• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Pan Xiao, Hao Xing, and Meng Xiaofeng. Privacy Preserving Towards Continuous Query in Location-Based Services[J]. Journal of Computer Research and Development, 2010, 47(1): 121-129.
Citation: Pan Xiao, Hao Xing, and Meng Xiaofeng. Privacy Preserving Towards Continuous Query in Location-Based Services[J]. Journal of Computer Research and Development, 2010, 47(1): 121-129.

Privacy Preserving Towards Continuous Query in Location-Based Services

More Information
  • Published Date: January 14, 2010
  • With advances in wireless communication and mobile positioning technologies, location-based mobile services have been gaining increasingly popularity in recent years. Privacy preservation, including location privacy and query privacy, has recently received considerable attention for location-based mobile services. A lot of location cloaking approaches have been proposed for protecting the location privacy of mobile users. However, they mostly focus on anonymizing snapshot queries based on proximity of locations at query issued time. Therefore, most of them are ill-suited for continuous queries. In view of the privacy disclosure (including location and query privacy) and poor quality of service under continuous query anonymization, a δp-privacy model and a δq-distortion model are proposed to balance the tradeoff between privacy preserving and quality of service. Meanwhile a temporal distortion model is proposed to measure the location information loss during a time interval, and it is mapped to a temporal similar distance between two queries. Finally, a greedy cloaking algorithm (GCA) is proposed, which is applicable to both anonymizing snapshot queries and continuous queries. Average cloaking success rate, cloaking time, processing time and anonymization cost for successful requests are evaluated with increasing privacy level (k). Experimental results validate the efficiency and effectiveness of the proposed algorithm.
  • Related Articles

    [1]Li Junwei, Liu Quan, Huang Zhigang, Xu Yapeng. A Diversity-Enriched Option-Critic Algorithm with Interest Functions[J]. Journal of Computer Research and Development, 2024, 61(12): 3108-3120. DOI: 10.7544/issn1000-1239.202220970
    [2]Fu Liguo, Pang Janming, Wang Jun, Zhang Jiahao, Yue Feng. Optimization of Library Function Disposing in Dynamic Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(8): 1783-1791. DOI: 10.7544/issn1000-1239.2019.20170871
    [3]Huang Yicai, Zhou Weiwei, Yu Bin. Optimal Suppression Algorithm Against Worm Propagation in Wireless Service System for IoT Based on Target Cost Function[J]. Journal of Computer Research and Development, 2018, 55(11): 2467-2481. DOI: 10.7544/issn1000-1239.2018.20170305
    [4]Zhou Yuhang, Zhou Zhihua. Cost-Sensitive Large Margin Distribution Machine[J]. Journal of Computer Research and Development, 2016, 53(9): 1964-1970. DOI: 10.7544/issn1000-1239.2016.20150436
    [5]Liu Yue, Li Jintao, Hu Songlin. A Cost-Based Splitting Policy Search Algorithm for Hive Multi-Dimensional Index[J]. Journal of Computer Research and Development, 2016, 53(4): 798-810. DOI: 10.7544/issn1000-1239.2016.20151163
    [6]Liu Xianmin, Li Jianzhong. Discovering Extended Conditional Functional Dependencies[J]. Journal of Computer Research and Development, 2015, 52(1): 130-140. DOI: 10.7544/issn1000-1239.2015.20130691
    [7]Lu Min, Huang Yalou, Xie Maoqiang, Wang Yang, Liu Jie, Liao Zhen. Cost-Sensitive Listwise Ranking Approach[J]. Journal of Computer Research and Development, 2012, 49(8): 1738-1746.
    [8]Zhou Ling, Wang Jianxin. Path Nodes-Driven Least-Cost Shortest Path Tree Algorithm[J]. Journal of Computer Research and Development, 2011, 48(5): 721-728.
    [9]Qi Yutao, Liu Fang, and Jiao Licheng. A Pheromone Meme Based Immune Clonal Selection Algorithm for Function Optimization[J]. Journal of Computer Research and Development, 2008, 45(6).
    [10]Li Tao and Yang Yulu. Algorithms of Reconfigurable Resource Management and Hardware Task Placement[J]. Journal of Computer Research and Development, 2008, 45(2): 375-382.

Catalog

    Article views (936) PDF downloads (635) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return