期刊论文详细信息
IEEE Access
A Location Cloaking Algorithm Based on Combinatorial Optimization for Location-Based Services in 5G Networks
Yonghe Liu1  Oguti Ann Move2  Zhihong Bai2  Leyou Yang2  Pengfei Wang2  Ruiyun Yu2 
[1] Computer Science and Engineering Department, The University of Texas at Arlington, Arlington, TX, USA;Software College, Northeastern University, Shenyang, China;
关键词: Combinatorial optimization;    5G;    location-based services;    k-anonymity;    location privacy;    location cloaking;   
DOI  :  10.1109/ACCESS.2016.2607766
来源: DOAJ
【 摘 要 】

In order to satisfy the various requirements of future network services, 5G wireless network is proposed and becoming a hot topic in academic and industrial field. Location-based services are widely used with the development of wireless communication and mobile Internet technology. A number of popular spatial-temporal cloaking technologies have been proposed, and the number of users in an anonymizing spatial region (ASR) is uncontrollable. This paper, based on the semi-trusted server architecture proposes a location cloaking algorithm (LCA) based on combinatorial optimization. First, the semi-trusted server architecture divides the information of mobile users into three parts, so adversaries are unable to obtain the location and identity at the same time, then utilize the spatial k -anonymity algorithm LCA to hide the real locations of user, which controls the number of real users to around k in the anonymous result sets (Aset), so that both the number of users in ASR and the area of ASR are minimized, thereby improving query precision and decreasing the resources consumption. Finally, complete further improvement that the location is distinguishable in ASR and the query contents are diverse in Aset. Simulations show that the LCA performs well on cloaking success rate, query precision, and resources saving.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次