A Temporal Caching-Aware Dummy Selection Location Algorithm
Mu, Xuejiao, Shen, Hong, and Lu, Zhigang (2019) A Temporal Caching-Aware Dummy Selection Location Algorithm. In: Proceedngs of the 20th International Conference on Parallel and Distributed Computing, Applications and Technologies. pp. 501-504. From: PDCAT 2019: 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, 5-7 December 2019, Gold Coast, QLD, Australia.
PDF (Published Version)
- Published Version
Restricted to Repository staff only |
Abstract
Along with the increased convenience of our daily life thanks to the proliferation of location-based service (LBS), such as finding restaurants and booking taxi, concerns on privacy disclosure risks in sharing our locations with LBS have also increased and become a major bottleneck that obstacles the widespread of adoption of LBS [1]. To preserve privacy in LBS, k-anonymity was applied to conceal people's sensitive information against re-identification attacks [2]. Unfortunately, the k-anonymity technique relies on predefined background knowledge of an adversary. Once the adversary has different auxiliary information, we cannot guarantee any privacy preservation against such an adversary. To address the privacy leakage problem of the naive k-anonymity, a combination of k-anonymity and location's query frequency algorithm, the Caching-aware Dummy Selection Algorithm (CaDSA), were proposed [3]. CaDSA anonymises locations in a given area by grouping them with similar query frequency during a fixed time period, say one day. However, considering in the real-life situation location's query frequency often varies in different time slots even in a single day, privacy will clearly lose if we roughly group locations according to a fixed time period as CaDSA. Consequently, in this paper, we propose a Temporal Caching-aware Dummy Location Selection Algorithm (T-CaDLSA) that considers the differences among location's query frequencies over different time slots within a given time period (day). Both mathematical and experimental evaluations show that to achieve the same data utility, our method outperforms the existing work in privacy guarantee.
Item ID: | 77410 |
---|---|
Item Type: | Conference Item (Research - E1) |
ISBN: | 978-1-7281-2616-6 |
Copyright Information: | © 2019 IEEE |
Date Deposited: | 25 Mar 2024 01:12 |
FoR Codes: | 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460402 Data and information privacy @ 100% |
SEO Codes: | 22 INFORMATION AND COMMUNICATION SERVICES > 2204 Information systems, technologies and services > 220405 Cybersecurity @ 100% |
More Statistics |