TY - GEN
T1 - A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries
AU - Zhang, Lu
AU - Zhu, Saide
AU - Li, Fengyin
AU - Li, Ruinian
AU - Meng, Jing
AU - Li, Wei
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - In the continuous location-based service (LBS) queries, the trajectory k-anonymity method that incorporates user’s moving trend is becoming popular because of its high quality of service (QoS). The existing works often apply user’s moving direction to represent the user’s moving trend. However, the query destinations of the users with closer moving directions are not necessarily closer. As a result, the users in a cloaked set may diverge with the proceeding of the continuous queries, leading to large cloaked areas as well as a reduction of QoS. Therefore, in this paper, a new concept named “location similarity of query destination (LS-QD)”, is proposed to reflect user’s global moving trend. By incorporating LS-QD, we develop a novel trajectory k-anonymity method for continuous LBS queries. Our system architecture utilizes a quadtree model with a pyramid structure to construct the user cloaked sets conveniently. Both theoretical analysis and simulation experiments are carried out to evaluate the robustness and security performance of our proposed method. Compared with other existing methods, our LS-QD based k-anonymity method can reduce the cloaking area and cloaking time while increasing the cloaking success ratio by about 40%–70%, which demonstrates its superiority in guaranteeing QoS for continuous LBS queries.
AB - In the continuous location-based service (LBS) queries, the trajectory k-anonymity method that incorporates user’s moving trend is becoming popular because of its high quality of service (QoS). The existing works often apply user’s moving direction to represent the user’s moving trend. However, the query destinations of the users with closer moving directions are not necessarily closer. As a result, the users in a cloaked set may diverge with the proceeding of the continuous queries, leading to large cloaked areas as well as a reduction of QoS. Therefore, in this paper, a new concept named “location similarity of query destination (LS-QD)”, is proposed to reflect user’s global moving trend. By incorporating LS-QD, we develop a novel trajectory k-anonymity method for continuous LBS queries. Our system architecture utilizes a quadtree model with a pyramid structure to construct the user cloaked sets conveniently. Both theoretical analysis and simulation experiments are carried out to evaluate the robustness and security performance of our proposed method. Compared with other existing methods, our LS-QD based k-anonymity method can reduce the cloaking area and cloaking time while increasing the cloaking success ratio by about 40%–70%, which demonstrates its superiority in guaranteeing QoS for continuous LBS queries.
UR - http://www.scopus.com/inward/record.url?scp=85091488166&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091488166&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-59016-1_58
DO - 10.1007/978-3-030-59016-1_58
M3 - Conference contribution
AN - SCOPUS:85091488166
SN - 9783030590154
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 704
EP - 715
BT - Wireless Algorithms, Systems, and Applications - 15th International Conference, WASA 2020, Proceedings
A2 - Yu, Dongxiao
A2 - Dressler, Falko
A2 - Yu, Jiguo
PB - Springer Science and Business Media Deutschland GmbH
T2 - 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020
Y2 - 13 September 2020 through 15 September 2020
ER -