2017
DOI: 10.1371/journal.pone.0182232
|View full text |Cite
|
Sign up to set email alerts
|

A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks

Abstract: Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 43 publications
0
9
0
Order By: Relevance
“…This method extends the original sequence database of anonymous datasets. It adopts specific generalization and avoidance principles to gradually hide privacy-sensitive rules and resist reasoning attacks [10]. There is also someone in conjunction with other technologies for privacy protection research.…”
Section: Research Statusmentioning
confidence: 99%
See 1 more Smart Citation
“…This method extends the original sequence database of anonymous datasets. It adopts specific generalization and avoidance principles to gradually hide privacy-sensitive rules and resist reasoning attacks [10]. There is also someone in conjunction with other technologies for privacy protection research.…”
Section: Research Statusmentioning
confidence: 99%
“…Incomes(R) is the expected value of the income when the system adopts the deny access policy. Informef(G)> Incomef(E) can be derived from (9) and (10). That is, regardless of the probability of a good-faith visit of the visitor, the visitor's good-faith access behaviour will have a greater expected total return value than a malicious visit.…”
Section: Game Theory Analysismentioning
confidence: 99%
“…A cloaking region needs to contain a user's current position and also encloses other locations in which the user could be located. Most of the approaches [2][3][4][5][6][7][8][9][10][11] are based on a trusted third party, called the anonymizer, which is responsible for selecting these additional locations depending on what type of protection a user is demanding. Other techniques such as [12][13][14][15][16] assume that the same users, collaborating with other peers, can compute their own cloaking regions.…”
Section: Introductionmentioning
confidence: 99%
“…(2) if SF(C N ) ≥ θ max then (3) repeat (4) l ⟵ a user from U with the largest θ. If many, chooses the one with the largest K, (K l ); (5) CR l ⟵ C N ; (6) repeat (7) E max ⟵ 0; (8) i ⟵ 0; (9) for i < m do (10) c ⟵ from CR l \ c l with a probability ∝ cell's occupancy; (11) if…”
mentioning
confidence: 99%
“…In document (Liu, Bai, Wang, & Li, 2016), to protect user identity and location information, Central anonymous serve not only uses information perturbation strategy and space-time location anonymity algorithm, but also considers the balance between QoS and CR. In (Zhang, Wu, Chen, & Chen, 2017), a spatio-temporal anonymity algorithm is proposed to protect users' location privacy by using k-anonymity and pseudo-identity anonymity. In (Wang, Huang, Qin, Wang, & Wu, 2017), a weighted k-anonymity algorithm for adjacency graphs is proposed; this algorithm can not only protect the privacy of the user's location, but also reduce bandwidth.…”
Section: Introductionmentioning
confidence: 99%