Efficient location privacy algorithm for Internet of Things (IoT) services and applications

Journal of Network and Computer Applications - Tập 89 - Trang 3-13 - 2017
Gang Sun1,2, Victor Chang3, Muthu Ramachandran4, Zhili Sun5, Gangmin Li6, Hongfang Yu1,2, Dan Liao1
1Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China
2Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China
3Xi’an Jiaotong-Liverpool University, Suzhou, China
4Leeds Beckett University, United Kingdom
5University of Surrey, United Kingdom
6Xi’an Jiaotong Liverpool University, Suzhou, China

Tài liệu tham khảo

Appavoo, P., Chan M., Bhojan A., et al., 2016. Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services. In: Proceedings of the IEEE International Conference on Communication Systems and Networks, pp. 1–8. Aryan A., Singh S., 2010. Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id. In: Proceedings of the International Conference on Computer and Communication Technology, pp. 119–124. Beresford, 2003, Location privacy in pervasive computing, IEEE Pervasive Comput., 2, 46, 10.1109/MPRV.2003.1186725 Bethencourt, 2007, Ciphertext-policy attribute based encryption, IEEE Symp. Secur. Priv., 321 Perera C., McCormick C., Bandara A., et al., 2016. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. arXiv preprint arXiv, 1609.04060. Caron, 2016, The Internet of Things (IoT) and its impact on individual privacy: an Australian perspective, Comput. Law Secur. Rev., 32, 4, 10.1016/j.clsr.2015.12.001 Chang, 2016, Towards achieving Data Security with the Cloud Computing Adoption Framework, IEEE Trans. Serv. Comput., 9, 138, 10.1109/TSC.2015.2491281 Chang, 2016, Cloud computing adoption framework: a security framework for business clouds, Future Gener. Comput. Syst., 57, 24, 10.1016/j.future.2015.09.031 Chow, 2006, A peer-to-peer spatial cloaking algorithm for anonymous location-based service, ACM Adv. Geogr. Inf. Syst., 171 Chow, 2009, Casper: query processing for location services without compromising privacy, ACM Trans. Database Syst., 34, 24, 10.1145/1620585.1620591 Gedik, 2008, Protecting location privacy with personalized k-Anonymity: architecture and algorithms, IEEE Trans. Mob. Comput. (TMC), 7, 1, 10.1109/TMC.2007.1062 González-Manzano, 2016, PAgIoT-Privacy-preserving aggregation protocol for Internet of Things, J. Netw. Comput. Appl., 71, 59, 10.1016/j.jnca.2016.06.001 Ngo, H., Kim, J., 2015. Location privacy via differential private perturbation of cloaking area. In: Proceedings of the IEEE 28th Computer Security Foundations Symposium, pp. 63–74. Henze, 2016, A comprehensive approach to privacy in the cloud-based Internet of Things, Future Gener. Comput. Syst., 56, 701, 10.1016/j.future.2015.09.016 Hossain, A., Jang, S., Chang J., 2012. Privacy-aware cloaking technique in location-based services. In: Proceedings of the IEEE First International Conference on Mobile Services, pp. 9–16. Jin, 2014, An information framework for creating a smart city through Internet of Things, IEEE Internet Things J., 1, 112, 10.1109/JIOT.2013.2296516 Jung, 2013, Privacy preserving cloud data access with multi-authorities, IEEE Infocom, 2625 Kalnis, 2007, Preventing location-based identity inference in anonymous spatial queries, IEEE Trans. Knowl. Data Eng., 19, 1719, 10.1109/TKDE.2007.190662 Lai, 2014, CPAL: a conditional privacy-preserving authentication with access linkability for roaming service, IEEE Internet Things J., 1, 46, 10.1109/JIOT.2014.2306673 Li, 2013, Search me if you can: privacy-preserving location query service, IEEE Infocom, 2760 Liao, 2015, Protecting user trajectory in location-based services, IEEE Globecom, 1 Liao, D., Huang, X., Anand, V., et al., 2016. k-DLCA: An efficient approach for location privacy preservation in location-based services. In: Proceedings of the IEEE International Conference on Communications (ICC), pp. 1–6. Lindenberg, P., Cheng, B., Hsueh, Y., 2015. Novel location privacy protection strategies for location-based services. In: Proceedings of the IEEE Seventh International Conference on Ubiquitous and Future Networks, pp. 866–870. Liu, 2012, Traffic aware multiple mix zone placement for protecting location privacy, IEEE Infocom, 972 Liu, 2013, A game-theoretic approach for achieving k-anonymity in Location Based- Services, IEEE