2021
DOI: 10.1109/access.2021.3071407
|View full text |Cite
|
Sign up to set email alerts
|

Semantic and Trade-Off Aware Location Privacy Protection in Road Networks Via Improved Multi-Objective Particle Swarm Optimization

Abstract: Location privacy protection is an essential but challenging topic in the field of network security. Although the existing research methods, such as k -anonymity, mix zone, and differential privacy, show significant success, they usually neglect the location semantic and the proper trade-off between privacy and utility, which may allow attackers to obtain user privacy information by revealing the semantic correlation between the anonymous region and user's real location, thus causing privacy leakage. To solve t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 45 publications
0
17
0
Order By: Relevance
“…An implementation of location perturbation is to blur the actual location into an area. For example, Tian et al [13] investigate the problem of privately releasing location data in an online manner. Given an actual location at some time instant, the authors blur the location into an area containing other k − 1 locations, which have similar geographical and semantic utility with the actual location.…”
Section: Location Perturbationmentioning
confidence: 99%
See 2 more Smart Citations
“…An implementation of location perturbation is to blur the actual location into an area. For example, Tian et al [13] investigate the problem of privately releasing location data in an online manner. Given an actual location at some time instant, the authors blur the location into an area containing other k − 1 locations, which have similar geographical and semantic utility with the actual location.…”
Section: Location Perturbationmentioning
confidence: 99%
“…It is the negative of the greatest of all the distances from points in one set to the closest point in the other set. Equation (13) presents the definition of negative Hausdorff distance between the actual dataset D A and obfuscated D O :…”
Section: Geographic Utility Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Then another author proposed a novel method of location privacy protection based on geographic semantics while satisfying k-anonymity [11], in which the candidate set was constructed by using the maximum and minimum distance multi-centers clustering algorithm, and the virtual location result set was generated according to its semantic similarity. the authors of [12] constructed a semantic and trade-off aware location privacy protection mechanism (STA-LPPM), in which the multi-objective particle swarm optimization (MOPSO) algorithm was used to generate the optimal anonymous set to achieve the balance between privacy protection and quality of service. A blockchain-enabled framework for P2P energy trading was designed in [13], and an Anonymous Proof of Location algorithm is proposed that allows clients to choose their trading partners without revealing their real location.…”
Section: Related Workmentioning
confidence: 99%
“…Crowdsensing is a new mobile sensing computing paradigm that extends current wireless sensing networks for mobile networks and the Internet of Things [1,2]. At the same time, crowdsensing is very important to protect the privacy of user activity information during the extension of wireless sensing networks.…”
Section: Introductionmentioning
confidence: 99%