DOI QR코드

DOI QR Code

AMV: A k-anonymization technique minimizing the cloaking region

AMV: 클로킹 영역을 최소화하는 k-익명화 기법

  • Song, Doohee (Department of Information & Communication Engineering, Wonkwang University) ;
  • Heo, Minjae (Department of Information & Communication Engineering, Wonkwang University) ;
  • Sim, Jongwon (Department of Information & Communication Engineering, Wonkwang University) ;
  • Hwang, Sori (Department of Information & Communication Engineering, Wonkwang University) ;
  • Song, Moonbae (Mobile Communication Business, Samsung Electronics) ;
  • Park, Kwangjin (Department of Information & Communication Engineering, Wonkwang University)
  • Received : 2014.07.22
  • Accepted : 2014.09.25
  • Published : 2014.12.31

Abstract

In this paper, we propose AMV scheme which supports k-anonymization by using vectors for mobile clients. AMV can produces the minimal cloaking area using motion vector information of users (clients). The main reason for minimizing cloaking area is a server has to send the object information to all users who request the spatial queries. The experimental results show that the proposed AMV has superior performance over existing methods.

본 논문에서, 우리는 이동 벡터(motion vector)를 이용하여 이동 중인 클라이언트의 k-익명화를 지원하는 AMV 기법을 제안한다. AMV는 이동 벡터 정보를 이용하여 사용자(클라이언트)들의 최소 클로킹 영역을 만들 수 있다. 클로킹 영역을 줄이는 주된 이유는 서버가 공간 질의를 요청한 모든 사용자에게 다수의 객체 정보(질의 결과)를 전송해야 하기 때문이다. 실험 결과를 통하여 기존 기법 보다 AMV 기법의 성능이 우수함을 증명하였다.

Keywords

References

  1. K. Park, "Efficient Data Access for Location-dependent Spatial Queries", Journal of Computer Science and Technology, Springer, vol. 29, no. 3, pp. 449-469, 2014. https://doi.org/10.1007/s11390-014-1442-9
  2. D. Song and K. Park, "An Efficient Adaptive Bitmap-based Selective Tuning Scheme for Spatial Queries in Broadcast Environments", Journal of KSII Transactions on Internet and Information Systems, vol. 5, no. 10, pp. 1862-1878, 2011. https://doi.org/10.3837/tiis.2011.10.011
  3. C. -G. Park, J. -J. Kim, K. -J. Han, "Efficient POI Search for Location-based Services in Road Networks", Journal of Computing Science and Engineering, vol. 40, no. 2, pp.141-151, 2013.
  4. H. Sim, "LBS Description Element and Research Trend", Journal of Information Processing Systems, vol. 20. no. 6, pp. 3-12, 2013.
  5. M. F. Mokbel, C.-Y. Chow and W. G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy", Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763-774, 2006.
  6. J. Kim, A. -R. Lee, Y. -K. Kim, J. -H. Um, J. -W. Chang, "Cloaking Method supporting K-anonymity and L-diversity for Privacy Protection in Location-Based Services", Journal of Korea Spatial Information Society, vol. 10, no. 4, pp.1-10, 2008.
  7. J. -Y. Kim, E. -H. Jeong, B. -K. Lee, "A Design of Cloaking Region using Dummy for Privacy Information Protection on Location-Based Services", Journal of Communications and Networks, vol. 36, no. 8, pp. 929-938, 2011.
  8. S. Park, J. Bai, S. Park, "An Anonymization Technique of Continuous Query and Query Log for Privacy in Location-Based Services", Journal of Computing Science and Engineering, vol. 38, no. 2, pp. 65-71, 2011.
  9. J. Lee, "Hierarchical Clustering-Based Cloaking Algorithm for Location-Based Services", Journal of Korea Information and Communications Society, vol. 8, no. 8, pp. 1155-1160, 2013.
  10. S. Park, S. J. Jeong, "An Anonymization Scheme Protecting Querist Identification in Location-based Service with User Profile", Journal of Computing Science and Engineering, vol. 38, no. 4, pp.201-207, 2011.