Next Article in Journal
A Knowledge-Driven Geospatially Enabled Framework for Geological Big Data
Previous Article in Journal
Management System for Dam-Break Hazard Mapping in a Complex Basin Environment
Previous Article in Special Issue
Camera Coverage Estimation Based on Multistage Grid Subdivision
Article

Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

by 1,2, 1,2,3,4,*, 1,2, 1,2 and 1,2,3
1
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2
Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China
3
College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
4
Institute of Computer Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
Academic Editors: Chi-Hua Chen, Kuen-Rong Lo and Wolfgang Kainz
ISPRS Int. J. Geo-Inf. 2017, 6(6), 163; https://0-doi-org.brum.beds.ac.uk/10.3390/ijgi6060163
Received: 9 December 2016 / Revised: 24 May 2017 / Accepted: 30 May 2017 / Published: 1 June 2017
(This article belongs to the Special Issue Applications of Internet of Things)
Currently, although prevalent location privacy methods based on k-anonymizing spatial regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS), users cannot obtain accurate query results. To address this problem, it proposes a new location privacy-preserving k-anonymity method based on the credible chain with two major features. First, the optimal k value for the current user is determined according to the user’s environment and social attributes. Second, rather than forming an anonymizing spatial region (ASR), the trusted third party (TTP) generates a fake trajectory that contains k location nodes based on properties of the credible chain. In addition, location-based services (LBS) queries are conducted based on the trajectory, and privacy level is evaluated by instancing θ privacy. Simulation results and experimental analysis demonstrate the effectiveness and availability of the proposed method. Compared with methods based on ASR, the proposed method guarantees 100% QoS. View Full-Text
Keywords: k-anonymity; location-based services; location privacy; the credible chain k-anonymity; location-based services; location privacy; the credible chain
Show Figures

Figure 1

MDPI and ACS Style

Wang, H.; Huang, H.; Qin, Y.; Wang, Y.; Wu, M. Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain. ISPRS Int. J. Geo-Inf. 2017, 6, 163. https://0-doi-org.brum.beds.ac.uk/10.3390/ijgi6060163

AMA Style

Wang H, Huang H, Qin Y, Wang Y, Wu M. Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain. ISPRS International Journal of Geo-Information. 2017; 6(6):163. https://0-doi-org.brum.beds.ac.uk/10.3390/ijgi6060163

Chicago/Turabian Style

Wang, Hui, Haiping Huang, Yuxiang Qin, Yunqi Wang, and Min Wu. 2017. "Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain" ISPRS International Journal of Geo-Information 6, no. 6: 163. https://0-doi-org.brum.beds.ac.uk/10.3390/ijgi6060163

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop