
doi: 10.1002/cpe.5435
handle: 1959.3/450424
SummaryIndividuals' right to privacy includes control over access to their location information. With the advent of location‐based services and personal transport services (such as ridesharing), the risk of location privacy breaches is increased greatly. The potential negative effects of location privacy leakages include spam location‐based service flooding, threats to personal safety (such as physical attacks), and intrusion related to access to private places (such as homes and hospitals). Therefore, protecting the privacy of users' real locations is becoming increasingly important. This is often achieved using a pseudo‐location near the real location, but existing pseudo‐location generators, such as NRand and the uniform random method, suffer from statistical inference, which can infer the obfuscation domain to cover the real location. In this paper, we propose an intelligent pseudo‐location recommendation (IPLR) method to reduce the risk of a statistical inference attack. In IPLR, we generate a random substitute of the real location to attract the adversary and thus hide the real location. Then, the pseudo‐location is generated in the neighborhood of the random substitute location following a normal distribution; the random substitute location is changed frequently to confuse attackers. In particular, we define three levels of location privacy, ie, address level, street level, and district level, to evaluate the effectiveness of the IPLR method. Our experimental study using simulation data demonstrates that the proposed IPLR method achieves lower risk of location privacy leakage and higher probabilities of safety in all three levels of location privacy than NRand and the random method. It also demonstrates the effectiveness of the proposed IPLR to balance location privacy and service quality.
1712 Software, location privacy protection, pseudo-location recommendation, 1705 Computer Networks and Communications, 1706 Computer Science Applications, 303, 2614 Theoretical Computer Science, obfuscation, quality loss, 1703 Computational Theory and Mathematics
1712 Software, location privacy protection, pseudo-location recommendation, 1705 Computer Networks and Communications, 1706 Computer Science Applications, 303, 2614 Theoretical Computer Science, obfuscation, quality loss, 1703 Computational Theory and Mathematics
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 4 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
