{"title":"基于Geohash编码和伪随机序列的位置隐私保护方法","authors":"Liu Kai, Han Yiliang, Wang Jingjing, Guo Kaiyang","doi":"10.1109/ictc55111.2022.9778536","DOIUrl":null,"url":null,"abstract":"The popularity of mobile communication devices and the rapid progress of social networks have not only promoted the development of location-based services, but also brought many risks to users’ privacy. In order to better protect users’ location privacy, based on the centralized structure, this paper proposes a k-anonymous location privacy protection scheme based on geohash coding and pseudo-random sequence generation technology, which uses the properties of region coding and pseudorandom sequence to solve the dependence on the credibility of the central server. Theoretical analysis and experimental simulation results show that this scheme can not only resist the central server attack and area central attack, but also has higher efficiency in constructing anonymous area compared with similar schemes.","PeriodicalId":123022,"journal":{"name":"2022 3rd Information Communication Technologies Conference (ICTC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Location Privacy Protection Method Based on Geohash Coding and Pseudo-Random Sequence\",\"authors\":\"Liu Kai, Han Yiliang, Wang Jingjing, Guo Kaiyang\",\"doi\":\"10.1109/ictc55111.2022.9778536\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The popularity of mobile communication devices and the rapid progress of social networks have not only promoted the development of location-based services, but also brought many risks to users’ privacy. In order to better protect users’ location privacy, based on the centralized structure, this paper proposes a k-anonymous location privacy protection scheme based on geohash coding and pseudo-random sequence generation technology, which uses the properties of region coding and pseudorandom sequence to solve the dependence on the credibility of the central server. Theoretical analysis and experimental simulation results show that this scheme can not only resist the central server attack and area central attack, but also has higher efficiency in constructing anonymous area compared with similar schemes.\",\"PeriodicalId\":123022,\"journal\":{\"name\":\"2022 3rd Information Communication Technologies Conference (ICTC)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 3rd Information Communication Technologies Conference (ICTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ictc55111.2022.9778536\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 3rd Information Communication Technologies Conference (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ictc55111.2022.9778536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Location Privacy Protection Method Based on Geohash Coding and Pseudo-Random Sequence
The popularity of mobile communication devices and the rapid progress of social networks have not only promoted the development of location-based services, but also brought many risks to users’ privacy. In order to better protect users’ location privacy, based on the centralized structure, this paper proposes a k-anonymous location privacy protection scheme based on geohash coding and pseudo-random sequence generation technology, which uses the properties of region coding and pseudorandom sequence to solve the dependence on the credibility of the central server. Theoretical analysis and experimental simulation results show that this scheme can not only resist the central server attack and area central attack, but also has higher efficiency in constructing anonymous area compared with similar schemes.