pisco_log
banner

Anonymous Set Construction Scheme for Protecting Sensitive Semantics in Road Network Environment

Chunru Wang

Abstract


Aiming at the problems that previous anonymous set construction schemes fail to resist semantic inference attacks and fail to reflect
personalized anonymity, we propose an anonymous set construction scheme to protect sensitive semantics in road network environment. In
this scheme, users can specify their own sensitive semantic types, which reflects personalized anonymity and provides a semantic security
quantitative standard for the protection of sensitive semantics. The anonymization set generated by this scheme not only satisfies ?-semantic
security, thus reducing the probability of the attacker inferring the users sensitive semantics and avoiding semantic inference attacks; it also
realizes k-anonymity and l-section diversity, which protects the users identity while resisting section diversity attacks. Finally, simulation experiments are conducted to verify that this scheme has a high degree of privacy protection.

Keywords


Road network environment; Location privacy protection; Sensitive semantics; Personalized anonymity

Full Text:

PDF

Included Database


References


[1] Ye A, Li Y, Xu L, et al. A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based

Services[C]// A Trajectory Privacy-preserving Algorithm Based on Road Networks in Continuous Location-based Services. IEEE Computer Society, 2017.

[2] Wang Y, Xia Y, Hou J, et al. A fast privacy-preserving framework for continuous location-based queries in road networks[J]. Journal of

Network & Computer Applications, 2015, 53(C):57-73.

[3] Huo Zheng, Wang Weihong, Cao Yuhui. PTDC: A privacy-aware trajectory data collection technique in road network environment[J].

Computer Applications, 2017, 37(09):2567-2571+2616.

[4] H. Chen, S.L. Qin. Location semantics-based location privacy protection for road network[J]. Journal of Communication, 2016,

37(8):67-76.

[5] Pan Xiao, Xiao Zhen, Meng Xiaofeng. A review of location privacy research[J]. Computer Science and Exploration, 2007, 1(3): 268-281.

[6] Wang Jie, Wang Chunru, Ma Jianfeng, et al. False location selection algorithm based on location semantics and query probability[J].

Journal of Communication, 2020(3):53-61.




DOI: http://dx.doi.org/10.70711/frim.v3i6.6679

Refbacks

  • There are currently no refbacks.