• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A Trajectory Substitution Privacy Protection Scheme in location-based services

Vol. 13, No. 9, September 29, 2019
10.3837/tiis.2019.09.024, Download Paper (Free):

Abstract

Aimed at the disclosure risk of mobile terminal user’s location privacy in location-based services, a location-privacy protection scheme based on similar trajectory substitution is proposed. On the basis of the anonymized identities of users and candidates who request LBS, this scheme adopts trajectory similarity function to select the candidate whose trajectory is the most similar to user’s at certain time intervals, then the selected candidate substitutes user to send LBS request, so as to protect user’s privacy like identity, query and trajectory. Security analyses prove that this scheme is able to guarantee such security features as anonymity, non-forgeability, resistance to continuous query tracing attack and wiretapping attack. And the results of simulation experiment demonstrate that this scheme remarkably improve the optimal candidate’ trajectory similarity and selection efficiency.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
C. Song, Y. Zhang, X. Gu, L. Wang, Z. Liu, "A Trajectory Substitution Privacy Protection Scheme in location-based services," KSII Transactions on Internet and Information Systems, vol. 13, no. 9, pp. 4771-4787, 2019. DOI: 10.3837/tiis.2019.09.024.

[ACM Style]
Cheng Song, Yadong Zhang, Xinan Gu, Lei Wang, and Zhizhong Liu. 2019. A Trajectory Substitution Privacy Protection Scheme in location-based services. KSII Transactions on Internet and Information Systems, 13, 9, (2019), 4771-4787. DOI: 10.3837/tiis.2019.09.024.

[BibTeX Style]
@article{tiis:22222, title="A Trajectory Substitution Privacy Protection Scheme in location-based services", author="Cheng Song and Yadong Zhang and Xinan Gu and Lei Wang and Zhizhong Liu and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2019.09.024}, volume={13}, number={9}, year="2019", month={September}, pages={4771-4787}}