• Title/Summary/Keyword: Cloaking method

Search Result 21, Processing Time 0.027 seconds

Grid-Based Cloaking Method supporting K-anonymity and L-diversity for Privacy Protection in Location-Based Services (위치기반 서비스에서 개인 정보 보호를 위한 K-anonymity 및 L-diversity를 지원하는 그리드 기반 Cloaking 기법)

  • Kim, Ji-Hee;Chang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.606-610
    • /
    • 2009
  • In Location-Based Service (LBS), a scheme to hide the exact locations of users is required for privacy protection, In this paper, we propose a grid-based cloaking method considering K-anonymity and L-diversity. For this, our method creates a minimum cloaking region by finding L number of buildings (L-diversity) and then finding number of users (K-anonymity). Especially, we use a effective filtering method for generating the minimum cloaking region in a fast way. Finally, we show from a performance analysis that our cloaking method outperforms the existing method, in terms of query processing time based on the size of cloaking regions.

Cloaking Method supporting K-anonymity and L-diversity for Privacy Protection in Location-Based Services (위치기반 서비스에서 개인 정보 보호를 위한 K-anonymity 및 L-diversity를 지원하는 Cloaking 기법)

  • Kim, Ji-Hee;Lee, Ah-Reum;Kim, Yong-Ki;Um, Jung-Ho;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.4
    • /
    • pp.1-10
    • /
    • 2008
  • In wireless internet, the location information of the user is one of the important resources for many applications. One of these applications is Location-Based Services (LBSs) which are being popular. Because, in the LBS system, users request a location-based query to LBS servers by sending their exact location, the location information of the users can be misused by adversaries. In this regard, there must be a mechanism which can deal with privacy protection of the users. In this paper, we propose a cloaking method considering both features of K-anonymity and L-diversity. Our cloaking method creates a minimum cloaking region by finding L number of buildings (L-diversity) and then finding number of users (K-anonymity). To support this, we use a R*-tree based index structure and use filtering methods especially for the m inimum cloaking region. Finally, we show from a performance analysis that our method outperforms the existing grid based cloaking method.

  • PDF

Design and Analysis of Cloaking Structure Using 2D Transmission Line (2D 전송선을 이용한 Cloaking 구조 설계 및 분석)

  • Kim, Chung-Ju;Lee, Bom-Son
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.9
    • /
    • pp.875-880
    • /
    • 2011
  • We design and analyze the cloaking circuit using 2D transmission line structure to make up for the weakness of the established cloaking circuit using only lumped inductor and capacitor elements. The 2D transmission line structure enables one to conveniently design the cloaking circuit with available element values. All the necessary analysis and synthesis(design) formulas have been derived. A cloaking circuit for a cylindrical scatterer in free space has been designed based on the provided design formulas and its effects have been investigated using the circuit simulator ADS. The effect of the cloaking medium for this specific case has been observed to be about 10.5 dB.

Seismic Surface Wave Cloaking by Acoustic Wave Refraction (음향파 굴절을 이용한 지진파의 표면파 가림)

  • Lee, Dong-Woo;Kang, Young-Hoon;Kim, Sang-Hoon
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.19 no.6
    • /
    • pp.257-263
    • /
    • 2015
  • Recently two seismic cloaking methods of earthquake engineering have been suggested. One is the seismic wave deflection method that makes the seismic wave bend away and the other is the shadow zone method that makes an area that seismic waves cannot pass through. It is called as seismic cloaking. The fundamental principles of the seismic cloaking by variable refractive index were explained. A two-dimensional cylindrical model which was composed of 40 layers of different density and modulus was tested by numerical simulation. The center region of the model to be protected is called 'cloaked area' and the outer region of it to deflect the incoming wave is called 'cloaking area' or 'cloak area.' As the incoming surface wave is approaching to the cloaking area, the refractive index is decreasing and, therefore, the velocity and impedance are increasing. Then, the wave bends away the cloaked area instead of passing it. Three cases are tested depending on the comparison between the seismic wavelength and the diameter of the cloaked region. The advantage and disadvantage of the method were compared with conventional earthquake engineering method. Some practical requirements for realization in fields were discussed.

