{"title":"基于p-destination的移动社交网络位置隐私保护:博弈论分析","authors":"Bidi Ying, A. Nayak","doi":"10.1109/DESEC.2017.8073812","DOIUrl":null,"url":null,"abstract":"k-anonymity and l-diversity are widely discussed means of controlling the degree of privacy loss when personal information is processed for data analytics. User privacy can easily be disclosed by tracking its past/future locations. In this paper, we propose a Location Privacy Protection (LPP) method which enables a trusted third party to aggregate location-aware requests based on p-destination in mobile social networks. Our LPP can prevent an attacker from associating users' identities, locations and query contents. We also propose a hide-and-seek game-theoretic model for developing defense strategies for the rational trusted third party in dealing with a rational attacker. Detailed analysis is provided for choosing strategies that maximize payoffs, and simulation results are provided to demonstrate that our proposed method protects user privacy.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"83 1","pages":"243-250"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Location privacy-protection based on p-destination in mobile social networks: A game theory analysis\",\"authors\":\"Bidi Ying, A. Nayak\",\"doi\":\"10.1109/DESEC.2017.8073812\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"k-anonymity and l-diversity are widely discussed means of controlling the degree of privacy loss when personal information is processed for data analytics. User privacy can easily be disclosed by tracking its past/future locations. In this paper, we propose a Location Privacy Protection (LPP) method which enables a trusted third party to aggregate location-aware requests based on p-destination in mobile social networks. Our LPP can prevent an attacker from associating users' identities, locations and query contents. We also propose a hide-and-seek game-theoretic model for developing defense strategies for the rational trusted third party in dealing with a rational attacker. Detailed analysis is provided for choosing strategies that maximize payoffs, and simulation results are provided to demonstrate that our proposed method protects user privacy.\",\"PeriodicalId\":92346,\"journal\":{\"name\":\"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...\",\"volume\":\"83 1\",\"pages\":\"243-250\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DESEC.2017.8073812\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DESEC.2017.8073812","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Location privacy-protection based on p-destination in mobile social networks: A game theory analysis
k-anonymity and l-diversity are widely discussed means of controlling the degree of privacy loss when personal information is processed for data analytics. User privacy can easily be disclosed by tracking its past/future locations. In this paper, we propose a Location Privacy Protection (LPP) method which enables a trusted third party to aggregate location-aware requests based on p-destination in mobile social networks. Our LPP can prevent an attacker from associating users' identities, locations and query contents. We also propose a hide-and-seek game-theoretic model for developing defense strategies for the rational trusted third party in dealing with a rational attacker. Detailed analysis is provided for choosing strategies that maximize payoffs, and simulation results are provided to demonstrate that our proposed method protects user privacy.