Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • بيانات النشر:
      Elsevier
    • الموضوع:
      2020
    • Collection:
      University of East London (UEL): ROAR
    • نبذة مختصرة :
      Location fingerprinting is a technique employed when Global Positioning System (GPS) positioning breaks down within indoor environments. Since Location Service Providers (LSPs) would implicitly have access to such information, preserving user privacy has become a challenging issue in location estimation systems. This paper proposes a low-complexity k-anonymity approach for preserving the privacy of user location and trajectory, in which real location/trajectory data is hidden within k fake locations/trajectories held by the LSP, without degrading overall localization accuracy. To this end, three novel location privacy preserving methods and a trajectory privacy preserving algorithm are outlined. The fake trajectories are generated so as to exhibit characteristics of the user’s real trajectory. In the proposed method, no initial knowledge of the environment or location of the Access Points (APs) is required in order for the user to generate the fake location/trajectory. Moreover, the LSP is able to preserve privacy of the fingerprinting database from the users. The proposed approaches are evaluated in both simulation and experimental testing, with the proposed methods outperforming other well-known k-anonymity methods. The method further exhibits a lower implementation complexity and higher movement similarity (of up to 88%) between the real and fake trajectories.
    • Relation:
      https://repository.uel.ac.uk/download/23afa8734361ae3238b5ff9bdf272d9a00ea089b535a50d4c11e675dabdc677e/4909278/Ghorashi%20-%20Journal%20of%20Information%20Security%20and%20Applications-2020.pdf; https://doi.org/10.1016/j.jisa.2020.102515
    • الرقم المعرف:
      10.1016/j.jisa.2020.102515
    • الدخول الالكتروني :
      https://repository.uel.ac.uk/item/882w9
      https://repository.uel.ac.uk/download/23afa8734361ae3238b5ff9bdf272d9a00ea089b535a50d4c11e675dabdc677e/4909278/Ghorashi%20-%20Journal%20of%20Information%20Security%20and%20Applications-2020.pdf
      https://doi.org/10.1016/j.jisa.2020.102515
    • Rights:
      CC BY-NC-ND 4.0
    • الرقم المعرف:
      edsbas.56A59184