4.3 Article

DPLQ: Location-based service privacy protection scheme based on differential privacy

Journal

IET INFORMATION SECURITY
Volume 15, Issue 6, Pages 442-456

Publisher

WILEY
DOI: 10.1049/ise2.12034

Keywords

-

Funding

  1. National Natural Science Foundation of China [61802161]
  2. National Science Foundation of Liaoning Province [2017054043]

Ask authors/readers for more resources

The LBS Privacy Protection Scheme Based on Differential Privacy (DPLQ) includes privacy protection algorithms for both user location and query data, utilizing Laplace and exponential mechanisms to resist malicious attacks and effectively safeguard user privacy.
The existing privacy protection schemes for Location-Based Service (LBS) only protect users' location privacy or query privacy, which can not adopt both of the privacy protections simultaneously in the LBS system. Moreover, these schemes cannot take into account the spatial-temporal correlation and background knowledge. In response to the above mentioned questions, the LBS Privacy Protection Scheme Based on Differential Privacy (DPLQ) is proposed. The method contains two kinds of privacy protection algorithms: users' location privacy protection algorithm and users' query privacy protection algorithm. The users' location privacy protection algorithm divides the map using the Voronoi diagram, choosing l fake location points based on the improved k-means algorithm and l-diversity idea, and protects users' location privacy with the Laplace mechanism. Based on the k-anonymous algorithm, the users' query privacy protection algorithm builds a query k-anonymous set according to the neighbour users' query requests at the same time t in the cluster and the historical query probability of the region's POI and protects users' query privacy with the exponential mechanism. Through setting the privacy protection intensity of the algorithm by the users, the generated location dataset and query k-anonymous set can resist a variety of attacks from malicious attackers. Theoretical analysis and experimental results show that the scheme can effectively protect the location privacy and query privacy of users.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available