4.8 Article

Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 14, Issue 8, Pages 3628-3636

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2017.2773646

Keywords

Differential privacy; Internet of Things (IoT); location privacy protection; location privacy tree (LPT)

Funding

  1. National Natural Science Foundation of China [61772282, 61373134, 61772454, 61402234]
  2. Priority Academic Program Development of Jiangsu Higher Education Institutions
  3. Postgraduate Research & Practice Innovation Program of Jiangsu Province [KYCX17_0901]
  4. Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology

Ask authors/readers for more resources

In the research of location privacy protection, the existing methods are mostly based on the traditional anonymization, fuzzy and cryptography technology, and little success in the big data environment, for example, the sensor networks contain sensitive information, which is compulsory to be appropriately protected. Current trends, such as Industrie 4.0 and Internet of Things (loT), generate, process, and exchange vast amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. However, previous methods overlooked the privacy protection issue, leading to privacy violation. In this paper, we propose a location privacy protection method that satisfies differential privacy constraint to protect location data privacy and maximizes the utility of data and algorithm in Industrial loT. In view of the high value and low density of location data, we combine the utility with the privacy and build a multilevel location information tree model. Furthermore, the index mechanism of differential privacy is used to select data according to the tree node accessing frequency. Finally, the Laplace scheme is used to add noises to accessing frequency of the selecting data. As is shown in the theoretical analysis and the experimental results, the proposed strategy can achieve significant improvements in terms of security, privacy, and applicability.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available