Grid-based Semantic Cloaking Method for Continuous Moving Object Anonymization (이동 객체 정보 보호를 위한 그리드 기반 시멘틱 클로킹 기법)

  • Zhang, Xu;Shin, Soong-Sun;Kim, Gyoung-Bae;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.3
    • /
    • pp.47-57
    • /
    • 2013
  • Location privacy has been a serious concern for mobile users who use location-based services to acquire geographical location continuously. Spatial cloaking technique is a well-known privacy preserving method, which blurs an exact user location into a cloaked area to meet privacy requirements. However, cloaking for continuous moving object suffers from cloaked area size problem as it is unlikely for all objects travel in the same direction. In this paper, we propose a grid-based privacy preservation method with an improved Earth Mover's Distance(EMD) metric weight update scheme for semantic cloaking. We also define a representative cloaking area which protects continuous location privacy for moving users. Experimental implementation and evaluation exhibit that our proposed method renders good efficiency and scalability in cloaking processing time and area size control. We also show that our proposed method outperforms the existing method by successfully protects location privacy of continuous moving objects against various adversaries.

A Efficient Cloaking Region Creation Scheme using Hilbert Curves in Distributed Grid Environment (분산 그리드 환경에서 힐버트 커브를 이용한 효율적인 Cloaking 영역 설정 기법)

  • Lee, Ah-Reum;Um, Jung-Ho;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.115-126
    • /
    • 2009
  • Recent development in wireless communication and mobile positioning technologies makes Location-Based Services (LBSs) popular. However, because, in the LBSs, users request a query to database servers by using their exact locations, the location information of the users can be misused by adversaries. Therefore, a mechanism for users' privacy protection is required for the safe use of LBSs by mobile users. For this, we, in this paper, propose a efficient cloaking region creation scheme using Hilbert curves in distributed grid environment, so as to protect users' privacy in LBSs. The proposed scheme generates a minimum cloaking region by analyzing the characteristic of a Hilbert curve and computing the Hilbert curve values of neighboring cells based on it, so that we may create a cloaking region to satisfy K-anonymity. In addition, to reduce network communication cost, we make use of a distributed hash table structure, called Chord. Finally, we show from our performance analysis that the proposed scheme outperforms the existing grid-based cloaking method.

  • PDF

An Algorithm for generating Cloaking Region Using Grids for Privacy Protection in Location-Based Services (위치기반 서비스에서 개인 정보 보호를 위한 그리드를 이용한 Cloaking 영역 생성 알고리즘)

  • Um, Jung-Ho;Kim, Ji-Hee;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.151-161
    • /
    • 2009
  • In Location-Based Services (LBSs), users requesting a location-based query send their exact location to a database server and thus the location information of the users can be misused by adversaries. Therefore, a privacy protection method is required for using LBS in a safe way. In this paper, we propose a new cloaking region generation algorithm using grids for privacy protection in LBSs. The proposed algorithm creates a m inimum cloaking region by finding L buildings and then performs K-anonymity to search K users. For this, we make use of not only a grid-based index structure, but also an efficient pruning techniques. Finally, we show from a performance analysis that our cloaking region generation algorithm outperforms the existing algorithm in term of the size of cloaking region.

  • PDF

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services (위치기반서비스에서 개인의 궤적 정보를 보호하기 위한 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-hye;Song, Doo-hee;Cai, Tian-yuan;Park, Kwang-jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.31-38
    • /
    • 2017
  • Recently with the rapid development of LBS (Location-based Services) technology, approaches of protecting user's location have gained tremendous attentions. For using LBS, users need to forward their real locations to LBS server. However, if the user sends his/her real location to LBS server, the server will have the all the information about user in LBS. Moreover, if the user opens it to LBS server for a long time, the trajectory of user may be released. In this paper, we propose GTC (Grid-based Trajectory Cloaking) method to address the privacy issue. Different from existing approaches, firstly the GTC method sets the predicting trajectory and divides the map into $2^n*2^n$ grid. After that we will generate cloaking regions according to user's desired privacy level. Finally the user sends them to LBS server randomly. The GTC method can make the cost of process less than sequential trajectory k-anonymity. Because of confusing the departure and destination, LBS server could not know the user's trajectory any more. Thus, we significantly improve the privacy level. evaluation results further verify the effectiveness and efficiency of our GTC method.

Earthquakeproof Engineering by Metamaterials (메타물질을 이용한 내진설계)

  • Kim, Sang-Hoon
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2013.04a
    • /
    • pp.97-99
    • /
    • 2013
  • We introduced an earthquake-resistant design using acoustic rnetamaterials. There are two way in that field: one is a cloaking method and the other is a shadow zone method of seismic waves. Cloaking is a general property of a wave that changes the direction depending on the refractive index. Metamaterials control the propagation and transmission of specified parts of the wave and demonstrate the potential to render an object seemingly invisible. The shadow zone is a method of negative modulus using many huge resonators and it attenuates the amplitude of the wave exponentially. We compared and explained the fimdarnental principles of the two methods.

  • PDF