Education, Science, Technology, Innovation and Life
Open Access
Sign In

A Method for Generating Dummy Location Based on Spatiotemporal Correlation

Download as PDF

DOI: 10.23977/jeis.2024.090303 | Downloads: 18 | Views: 924

Author(s)

Tingting Gao 1, Jiaxiang Gao 1, Yiwei Liao 1, Shenglin Wang 1

Affiliation(s)

1 Institute of Computer Science and Information Engineering, Harbin Normal University, Harbin, 150025, China

Corresponding Author

Tingting Gao

ABSTRACT

To improve the concealment of the dummy location generated by the dummy location generation algorithm in location privacy and enhance the ability to resist the attacker to deduce the user's real location based on background knowledge, this paper proposes a dummy location generation method based on spatiotemporal correlation. Firstly, the historical query probability is used to preliminarily screen and select the appropriate dummy location set, and then the spurious location set is filtered and optimized by adding the relevant definition of spatial sensitivity metric, and the dummy location with higher concealment is filtered and generated. Then, through theoretical analysis and demonstration, it is verified that the algorithm can effectively resist the attacker's background knowledge inference attack, to improve the concealment of the dummy location. Finally, the future research directions of the dummy location generation method are summarized and prospected.

KEYWORDS

Location Privacy; Privacy Protection Methods; Spatiotemporal Correlation; Dummy Location

CITE THIS PAPER

Tingting Gao, Jiaxiang Gao, Yiwei Liao, Shenglin Wang, A Method for Generating Dummy Location Based on Spatiotemporal Correlation. Journal of Electronics and Information Science (2024) Vol. 9: 14-18. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2024.090303.

REFERENCES

[1] Xiong Jinbo, Bi Renwan, Tian Youliang, et al. Mobile swarm intelligence for sensing security and privacy:models, progress and trends[J]. Journal of Computing. 2021, 44(9):1949-1966. 
[2] Li Weihao, Cao Jin, Li Hui, A privacy protection scheme based on location service privacy self-association[J]. Journal of Communication, 2019, 40(5):57-66. 
[3] Pan Xiao, Hao Xing, Meng Xiaofeng, Research on continuous query privacy protection in location-based services[J]. Computer Research and Development, 2010, 47(1):121-129. 
[4] Xing Ling, Jia Xiaofan, Zhao Pengcheng, et al. A matrix encryption based privacy protection method for UAV swarm location[J]. Journal of Aeronautics, 2022, 43(8):325386-325388. 
[5] Jiang Haiyang, Zeng Jianqiu, Han Ke, et al. Research on location privacy protection method for mobile users in 5G environment[J]. Journal of Beijing Institute of Technology, 2021, 41(1):84-92. 
[6] Jiao Zexin, Zhang Lin, Liu Xiping. A fine-grained vacation location selection algorithm with differentiated time periods[J]. Journal of Nanjing University of Posts and Telecommunications: Natural Science Edition, 2022, 42(6):106-114. 
[7] Jie Wang, Chunru Wang, Jianfeng Ma, et al. False location selection algorithm based on location semantics and query probability[J]. Journal of Communication, 2020, 41(3):53-61. 
[8] Liang Huichao, Wang Bin, Cui Ningning, et al. Privacy-preserving approach for point-of-interest queries in road network environment[J]. Journal of Software, 2017, 29(3):703-720.

Downloads: 12710
Visits: 493441

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.