBS users based ondifferential privacy
In order to take into account the availability of shared location data and privacy protection requirements,aiming at the shared location information collected by the third party,a location privacy protection scheme of LBS users was proposed based on differential privacy.Firstly,the shared location d...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | ZH |
Publicado: |
Hebei University of Science and Technology
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/0b70fa95cbf94c82af79f3dfe4165033 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:0b70fa95cbf94c82af79f3dfe4165033 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:0b70fa95cbf94c82af79f3dfe41650332021-11-23T07:08:47ZLocation privacy protection scheme for LBS users based ondifferential privacy1008-154210.7535/hbkd.2021yx03003https://doaj.org/article/0b70fa95cbf94c82af79f3dfe41650332021-06-01T00:00:00Zhttp://xuebao.hebust.edu.cn/hbkjdx/ch/reader/create_pdf.aspx?file_no=b202103003&flag=1&journal_https://doaj.org/toc/1008-1542In order to take into account the availability of shared location data and privacy protection requirements,aiming at the shared location information collected by the third party,a location privacy protection scheme of LBS users was proposed based on differential privacy.Firstly,the shared location data set was preprocessed,the dictionary query mode was used to build the location transaction database,and the trie tree structure was adopted to store the location data and frequency,so as to improve the query efficiency and reduce the number of noise.Secondly,frequent location selection was carried out in the Trie tree,and Laplacian mechanism under differential privacy was used to disturb the location frequency.Finally,the perturbed data was optimized based on the two techniques of upward post-processing and consistency constrained post-processing,and theoretically prove that the proposed scheme satisfies ε[KG-*4]-differential privacy.The experimental results show that,compared with the existing methods,this scheme improves the efficiency of data processing,generalizes the sensitive locations,and has higher accuracy and lower rejection rate.This scheme has a certain reference value in user location privacy protection and shared location data availability.Naiwen YUShaojie YANGZhenguo CHENGuanghua ZHANGHebei University of Science and Technologyarticledata security and computer security; location data; privacy protection; differential privacy; availabilityTechnologyTZHJournal of Hebei University of Science and Technology, Vol 42, Iss 3, Pp 222-230 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
ZH |
topic |
data security and computer security; location data; privacy protection; differential privacy; availability Technology T |
spellingShingle |
data security and computer security; location data; privacy protection; differential privacy; availability Technology T Naiwen YU Shaojie YANG Zhenguo CHEN Guanghua ZHANG Location privacy protection scheme for LBS users based ondifferential privacy |
description |
In order to take into account the availability of shared location data and privacy protection requirements,aiming at the shared location information collected by the third party,a location privacy protection scheme of LBS users was proposed based on differential privacy.Firstly,the shared location data set was preprocessed,the dictionary query mode was used to build the location transaction database,and the trie tree structure was adopted to store the location data and frequency,so as to improve the query efficiency and reduce the number of noise.Secondly,frequent location selection was carried out in the Trie tree,and Laplacian mechanism under differential privacy was used to disturb the location frequency.Finally,the perturbed data was optimized based on the two techniques of upward post-processing and consistency constrained post-processing,and theoretically prove that the proposed scheme satisfies ε[KG-*4]-differential privacy.The experimental results show that,compared with the existing methods,this scheme improves the efficiency of data processing,generalizes the sensitive locations,and has higher accuracy and lower rejection rate.This scheme has a certain reference value in user location privacy protection and shared location data availability. |
format |
article |
author |
Naiwen YU Shaojie YANG Zhenguo CHEN Guanghua ZHANG |
author_facet |
Naiwen YU Shaojie YANG Zhenguo CHEN Guanghua ZHANG |
author_sort |
Naiwen YU |
title |
Location privacy protection scheme for LBS users based ondifferential privacy |
title_short |
Location privacy protection scheme for LBS users based ondifferential privacy |
title_full |
Location privacy protection scheme for LBS users based ondifferential privacy |
title_fullStr |
Location privacy protection scheme for LBS users based ondifferential privacy |
title_full_unstemmed |
Location privacy protection scheme for LBS users based ondifferential privacy |
title_sort |
location privacy protection scheme for lbs users based ondifferential privacy |
publisher |
Hebei University of Science and Technology |
publishDate |
2021 |
url |
https://doaj.org/article/0b70fa95cbf94c82af79f3dfe4165033 |
work_keys_str_mv |
AT naiwenyu locationprivacyprotectionschemeforlbsusersbasedondifferentialprivacy AT shaojieyang locationprivacyprotectionschemeforlbsusersbasedondifferentialprivacy AT zhenguochen locationprivacyprotectionschemeforlbsusersbasedondifferentialprivacy AT guanghuazhang locationprivacyprotectionschemeforlbsusersbasedondifferentialprivacy |
_version_ |
1718416865059930112 |