Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Journal of Beijing University of Posts and Telecommunications ›› 2020, Vol. 43 ›› Issue (1): 135-142.doi: 10.13190/j.jbupt.2019-031

• Reports • Previous Articles    

Research on Location Privacy Protection Scheme Based on Similar Trajectory Replacement

SONG Cheng, ZHANG Ya-dong, PENG Wei-ping, WANG Lei, LIU Zhi-zhong   

  1. School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China
  • Received:2019-02-28 Online:2020-02-28 Published:2020-03-27
  • Supported by:
     

Abstract: Aiming at the problem of privacy leakage of mobile terminal users in location based service, a location privacy protection scheme is proposed based on similar trajectory replacement query. In this scheme, identities of the requesting user and all the candidates are annonymized. By adopting the similar trajectory function to calculate the trajectory similarities between all the candidates and the requesting user at certain time intervals, the optimal candidate with highest similarity is selected to represent requesting user in requesting LBS. So the identities of the requesting user. The privacy of queries and the trajectories is protected. Security analyses prove that the scheme satisfies such security features as anonymity, unforgeability, and resisting continuous query service tracking attack. Simulation shows that the proposed scheme effectively improves the trajectory similarity of the optimal candidate and the efficiency of the best candidate selection.

Key words: location based services, similar trajectory, privacy protection, query-replace

CLC Number: