Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Information  /  Vol: 10 Par: 4 (2019)  /  Artículo
ARTÍCULO
TITULO

Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints

Mulugeta Kassaw Tefera and Xiaolong Yang    

Resumen

The wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locations associated with different pseudonyms, which come at a cost either in terms of resource consumption or quality of service, or both. However, we observed that the effect of resource consumption has not been discussed in existing studies. In this paper, we present the user-centric LPPMs against location inference attacks under the consideration of both service quality and energy constraints. Moreover, we modeled the precision-based and dummy-based mechanisms in the context of an existing LPPM framework, and also extended the linear program solutions applicable to them. This study allowed us to specify the LPPMs that decreased the precision of exposed locations or generated dummy locations of the users. Based on this, we evaluated the privacy protection effects of optimal location obfuscation function against an adversary?s inference attack function using real mobility datasets. The results indicate that dummy-based mechanisms provide better achievable location privacy under a given combination of service quality and energy constraints, and once a certain level of privacy is reached, both the precision-based and dummy-based mechanisms only perturb the exposed locations. The evaluation results also contribute to a better understanding for the LPPM design strategies and evaluation mechanism as far as the system resource utilization and service quality requirements are concerned.

 Artículos similares

       
 
Kavitha Srinivasan, Sainath Prasanna, Rohit Midha, Shraddhaa Mohan     Pág. 1 - 20
Advances have been made in the field of Machine Learning showing that it is an effective tool that can be used for solving real world problems. This success is hugely attributed to the availability of accessible data which is not the case for many fields... ver más

 
Lingtong Min, Jiawei Li, Yixin He and Weiguang Wang    
This paper investigates the secure rate-splitting multiple access (RSMA) cooperation for the maritime cognitive unmanned aerial vehicle (UAV) network. Specifically, we first take into account the primary privacy information and the secondary maritime UAV... ver más

 
Nahla El-Haggar, Lobna Amouri, Albandari Alsumayt, Fatemah H. Alghamedy and Sumayh S. Aljameel    
The progress made in Information and Communication Technologies (ICT) has played a crucial role in turning the Internet of Things (IoT) into a reality. IoT is an emerging technology that refers to networks of interconnected and Internet-enabled objects e... ver más
Revista: Applied Sciences

 
Junxin Huang, Yuchuan Luo, Ming Xu, Bowen Hu and Jian Long    
Online ride-hailing (ORH) services allow people to enjoy on-demand transportation services through their mobile devices in a short responding time. Despite the great convenience, users need to submit their location information to the ORH service provider... ver más
Revista: Applied Sciences

 
Zhenpeng Liu, Qiannan Liu, Jianhang Wei, Dewei Miao and Jingyi Wang    
With the rapid development of the Internet of Things, location-based services have emerged in many social and business fields. In obtaining the service, the user needs to transmit the query data to an untrusted location service provider for query and the... ver más
Revista: Information