Next Article in Journal
A Survey of Deep Learning Methods for Cyber Security
Previous Article in Journal
Youla–Kučera Parametrization with no Coprime Factorization—Single-Input Single-Output Case
Open AccessArticle

Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints

School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
*
Author to whom correspondence should be addressed.
Information 2019, 10(4), 121; https://doi.org/10.3390/info10040121
Received: 13 December 2018 / Revised: 28 March 2019 / Accepted: 28 March 2019 / Published: 2 April 2019
The wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locations associated with different pseudonyms, which come at a cost either in terms of resource consumption or quality of service, or both. However, we observed that the effect of resource consumption has not been discussed in existing studies. In this paper, we present the user-centric LPPMs against location inference attacks under the consideration of both service quality and energy constraints. Moreover, we modeled the precision-based and dummy-based mechanisms in the context of an existing LPPM framework, and also extended the linear program solutions applicable to them. This study allowed us to specify the LPPMs that decreased the precision of exposed locations or generated dummy locations of the users. Based on this, we evaluated the privacy protection effects of optimal location obfuscation function against an adversary’s inference attack function using real mobility datasets. The results indicate that dummy-based mechanisms provide better achievable location privacy under a given combination of service quality and energy constraints, and once a certain level of privacy is reached, both the precision-based and dummy-based mechanisms only perturb the exposed locations. The evaluation results also contribute to a better understanding for the LPPM design strategies and evaluation mechanism as far as the system resource utilization and service quality requirements are concerned. View Full-Text
Keywords: location-based services; location privacy; location-privacy preserving mechanism; resource utilization; tracking attacks; game-theoretic model location-based services; location privacy; location-privacy preserving mechanism; resource utilization; tracking attacks; game-theoretic model
Show Figures

Figure 1

MDPI and ACS Style

Tefera, M.K.; Yang, X. Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints. Information 2019, 10, 121.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop