Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.4.679

A Proposal of Privacy Protection Method for Location Information to Utilize 5G-Based High-Precision Positioning Big Data  

Lee, Donghyeok (Science Tech. Soc. Research Center, Jeju National University)
Park, Namje (Dept. Conv. Info. Secu., Graduate School, Jeju National University)
Abstract
In the future, 5G technology will become the core infrastructure driving the 4th industrial era. For intelligent super-convergence service, it will be necessary to collect various personal information such as location data. If a person's high-precision location information is exposed by a malicious person, it can be a serious privacy risk. In the past, various approaches have been researched through encryption and obfuscation to protect location information privacy. In this paper, we proposed a new technique that enables statistical query and data analysis without exposing location information. The proposed method does not allow the original to be re-identified through polynomial-based transform processing. In addition, since the quality of the original data is not compromised, the usability of positioning big data can be maximized.
Keywords
Location Information; Location Privacy; Privacy Protection; High-Precision; Big Data;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Hara, Takahiro, et al., "Dummy-based user location anonymization under real-world constraints", IEEE Access, vol.4, pp.673-687, Feb. 2016.   DOI
2 Ardagna, Claudio A., et al., "An obfuscation-based approach for protecting location privacy", IEEE Transactions on Dependable and Secure Computing, vol.8, no.1, pp.13-27, Jun. 2009.   DOI
3 Ardagna, Claudio Agostino, et al., "Location privacy protection through obfuscation-based techniques", IFIP Annual Conference on Data and Applications Security and Privacy, Springer, Berlin, Heidelberg, pp.47-60, Jul. 2007.
4 Gutscher, Andreas., "Coordinate transformation -a solution for the privacy problem of location based services?", Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, IEEE, pp.7-13, Apr. 2006.
5 Donghyeok Lee, Namje Park, "A Study on Metering Data De-identification Method for Smart Grid Privacy Protection", Journal of the Korea Institute of Information Security & Cryptology, 26(6), pp.1593-1603, Dec. 2016.   DOI
6 Namje Park, "Implementation of terminal middleware platform for mobile RFID computing", International Journal of Ad Hoc and Ubiquitous Computing, vol.8, no.4, pp.205-219, Jan. 2011.   DOI
7 Xiao, Yonghui, and Li Xiong., "Protecting locations with differential privacy under temporal correlations", Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1298-1309, Oct. 2015.
8 Jinsu Kim, Namje Park, "A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems", Symmetry, vol.12, no.6, pp.891, Jun. 2020. doi:10.3390/sym12060891.   DOI
9 Chen, Shu, and Hong Shen., "Semantic-aware dummy selection for location privacy preservation", 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, pp. 752-759, Aug. 2016.
10 Namje Park and Namhi Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle", Journal of Sensors (Basel), vol.16, no.1, pp.1-16, Dec. 2015.   DOI
11 Jinsu Kim, Namje Park, "Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing", Personal and Ubiquitous Computing, pp. 1-9, Aug. 2019. https://doi.org/10.1007/s00779-019-01299-w.
12 Soma, Subarna Chowdhury, et al., "Trip planning queries with location privacy in spatial databases", World Wide Web, vol.20, no.2, pp.205-236, Mar. 2017.   DOI
13 Namje Park, Byung-Gyu Kim, Jinsu Kim, "A Mechanism of Masking Identification Information regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission", Electronics, vol.8, no.7, pp.735, Jun. 2019.   DOI
14 Donghyeok Lee, Namje Park, Geonwoo Kim, Seunghun Jin, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment", Journal of Peer-to-Peer Networking and Applications, Vol.11, No.6, pp.1299-1308, Nov. 2018.   DOI
15 Seoyeon Yoon, "Traffic data use and location information protection", Planning and Policy, 405, pp.12-17, Jul. 2015.
16 Namje Park, Marie Kim, "Implementation of load management application system using smart grid privacy policy in energy management service environment", Cluster Computing, vol.17, no.3, pp. 653-664, Sep. 2014.   DOI
17 Jinsu Kim, Namje Park, Geonwoo Kim, Seunghun Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving- Transformation in the Emerging Multimedia", Electronics, vol.8, no.4, pp.412, Apr. 2019.   DOI
18 Namje Park, Donghyeok Lee, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment", Personal and Ubiquitous Computing, vol. 22, no.1, pp.3-10, Feb. 2018.   DOI
19 Donghyeok Lee, and Namje Park, "Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance", The Journal of Supercomputing, vol.73, no.3, pp.1103-1118, Jan. 2017.   DOI
20 Chen, Pei, et al., "Preserving location and content privacy for secure ranked queries in location based services", 2016 IEEE Trustcom/BigDataSE/ISPA., IEEE, Aug. 2016.
21 Jongcheol Shin, "Direction of Privacy Policy to Revitalize the Data Industry", Planning and Policy, 451, pp.5-12, May. 2019.
22 Namje Park, Hongxin Hu, Qun Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)", International Journal of Distributed Sensor Networks, vol.2016, Jan. 2016.
23 Donghyeok Lee, Namje Park, "Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree", Multimedia Tools and Applications, pp.1-18, Mar. 2020, https://doi.org/10.1007/s11042-020-08776-y.
24 Namje Park, Hyo‐Chan Bang, "Mobile middleware platform for secure vessel traffic system in IoT service environment", Security and Communication Networks, vol.9, no.6, pp. 500-512, Apr. 2016.   DOI
25 Kido, Hidetoshi, Yutaka Yanagisawa, and Tetsuji Satoh., "An anonymous communication technique using dummies for location-based services", ICPS'05. Proceedings., pp.88-97, Jul. 2005.
26 Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment", LNCS, Advanced Web and Network Technologies and Applications, vol.3842, pp. 741-48, Jan. 2006.
27 Liu, Bo, et al., "Location privacy and its applications: A systematic study", IEEE Access, vol.6, pp.17606-17624. Apr. 2018.   DOI
28 Woo, Dae Sik, "A Study on a Rational Improvement Plan of Location Information Act for Securing Safety of the People", The Journal of Police Science, 18(2), pp.71-95, Jun. 2018.
29 Mascetti, Sergio, et al. "Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies", The VLDB Journal, vol.20, no.4, pp.541-566, Aug. 2011.   DOI
30 Chen, Pei, et al., "Preserving location and content privacy for secure ranked queries in location based services", 2016 IEEE Trustcom/BigDataSE/ISPA., pp.892-899, Aug. 2016
31 You, Tun-Hao, Wen-Chih Peng, and Wang-Chien Lee., "Protecting moving trajectories with dummies", 2007 International Conference on Mobile Data Management, IEEE, pp. 278-282., May. 2007.
32 Lei, Po-Ruey, et al., "Dummy-based schemes for protecting movement trajectories", Journal of Information Science and Engineering, vol.28, no.2, pp.335-350, Mar. 2012.
33 Do, Hyo Jin, et al., "Another dummy generation technique in location- based services", 2016 International Conference on Big Data and Smart Computing (BigComp). IEEE, pp. 532-538, Jan. 2016.