Browse > Article
http://dx.doi.org/10.3745/KTCCS.2021.10.8.231

Efficient k-ATY Method to Protect the User's Trajectory in Continuous Queries  

Song, Doo Hee (서울한영대학교 교양학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.10, no.8, 2021 , pp. 231-234 More about this Journal
Abstract
Various problems arise as applications using locations increase. In order to solve this problem, related works are being conducted to protect the location of users. A fundamental reason for this problem is that users must provide their location information to the service provider (server) to receive the service. To improve these problems, there are works such as generating cloaking regions or generating dummies around them. However, if a user periodically asks the server for queries, the user's trajectory may be exposed by time zone. To improve this problem, in this paper, we propose a k-Anonymity Trajectory (k-ATY) technique that can improve the exposure probability of the trajectory even if the user requests continuous queries. Experimental results demonstrated the superiority of the proposed technique.
Keywords
Continuous Queries; Information Protection; Trajectory; k-anonymity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Allard, G. Hebrail, F. Masseglia, and E. Pacitti, "A new privacy-preserving solution for clustering massively distributed personal times-series," in International Conference on Data Engineering, pp.1370-1373, 2016.
2 R. Yu, Z. Bai, L. Yang, P. Wang, O. A. Move, and Y. Liu, "A location cloaking algorithm based on combinatorial optimization for location-based services in 5G networks," IEEE Access, Vol.4, pp.6515-6527, 2016.   DOI
3 M. H. Afifi, K. Zhou, and J. Ren, "Privacy characterization and quantification in data publishing," IEEE Transactions on Knowledge and Data Engineering, Vol.30, No.9, pp.1756-1769, 2018.   DOI
4 H. Liu, X. Li, H. Li, J. Ma, and X. Ma, "Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services," in IEEE Conference on Computer Communications, pp.1-9, 2017.
5 D. Liao, H. Li, G. Sun, and V. Anand, "Protecting user trajectory in location-based services," IEEE Global Communications Conference, 2015.
6 J. Youn, D. Song, T. Cai, and K. Park, "Grid-based Trajectory cloaking method for protecting trajectory privacy in location-based services," Korean Society for Internet Information, Vol.18, No.5, pp.1-6, 2017.
7 B. Niu, Z. Zhang, X. Li, and H. Li, "Privacy-area aware dummy generation algorithms for location-based services," in IEEE International Conference on Communications, pp.957-962, 2014.
8 D. Song, M. Song, and K. Park, "A privacy-preserving spatial index for spatial query processing," Wireless Communications and Mobile Computing, pp.1-10, 2018.
9 C. Y. Chow and M. F. Mokbel, "Trajectory privacyin locationbased services and data publication," ACM SIGKDD Explorations Newsletter, Vol.13, No.1, pp.19-29, 2011.   DOI
10 D. Wu, Y. Zhang, and Y. Liu, "Dummy location selection scheme for k-anonymity in location based services," in IEEE Trustcom/BigDataSE/ICESS, pp.441-448, 2017.