Infocom, 2985 Lu, 2008, PAD: privacy-area aware, dummy based location privacy in mobile services, ACM MobiDE, 16, 10.1145/1626536.1626540 Lu, 2014, PLAM: a privacy preserving framework for local-area mobile social networks, IEEE Infocom, 763 Ma, 2013, Privacy vulnerability of published anonymous mobility traces, IEEE/ACM Trans. Netw., 720, 10.1109/TNET.2012.2208983 Malina, 2016, On perspective of security and privacy-preserving solutions in the Internet of Things, Comput. Netw., 102, 83, 10.1016/j.comnet.2016.03.011 Minch, R., 2015. Location privacy in the Era of the Internet of Things and Big Data analytics. In: Proceedings of the IEEE Hawaii 48th International Conference on System Sciences, pp. 521–1530. Ni, 2016, Location privacy-preserving k nearest neighbor query under user's preference, Knowl. Based Syst., 103, 19, 10.1016/j.knosys.2016.03.016 Niu, B., Zhu, X., Chi, H., Li, H., 2013. 3PLUS: Privacy-preserving pseudo-location updating system in location-based services. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 4564–4569. Niu, 2014, Privacy-area aware dummy generation algorithms for location-based services, IEEE ICC, 957 Niu, 2014, Achieving k-anonymity in privacy -aware location-based services, IEEE Infocom, 754 Niu, 2015, Enhancing privacy through caching in location-based services, IEEE Infocom, 1017 Niu, B., Gao, S., Li, F., et al., 2016. Protection of location privacy in continuous LBSs against adversaries with background information. In: Proceedings of the IEEE International Conference on Computing, Networking and Communications (ICNC), pp. 1–6. Peng, 2017, Collaborative trajectory privacy preserving scheme in location-based services, Inf. Sci., 387, 165, 10.1016/j.ins.2016.08.010 Porambage, 2016, The quest for privacy in the Internet of Things, IEEE Cloud Comput., 3, 36, 10.1109/MCC.2016.28 Premnath, 2015, Security and privacy in the internet-of-things under time-and-budget-limited adversary mode, IEEE Wirel. Commun. Lett., 4, 277, 10.1109/LWC.2015.2408609 Sadeghi, A., Wachsmann, C., Waidner, M., 2015. Security and privacy challenges in industrial Internet of Things. In: Proceedings of the ACM 52nd Annual Design Automation Conference, 54. Serjantov, A., Danezis, G., 2003. Towards an information theoretic metric for anonymity. In: Proceedings of the International Conference on Privacy enhancing technologies, pp. 41–53. Shao, 2014, FINE: a fine-grained privacy-preserving location-based service framework for mobile devices, IEEE Infocom, 244 Sicari, 2015, Security, privacy and trust in Internet of Things: the road ahead, Comput. Netw., 76, 146, 10.1016/j.comnet.2014.11.008 Sun, 2017, ASA: against statistical attacks for privacy-aware users in location based service, Future Gener. Comput. Syst., 70, 48, 10.1016/j.future.2016.06.017 Tang, 2016, Long-term location privacy protection for location-based services in mobile cloud computing, Soft Comput., 20, 1735, 10.1007/s00500-015-1703-8 Vu, 2012, Efficient algorithms for k-anonymous location privacy in participatory sensing, IEEE Infocom Wang, 2012, L2p2: location aware location privacy protection for location-based services, IEEE Infocom, 1996 Weinberg, 2015, Internet of things: convenience vs. privacy and secrecy, Bus. Horiz., 58, 615, 10.1016/j.bushor.2015.06.005 Ye, 2017, A novel location privacy-preserving scheme based on l-queries for continuous LBS, Comput. Commun., 98, 1, 10.1016/j.comcom.2016.06.005 Yi, X., Paulet, R., Bertino, E., 2014. Practical k nearest neighbor queries with location privacy. In: Proceedings of the IEEE 30th International Conference on Data Engineering (ICDE), pp. 640–651. Ying, 2014, Protecting location privacy with clustering anonymization in vehicular networks, IEEE Infocom Workshops, 305 Zhang, 2016, On designing satisfaction ratio aware truthful incentive mechanisms for k-anonymity location privacy, IEEE Trans. Inf. Forensics Secur., 11, 2528, 10.1109/TIFS.2016.2587241 Zhao, 2014, An efficient privacy preserving location based service system, IEEE Globecom, 576 Zhu, 2013, Mobi Cache: when k-anonymity meets cache, IEEE Globecom, 820 Zhu, X., Chi, H., Jiang, S., 2014. Using dynamic pseudo-IDs to protect privacy in location-based services. In: Proceedings of the IEEE International Conference on Communications (ICC), pp. 2307–2312.