Lei Yang, Lei Wei, Hongzhou Shi, Qinming Liu, Dexing Yang
{"title":"基于区域特征的位置隐身算法","authors":"Lei Yang, Lei Wei, Hongzhou Shi, Qinming Liu, Dexing Yang","doi":"10.1109/CSAE.2011.5953177","DOIUrl":null,"url":null,"abstract":"Location-based services are widely used in the Internet services. The method of location cloaking is used to effectively protect the user's location privacy. The current cloaking algorithm does not take into account the regional characteristics, such as population density, popularity level and so on, based on which an attacker can often infer user's exact location from their cloaking area. In this paper, we design two cloaking algorithms based on regional characteristics in terms of two different attacking patterns: the Minimum Exposure Risk Cloaking Algorithm and the Maximum Entropy Cloaking Algorithm. Simulation results show that both the two cloaking algorithms can effectively secure the user's privacy.","PeriodicalId":138215,"journal":{"name":"2011 IEEE International Conference on Computer Science and Automation Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Location cloaking algorithms based on regional characteristics\",\"authors\":\"Lei Yang, Lei Wei, Hongzhou Shi, Qinming Liu, Dexing Yang\",\"doi\":\"10.1109/CSAE.2011.5953177\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Location-based services are widely used in the Internet services. The method of location cloaking is used to effectively protect the user's location privacy. The current cloaking algorithm does not take into account the regional characteristics, such as population density, popularity level and so on, based on which an attacker can often infer user's exact location from their cloaking area. In this paper, we design two cloaking algorithms based on regional characteristics in terms of two different attacking patterns: the Minimum Exposure Risk Cloaking Algorithm and the Maximum Entropy Cloaking Algorithm. Simulation results show that both the two cloaking algorithms can effectively secure the user's privacy.\",\"PeriodicalId\":138215,\"journal\":{\"name\":\"2011 IEEE International Conference on Computer Science and Automation Engineering\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE International Conference on Computer Science and Automation Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAE.2011.5953177\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Computer Science and Automation Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAE.2011.5953177","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Location cloaking algorithms based on regional characteristics
Location-based services are widely used in the Internet services. The method of location cloaking is used to effectively protect the user's location privacy. The current cloaking algorithm does not take into account the regional characteristics, such as population density, popularity level and so on, based on which an attacker can often infer user's exact location from their cloaking area. In this paper, we design two cloaking algorithms based on regional characteristics in terms of two different attacking patterns: the Minimum Exposure Risk Cloaking Algorithm and the Maximum Entropy Cloaking Algorithm. Simulation results show that both the two cloaking algorithms can effectively secure the user's privacy.