Browse > Article
http://dx.doi.org/10.7472/jksii.2014.15.6.09

AMV: A k-anonymization technique minimizing the cloaking region  

Song, Doohee (Department of Information & Communication Engineering, Wonkwang University)
Heo, Minjae (Department of Information & Communication Engineering, Wonkwang University)
Sim, Jongwon (Department of Information & Communication Engineering, Wonkwang University)
Hwang, Sori (Department of Information & Communication Engineering, Wonkwang University)
Song, Moonbae (Mobile Communication Business, Samsung Electronics)
Park, Kwangjin (Department of Information & Communication Engineering, Wonkwang University)
Publication Information
Journal of Internet Computing and Services / v.15, no.6, 2014 , pp. 9-14 More about this Journal
Abstract
In this paper, we propose AMV scheme which supports k-anonymization by using vectors for mobile clients. AMV can produces the minimal cloaking area using motion vector information of users (clients). The main reason for minimizing cloaking area is a server has to send the object information to all users who request the spatial queries. The experimental results show that the proposed AMV has superior performance over existing methods.
Keywords
cloaking; k-anonymization; location based service; spatial data; privacy;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 K. Park, "Efficient Data Access for Location-dependent Spatial Queries", Journal of Computer Science and Technology, Springer, vol. 29, no. 3, pp. 449-469, 2014.   DOI
2 D. Song and K. Park, "An Efficient Adaptive Bitmap-based Selective Tuning Scheme for Spatial Queries in Broadcast Environments", Journal of KSII Transactions on Internet and Information Systems, vol. 5, no. 10, pp. 1862-1878, 2011.   과학기술학회마을   DOI
3 C. -G. Park, J. -J. Kim, K. -J. Han, "Efficient POI Search for Location-based Services in Road Networks", Journal of Computing Science and Engineering, vol. 40, no. 2, pp.141-151, 2013.
4 H. Sim, "LBS Description Element and Research Trend", Journal of Information Processing Systems, vol. 20. no. 6, pp. 3-12, 2013.
5 M. F. Mokbel, C.-Y. Chow and W. G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy", Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763-774, 2006.
6 J. Kim, A. -R. Lee, Y. -K. Kim, J. -H. Um, J. -W. Chang, "Cloaking Method supporting K-anonymity and L-diversity for Privacy Protection in Location-Based Services", Journal of Korea Spatial Information Society, vol. 10, no. 4, pp.1-10, 2008.   과학기술학회마을
7 J. -Y. Kim, E. -H. Jeong, B. -K. Lee, "A Design of Cloaking Region using Dummy for Privacy Information Protection on Location-Based Services", Journal of Communications and Networks, vol. 36, no. 8, pp. 929-938, 2011.
8 S. Park, J. Bai, S. Park, "An Anonymization Technique of Continuous Query and Query Log for Privacy in Location-Based Services", Journal of Computing Science and Engineering, vol. 38, no. 2, pp. 65-71, 2011.
9 J. Lee, "Hierarchical Clustering-Based Cloaking Algorithm for Location-Based Services", Journal of Korea Information and Communications Society, vol. 8, no. 8, pp. 1155-1160, 2013.
10 S. Park, S. J. Jeong, "An Anonymization Scheme Protecting Querist Identification in Location-based Service with User Profile", Journal of Computing Science and Engineering, vol. 38, no. 4, pp.201-207, 2011.