Abstract

The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of location privacy. Besides the single-location privacy, trajectory privacy is another important type for location privacy leakage. In this paper, focusing on the trajectory privacy preservation in MSNs, we propose a privacy preservation scheme based on the radius-constrained dummy trajectory (RcDT) in MSNs. Particularly, by constraining the generated circular range with radius R for the location where a user sends LBS requests, we present the radius-constrained dummy location (RcDL) algorithm to generate the dummy location set of the user's real location. Furthermore, based on the generated dummy locations, we put forward the RcDT algorithm to generate the dummy trajectory set that has higher similarity to the real trajectory comprehensively considering the constraints of both the single-location exposure risk and trajectory exposure risk. Thus, the user's trajectory privacy preservation in MSNs is enhanced since the possibility of identifying users' real trajectories and malicious attacks are reduced. The simulation results demonstrate that our RcDT scheme can have better performance and privacy degree than the existing methods.

Highlights

  • The proliferation of mobile devices furnished with abundant location-based services (LBSs) has made the location-aware applications increasingly extensive [1]–[3]

  • In order to further solve the problems of single location protection and trajectory privacy preservation in mobile social network (MSN), in this paper, we present a privacy preserving scheme based on Radius-constrained (R-constrained for short thereafter) dummy trajectory (RcDT) in MSNs

  • We propose a privacy preserving method based on R-constrained dummy trajectory (RcDT) in MSNs

Read more

Summary

INTRODUCTION

The proliferation of mobile devices furnished with abundant location-based services (LBSs) has made the location-aware applications increasingly extensive [1]–[3]. In order to further solve the problems of single location protection and trajectory privacy preservation in MSNs, in this paper, we present a privacy preserving scheme based on Radius-constrained (R-constrained for short thereafter) dummy trajectory (RcDT) in MSNs. Around each user’s real location point, the user randomly sends queries to generate a location within a specific circular range with radius R, namely a dummy location. It is noted that single location privacy protection may generally focus on timeliness, while the trajectory privacy protection does not pay attention to real-time performance which instead highlights users’ background knowledge. 1) We propose a R-constraint dummy trajectory privacy preservation scheme (RcDT) in MSNs. We first present the R-constrained dummy location (RcDL) algorithm to generate the set of dummy locations of a user’s real location.

RELATED WORK
PRELIMINARIES In this section, we give the preliminary knowledge of our RcDT scheme needed
RELEVANT DEFINITIONS
SYSTEM MODEL AND DESIGN MOTIVATION
THE OVERALL PROCEDURE OF RCDT
ALGORITHM DESIGN
18: Goto step 5
ALGORITHM EXPLICATION
EXPERIMENTS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.