| Literature DB >> 36015901 |
Shiwen Zhang1, Mengling Li1, Wei Liang1, Voundi Koe Arthur Sandor2, Xiong Li1,3.
Abstract
As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large number of research works have emerged to protect users' privacy. Dummy-based location privacy protection solutions have been widely adopted for their simplicity and enhanced privacy protection results, but there are few reviews on dummy-based location privacy protection. Or, for existing works, some focus on aspects of cryptography, anonymity, or other comprehensive reviews that do not provide enough reviews on dummy-based privacy protection. In this paper, the authors provide a review of dummy-based location privacy protection techniques for location-based services. More specifically, the connection between the level of privacy protection, the quality of service, and the system overhead is summarized. The difference and connection between various location privacy protection techniques are also described. The dummy-based attack models are presented. Then, the algorithms for dummy location selection are analyzed and evaluated. Finally, we thoroughly evaluate different dummy location selection methods and arrive at a highly useful evaluation result. This result is valuable both to users and researchers who are studying this field.Entities:
Keywords: dummy location; location privacy; privacy protection
Mesh:
Year: 2022 PMID: 36015901 PMCID: PMC9416589 DOI: 10.3390/s22166141
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Permissions to install and use mobile apps.
Figure 2The relationship among location privacy, location privacy protection techniques, the obfuscation, and dummy location.
The comparison among four privacy protection techniques.
| LPPT 1 | RM 2 | LoP 3 | TTP |
|---|---|---|---|
| Obfuscation | Dummy | ||
| Spatial Cloaking | low | yes | |
| Differential Privacy | |||
| Encryption | PIR | high | no |
| Collaboration and Cache | medium | no | |
| Anonymity | K-anonymity | medium | yes |
| Mix-zone |
1 LPPT: location privacy protection techniques. 2 RM: representative method. 3 LoP: the level of protection privacy.
The cost of four privacy protection techniques.
| LPPT | Precision Loss | Communication Cost | Computation Cost | Storage Cost |
|---|---|---|---|---|
| Obfuscation | high | low | low | low |
| Encryption | low | low | high | medium |
| Collaboration and Cache | medium | high | low | high |
| Anonymity | medium | medium | high | medium |
Figure 3The architecture with a third party.
Figure 4The architecture without a third party.
Figure 5A cloaking area with users.
Figure 6The historical query probability distribution of all locations.
Figure 7The physical dispersion situation between dummies and the real location.
Figure 8The enhanced DLS.
Figure 9Undigraph/digraph road network.
Figure 10The location semantic tree.
Selection methods of dummy on query probability similarity, physical dispersion and semantic diversity.
| Category | Reference | Methods of Selection |
|---|---|---|
| Query probability similarity | [ | avoids dummies with |
| [ | dummies have the same probability as the real ones | |
| [ | information entropy-based | |
| [ | current query probability | |
| Physical dispersion | [ | virtual circles and virtual grids |
| [ | the product of locational distances | |
| [ | the effective distance | |
| [ | the road network distance | |
| Semantic diversity | [ | location semantic tree |
| [ | Euclidian distance | |
| [ | the intersection and union of a location’s semantic attributes |
Summary of dummy selection.
| Selection Method | Reference | CO a | Architecture | Attack | |||
|---|---|---|---|---|---|---|---|
| TTP | Non-TTP | AoQ b | AoD c | AoS d | |||
| Random Selection | [ |
|
| ||||
| Considering Q | [ |
|
|
| |||
| Considering D | [ |
|
|
| |||
| Considering S | [ |
|
|
| |||
| [ |
|
|
| ||||
| Considering Q+D | [ |
|
|
|
| ||
| [ |
|
|
|
| |||
| [ |
|
|
|
| |||
| [ |
|
|
|
| |||
| Considering D+S | [ |
|
|
|
| ||
| Considering Q+S | [ |
|
|
|
| ||
| All of them | [ |
|
|
|
|
| |
a CO: the computation overhead. b AoQ: the attack of query probability; Q: Query probability. c AoD: the attack of location distribution; D: Location distribution. d AoS: the attack of semantic similarity; S: Semantic similarity. Notes: k: the number of dummies; α: (ω + m) log(ω + m), ω = (maxtier − 1)(1 − e)m, m: the number of dummies candidate set, maxtier: the max times of iteration; IJ: an area is divided into I × J cells; U: the number of services; It: the times of iteration; N: the total number of users in the region to be clocked.