19
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A fine granularity based user collaboration algorithm for location privacy protection

      research-article
      1 , 2 , 1 , 2 , * , 1
      PLoS ONE
      Public Library of Science

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          As the location trajectory contains more spatial-temporal information about the user, it will be even dangerous for jeopardizing the privacy of the user. In order to cope with the correlation, an algorithm that utilizes the query division had been proposed. In this algorithm, random blocks of query context was used, so as the adversary was obfuscated and difficult to correlate the real result. However, this algorithm fails to dispose the size of each query block, as once same size blocks were obtained by the adversary continuously, so the adversary can regard them as blocks from the same query context, and then obtains the query context to correlate the discrete locations. In view of above conditions, in this paper we propose a fine granularity block division algorithm based on the conception of granularity measurement as well as granularity layer division, so with the help of collaborative users the location privacy of the user will be protected. In this algorithm, the query context will be divided into fine granularity size of information blocks that difficult to be distinguished with others, and then these blocks will be exchanged with other collaborative users to eliminate the difference in block size. In addition, as each block is divided into fine granularity size, the adversary will be difficult to correlate the discrete locations into location trajectory, so the location privacy will be protected. At last, through security analysis and experimental verification, this granularity indistinguishable algorithm is analyzed and verified at both theoretical and practical levels, which further demonstrate the superiority of the proposed algorithm compared with other similar algorithms.

          Related collections

          Most cited references21

          • Record: found
          • Abstract: not found
          • Article: not found

          FakeMask: A Novel Privacy Preserving Approach for Smartphones

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Collaborative trajectory privacy preserving scheme in location-based services

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Hiding in the Mobile Crowd: LocationPrivacy through Collaboration

              (2014)
                Bookmark

                Author and article information

                Contributors
                Role: ConceptualizationRole: MethodologyRole: Software
                Role: Formal analysisRole: InvestigationRole: Writing – original draft
                Role: Funding acquisitionRole: Project administration
                Role: Editor
                Journal
                PLoS One
                PLoS ONE
                plos
                plosone
                PLoS ONE
                Public Library of Science (San Francisco, CA USA )
                1932-6203
                25 July 2019
                2019
                : 14
                : 7
                : e0220278
                Affiliations
                [1 ] College of Computer Science and Technology, Harbin Engineering University, Harbin, PR China
                [2 ] College of Information Science and Electronic Technology, Jiamusi University, Jiamusi, PR China
                Victoria University, AUSTRALIA
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                Author information
                http://orcid.org/0000-0001-5532-8423
                Article
                PONE-D-18-35603
                10.1371/journal.pone.0220278
                6657889
                31344097
                d36c63c1-9523-4feb-a13a-fca83ced1195
                © 2019 Wang et al

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 20 December 2018
                : 13 July 2019
                Page count
                Figures: 6, Tables: 0, Pages: 12
                Funding
                This work was supported by University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province (project number: UNPYSCT-2017149); Basic scientific research service fee project of Heilongjiang provincial undergraduate universities (2018-KYYWF-0937); the Natural Science Fund of Heilongjiang Province for Outstanding Youth (YQ2019F018); and the Special Doctor Scientific Research Fund Launch Project of Jiamusi University (Research on Privacy Protection of User Collaboration in Location Services). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
                Categories
                Research Article
                Physical Sciences
                Mathematics
                Applied Mathematics
                Algorithms
                Research and Analysis Methods
                Simulation and Modeling
                Algorithms
                Engineering and Technology
                Equipment
                Communication Equipment
                Social Sciences
                Economics
                Commerce
                Earth Sciences
                Geography
                Cartography
                Longitude
                Earth Sciences
                Geography
                Cartography
                Latitude
                Research and Analysis Methods
                Mathematical and Statistical Techniques
                Cluster Analysis
                Research and Analysis Methods
                Mathematical and Statistical Techniques
                Mathematical Models
                Random Walk
                Custom metadata
                All relevant data are within the manuscript and its Supporting Information files.

                Uncategorized
                Uncategorized

                Comments

                Comment on this article