DOI QR코드

DOI QR Code

Hierarchical Clustering-Based Cloaking Algorithm for Location-Based Services

위치 기반 서비스를 위한 계층 클러스터 기반 Cloaking 알고리즘

  • Received : 2013.06.20
  • Accepted : 2013.08.23
  • Published : 2013.08.30

Abstract

The rapid growth of smart phones has made location-based services (LBSs) widely available. However, the use of LBS can raise privacy issues, as LBS can allow adversaries to violate the location privacy of users. There has been a considerable amount of research on preserving user location privacy. Most of these studies try to preserve location privacy by achieving what is known as location K-anonymity. In this paper, we propose a hierarchical clustering-based spatial cloaking algorithm for LBSs. The proposed algorithm constructs a tree using a modified version of agglomerative hierarchical clustering. The experimental results show, in terms of the ASR size, that the proposed algorithm is better than Hilbert Cloak and comparable to RC-AR (R-tree Cloak implementation of Reciprocal with an Asymmetric R-tree split). In terms of the ASR generation time, the proposed algorithm is much better in its performance than RC-AR and similar in performance to Hilbert Cloak.

최근 스마트 폰 이용자 수가 증가하면서 다양한 위치 기반 서비스들이 주목을 받고 있다. 위치 기반 서비스는 사용자의 위치와 시스템이 가지고 있는 다양한 정보를 결합하여 사용자에게 유용한 정보를 전달해 주기도 하지만 이로 인한 개인 정보의 침해 가능성 역시 높은 것이 사실이다. 최근의 위치 기반 서비스에서의 프라이버시 관련 연구는 K-anonymity를 만족하는 Cloaking 영역 생성에 중점을 두고 있다. 본 논문에서는 위치 기반 서비스를 위한 계층 클러스터 기반 Cloaking 알고리즘을 제안한다. 제안 기법은 약간 변형된 응집 계층 클러스터링 기법을 사용해서 트리를 생성한 뒤, Reciprocity 성질을 만족시키는 Cloaking 영역을 생성한다. 제안 기법은 Reciprocity 성질을 만족시키며, Hilbert Cloak보다 작고 RC-AR과 비슷한 크기의 영역을 생성하며, 생성 속도는 Hilbert Cloak과 비슷하며 RC-AR보다는 훨씬 빠르다.

Keywords

References

  1. Moon PJ, "On the Availability of Anti- Forensic Tools for Android Smartphones", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 8, No. 6, pp. 855-862, 2013. https://doi.org/10.13067/JKIECS.2013.8.6.855
  2. Lee HJ, Lee JJ, Jung ST, "A Design and Implementation of Digital Textbook for Elementary School Computer Education based on Smart phone", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 8, No. 5, pp. 687-693, 2013. https://doi.org/10.13067/JKIECS.2013.8.5.687
  3. Jung SR, Shin SH, "The effect of the user experience of smart phone on satisfaction", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 7, No. 5, pp. 1087-1093, 2012.
  4. Sweeney L., "k-anonymity : a model for protecting privacy", International Journal on Uncertainty,. Fuzziness and Knowledge-based Systems, Vol. 10, No. 5, pp. 557-570, 2002. https://doi.org/10.1142/S0218488502001648
  5. Gruteser M. and Grunwald D., "Anonymous usage of location-based services through spatial and temporal cloaking", Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, New York, NY, USA, pp. 31-42, ACM, 2003.
  6. Kalnis P., Ghinita G., Mouratidis K., and Papadias D., "Preventing location-based identity inference in anonymous spatial queries", IEEE Transactions on Knowledge and Data Engineering, Vol. 19, No. 12, pp. 1719-1733, 2007. https://doi.org/10.1109/TKDE.2007.190662
  7. Ghinita G., Zhao K., Papadias D., and Kalnis P., "A reciprocal framework for spatial k-anonymity", Information Systems, Vol. 35, No. 3, pp. 299-314, 2010. https://doi.org/10.1016/j.is.2009.10.001
  8. Butz A.R., "Alternative algorithm for hilbert's space-filling curve", IEEE Transactions on Computers, Vol. 20, No. 4, pp. 424-426, 1971.
  9. Johnson S., "Hierarchical clustering schemes", Psychometrika, Vol. 32, No. 3, pp. 241-254, 1967. https://doi.org/10.1007/BF02289588
  10. Eppstein D., "Fast hierarchical clustering and other applications of dynamic closest pairs", Journal of Experimental Algorithmics, Vol. 5, No. 1, pp. 1-23, 2000. https://doi.org/10.1145/351827.351829