J4 ›› 2013, Vol. 48 ›› Issue (7): 56-61.

• Articles • Previous Articles     Next Articles

The location privacy protection method with dispersed sub cloaking region

ZHAO Ze-mao1, LI Lin1, ZHANG Fan1,2, ZHANG Pin1, ZHOU Jian-qin1, WANG Jia-bo1   

  • Received:2013-06-28 Published:2013-12-03

Abstract:

In view of traditional anonymous scheme exists imprecise query results and communication overhead defect, a new kind of location anonymity scheme is proposed, and the privacy measurement method based on entropy for the anonymous model is put forward. Compared with the traditional anonymous scheme, this one divides single cloaking region into several sub cloaking regions, and replace the users′ real position with the central location of sub cloaking region which the users belong to, then initiate a query from LBS server. This scheme can ensure users to protect their own privacy and achieve accurate query results relatively. Theorectical analysis shows that the scheme can minimize the communication traffic between anonymous device and LBS server, and improve the quality of query service. In the spare user scenario, the superiority of the scheme is more obvious.

Key words: privacy protection; location-based service; K-anonymity; sub cloaking region; entropy

CLC Number: 

  • TP311
[1] QI Li-li, SUN Jing-yu*, CHEN Jun-jie. Mean model based IBCF algorithm [J]. J4, 2013, 48(11): 105-110.
[2] SHU Guo-Gong, DAN Bing, GENG Xiao-Na. A clustering algorithm based on feature point selection [J]. J4, 2009, 44(9): 40-42.
[3] . Research on QoSbased Web service discovery [J]. J4, 2009, 44(7): 89-91.
[4] RAO Xu-li1, ZHANG Mei-ping2, XU Li2. The RFID card reader system design based on Zigbee technology [J]. J4, 2013, 48(7): 62-67.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!