{"title":"差分私有k-匿名:实现基于位置服务的查询隐私","authors":"Jinbao Wang, Zhipeng Cai, Chunyu Ai, Donghua Yang, Hong Gao, Xiuzhen Cheng","doi":"10.1109/IIKI.2016.67","DOIUrl":null,"url":null,"abstract":"While location based services (LBS) are facilitating our daily life, the privacy issues including location privacy and query privacy are also arising. Existing efforts aiming to preserving query privacy rely on third party servers or fail to provide guaranteed privacy degree. In this paper we combine the concepts of differential privacy and k-anonymity to establish a novel notion of differentially private k-anonymity (DPkA) for query privacy in LBS. The sufficient and necessary condition for the availability of 0-DPkA is recognized and a mechanism M0 to achieve 0-DPkA is given. For other cases that 0-DPkA is impossible, this paper presents an algorithm to achieve ε-DPkA with bounded ε.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services\",\"authors\":\"Jinbao Wang, Zhipeng Cai, Chunyu Ai, Donghua Yang, Hong Gao, Xiuzhen Cheng\",\"doi\":\"10.1109/IIKI.2016.67\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While location based services (LBS) are facilitating our daily life, the privacy issues including location privacy and query privacy are also arising. Existing efforts aiming to preserving query privacy rely on third party servers or fail to provide guaranteed privacy degree. In this paper we combine the concepts of differential privacy and k-anonymity to establish a novel notion of differentially private k-anonymity (DPkA) for query privacy in LBS. The sufficient and necessary condition for the availability of 0-DPkA is recognized and a mechanism M0 to achieve 0-DPkA is given. For other cases that 0-DPkA is impossible, this paper presents an algorithm to achieve ε-DPkA with bounded ε.\",\"PeriodicalId\":371106,\"journal\":{\"name\":\"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIKI.2016.67\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIKI.2016.67","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services
While location based services (LBS) are facilitating our daily life, the privacy issues including location privacy and query privacy are also arising. Existing efforts aiming to preserving query privacy rely on third party servers or fail to provide guaranteed privacy degree. In this paper we combine the concepts of differential privacy and k-anonymity to establish a novel notion of differentially private k-anonymity (DPkA) for query privacy in LBS. The sufficient and necessary condition for the availability of 0-DPkA is recognized and a mechanism M0 to achieve 0-DPkA is given. For other cases that 0-DPkA is impossible, this paper presents an algorithm to achieve ε-DPkA with bounded ε.