JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2012, Vol. 42 ›› Issue (5): 96-101.

• Articles • Previous Articles     Next Articles

An algorithm for protecting location privacy in road network

SUN Lan, LUO Zhao, WU Ying-jie, WANG Yi-lei   

  1. College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China
  • Received:2012-06-01 Online:2012-10-20 Published:2012-06-01

Abstract: Recently, the privacy preserving locationbased services has been a hot topic in data privacy preserving research fields. The existed researches on location privacy preserving mainly focused on Euclidean space. However, many locationbased services were under roadnetwork environment, whose distribution of users was possibly unbalanced, which could make the traditional location privacy models and methods under Euclidean space unusable. A location privacy protection algorithm was proposed to prevent the inferring attack caused by the unbalanced distribution of users in roadnetwork. The key idea of the proposed algorithm was that the cloaked segment set was constructed by sorting edges with edge weight and taking the geographical position distribution of users into consideration. Experimental analysis was designed by comparing the proposed algorithm and the traditional algorithm on the feasibility and effectiveness. Experimental results showed that the proposed algorithm was effective and feasible.

Key words: location privacy preserving, road network, unbalanced edge weight, edge weight inference attack, cloaking edge set, query cost

CLC Number: 

  • TP309
[1] WANG Lanzhong, MENG Wenjie. Video perceptual encryption algorithm in remote education receiver [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(4): 40-44.
[2] WANG Danhui1, WANG An2*. The efficiency of power analysis attack based on S-boxes of block ciphers [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(2): 6-11.
[3] YANG Jun-han1, CAO Tian-jie1,2. Passwordauthenticated  key exchange protocol based on certificateless key encapsulation in  the standard model [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2013, 43(2): 11-17.
[4] XU Long-qin1, LIU Shuang-yin1,2,3,4*. Water quality prediction model based on APSO-WLSSVR [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 80-86.
[5] HANG Guang-qing,KONG Fan-yu,LI Da-xing, . Efficient algorithm with resistance to simple power analysis on Koblitz curves [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(3): 78-80 .
[6] YANG Chen,MA Wen-ping,WANG Xin-mei . Practical group signatures based on the knowledge signature [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 76-79 .
[7] LIU Yuan-xun,XU Qiu-liang,YUN Xiao-chun . Research on IDS-faced general-purpose application-level protocol identification technology [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(1): 65-69 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!