The research for protecting location privacy based on V-W algorithm

  • PDF / 12,618,148 Bytes
  • 15 Pages / 595 x 794 pts Page_size
  • 36 Downloads / 192 Views

DOWNLOAD

REPORT


R ESEA R CH

Open Access

The research for protecting location privacy based on V-W algorithm Xinyue Fan, Jing Tu, Chaolong Ye and Fei Zhou*

Abstract With the development of mobile internet, protecting location privacy has already been an important issue. Based on previous studies and the drawback of traditional algorithms, the paper proposes a novel algorithm for protecting location privacy. The algorithm is based on the voronoi map of a road network, considers the problem of side-weight inference, and utilizes the information entropy as metrics. Meanwhile, the algorithm can defense the attack of side-weight inference and replay. Lastly, we verified the algorithm based on the real data of the road network. Results of experiences show that the improved algorithm has the better performance on some key performance metrics. Keywords: Location privacy; Voronoi map; Road network; Information entropy

1 Introduction With the rapid development of mobile network, the leakage of location privacy has become a problem that cannot be ignored. So lots of researchers have paid more attention on it. So far, researches on protecting location privacy mainly focus on two aspects: The infrastructure of a location privacy protection system and the method of protecting location privacy. Now, the mainstream architectures of a location privacy protection system are usually divided into three categories: non-cooperative architecture, distributed peer-to-peer architecture, and centralized architecture [1]. The existing methods about location privacy protection mainly include false-name location privacy protection, landmark location privacy protection, false-address location privacy protection, and spatial anonymity location privacy protection. False-name location privacy protection replaces the real identity of a user by a false name so that attackers cannot obtain the real query source from location-based services (LBS) severs [2]. Landmark location privacy protection only utilizes some landmark position within a certain range instead of a user’s real position to interact with LBS, so attackers cannot identify the real position of users [3]. Through the further research *Correspondence: [email protected] Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongwen Road, 400065 Chongqing, China

on landmark method, the current method of protecting location privacy based on a landmark not only uses landmark position to replace the real position of a target, but also utilizes some algorithms to give a false position to replace the real position of users. For instance, literature [4] adopts an incremental nearest neighbor query algorithm to realize location privacy protection. In literature [5], an anonymous regional transformation algorithm is adopted. In the method of false-address location privacy protection, a position information set, that includes the real position of a user and a sequence of a false position (dubbed as dummy), is sent to LBS, so attackers have no way to disti