DOI QR코드

DOI QR Code

개인의 위치를 보호하기 위한 효율적인 더미 생성

Efficient Dummy Generation for Protecting Location Privacy

  • Cai, Tian-Yuan (Department of Information and Communication Engineering, Wonkwang University) ;
  • Song, Doo-Hee (Department of Information and Communication Engineering, Wonkwang University) ;
  • Youn, Ji-Hye (Department of Information and Communication Engineering, Wonkwang University) ;
  • Lee, Won-Gyu (Department of Information and Communication Engineering, Wonkwang University) ;
  • Kim, Yong-Kab (Department of Information and Communication Engineering, Wonkwang University) ;
  • Park, Kwang-Jin (Department of Information and Communication Engineering, Wonkwang University)
  • 투고 : 2016.09.09
  • 심사 : 2016.11.28
  • 발행 : 2016.12.30

초록

위치기반서비스(LBS; location based services)에서 사용자의 위치를 보호하는 연구가 많은 관심을 받아오고 있다. 특히 k-익명화(k-anonymity)를 이용한 연구가 가장 인기 있는 사생활 보호 기법이다. k-익명화란 k-1개의 다른 더미(dummy) 또는 클라이언트를 선택하여 클로킹 영역을 계산하는 기법을 말한다. 질의자는 신뢰할 수 없는 서버 또는 공격자에게 1/k의 확률로 자신의 위치 노출 확률을 줄일 수 있다. 그러나 더미가 사용자 주변에 밀집되어 있거나 질의자가 존재할 수 없는 곳에 더미가 생성된다면 질의자의 위치가 공격자에게 노출될 수 있다. 따라서 본 논문에서 우리는 실제 도로환경을 고려해서 더미를 생성함으로서 사용자의 위치보호를 높일 수 있는 시스템 모델과 알고리즘을 제안한다. 실험 결과를 통하여 제안기법의 우수성을 증명하였다.

The researches protecting user's location in location-based services(LBS) have received much attention. Especially k-anonymity is the most popular privacy preservation method. k-anonymization means that it selects k-1 other dummies or clients to make the cloaking region. This reduced the probability of the query issuer's location being exposed to untrusted parties to 1/k. But query's location may expose to adversary when k-1 dummies are concentrated in query's location or there is dummy in where query can not exist. Therefore, we proposed the dummy system model and algorithm taking the real environment into account to protect user's location privacy. And we proved the efficiency of our method in terms of experiment result.

키워드

참고문헌

  1. K. Park and P. Valduriez, "A Hierarchical Grid Index (HGI), spatial queries in wireless data broadcasting", Distributed and Parallel Databases, vol. 31, no. 3, pp. 413-446, 2013. https://doi.org/10.1007/s10619-013-7121-y
  2. K. Park, "An Efficient Scalable Spatial Data Search for Location-Aware Mobile Services", Information Science and Engineering, vol. 31, no. 1, pp. 165-178, 2015.
  3. D. Song and K. Park, "A partial index for distributed broadcasting in wireless mobile networks", Information sciences, vol. 348, no. 20, pp. 142-152, 2016. https://doi.org/10.1016/j.ins.2016.02.011
  4. A. Lee, S. Son, H. Kim, B. Kim, "Improving Personal Data Protection in IoT Environments", The Journal of Korean Institute of information Security & Cyptology, vol. 26, no. 4, pp. 995-1012, 2016. https://doi.org/10.13089/JKIISC.2016.26.4.995
  5. M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking", in Proceedings of the international conference on Mobile systems, applications and services, pp. 31-42, May, 2003.
  6. X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, "A game-theoretic approach for achieving k-anonymity in location based services", in Proceedings of the IEEE international conference on INFOCOM. pp. 14-19, April, 2013.
  7. D. Song, J. Sim, M. Song, and K. Park, "A Privacy-Preserving Continuous Location Monitoring System for Location-Based Services", Distributed Sensor Networks, vol. 2015, pp. 1-10, 2015.
  8. J. Kim, E. Jeong, and B. Lee, "A design of cloaking region using dummy for privacy information protection on location-based services", The J ournal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 929-938, 2011.
  9. C. -Y. Chow, M. F. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based service", in Proceedings of the ACM international symposium on Advances in geographic information systems, pp. 171-178, March, 2006.
  10. M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy", in Proceedings of the international conference on Pervasive Computing, pp. 1-19, June, 2005.
  11. L. Siksnys, J. R. Thomsen, S. Saltenis, M. L. Yiu, and O. Andersen, "A location privacy aware friend locator", in Proceedings of the international symposium on Spatial and Temporal Databases, pp. 405-410, July, 2009.
  12. F. Olumofin, P. K. Tysowski, I. Goldberg, and U. Hengartner, "Achieving efficient query privacy for location based services", in in Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium, pp. 93-110, July, 2010.
  13. N. Talukder and S. I. Ahamed, "Preventing multi-query attack in location-based services", in proceedings of the ACM international conference on Wireless network security, pp. 25-36, March, 2010.
  14. B. Niu, S. Gao, F. Li, H. Li, and Z. Lu, "Protection of location privacy in continuous LBSs against adversaries with background information", in Proceedings of the International Conference on Computing, Networking and Communications, pp. 1-6, February, 2016.
  15. H. Kido, Y. Yanagisawa and T. Satoh, "An anonymous communication technique using dummies for location-based services", in Proceedings of the international conference on Pervasive Services, pp. 88-97, July, 2005.
  16. H. Zhao, J, Wan and Z. Chen, "A Novel Dummy-Based KNN Query Anonymization Method in Mobile Services", International Journal of Smart Home, vol. 10, no. 6, pp. 137-154, 2016.
  17. B. Niu, Z. Zhang, X. Li, and H. Li, "Privacy-area aware dummy generation algorithms for location-based services", in Proceedings of the IEEE international conference on Communications, pp. 957-962, June, 2014.
  18. Y. H. Gustav, X. Wu, Y. Ren, Y. Wang, and F. Zhang, "Dummy Based Privacy Preservation in Continuous Querying Road Network Services", in Proceedings of the IEEE international conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 94-101, October. 2014.
  19. H. Lu, C. S. Jensen and M. L. Yiu, "Pad: privacy-area aware, dummy-based location privacy in mobile services", in Proceedings of the ACM international workshop on Data Engineering for Wireless and Mobile Access, pp. 16-23, June, 2008.
  20. R. Kato, M. Iwata, T. Hara, A. Suzuki, X. Xie, Y. Arase, and S. Nishio, "A dummy-based anonymization method based on user trajectory with pauses", in Proceedings of the international conference on Advances in Geographic Information Systems, pp. 249-258, November, 2012.
  21. C. Y. Chow and M. F. Mokbel, "Enabling private continuous queries for revealed user locations", in Proceedings of the international symposium on Spatial and Temporal Databases, pp. 258-275, July, 2007.
  22. T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research", Wireless Communications and Mobile Computing, vol. 2, no. 5, pp. 483-502, 2002. https://doi.org/10.1002/wcm.72

피인용 문헌

  1. Efficient dummy generation for considering obstacles and protecting user location pp.15320626, 2019, https://doi.org/10.1002/cpe.5146
  2. 위치기반 서비스에서 위치 프라이버시를 보호하기 위한 효율적인 더미 생성 vol.18, pp.5, 2016, https://doi.org/10.7472/jksii.2017.18.5.23