A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems
Article
Sazdar, A. M., Ghorashi, S. A., Moghtadaiee, V., Khonsari, A. and Windridge, D. 2020. A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems. Journal of Information Security and Applications. 53 (Art. 102515). https://doi.org/10.1016/j.jisa.2020.102515
Authors | Sazdar, A. M., Ghorashi, S. A., Moghtadaiee, V., Khonsari, A. and Windridge, D. |
---|---|
Abstract | Location fingerprinting is a technique employed when Global Positioning System (GPS) positioning breaks down within indoor environments. Since Location Service Providers (LSPs) would implicitly have access to such information, preserving user privacy has become a challenging issue in location estimation systems. This paper proposes a low-complexity k-anonymity approach for preserving the privacy of user location and trajectory, in which real location/trajectory data is hidden within k fake locations/trajectories held by the LSP, without degrading overall localization accuracy. To this end, three novel location privacy preserving methods and a trajectory privacy preserving algorithm are outlined. The fake trajectories are generated so as to exhibit characteristics of the user’s real trajectory. In the proposed method, no initial knowledge of the environment or location of the Access Points (APs) is required in order for the user to generate the fake location/trajectory. Moreover, the LSP is able to preserve privacy of the fingerprinting database from the users. The proposed approaches are evaluated in both simulation and experimental testing, with the proposed methods outperforming other well-known k-anonymity methods. The method further exhibits a lower implementation complexity and higher movement similarity (of up to 88%) between the real and fake trajectories. |
Keywords | Location Privacy-Preserving; Trajectory Privacy-Preserving; Fingerprinting Positioning; k-anonymity |
Journal | Journal of Information Security and Applications |
Journal citation | 53 (Art. 102515) |
ISSN | 2214-2126 |
Year | 2020 |
Publisher | Elsevier |
Accepted author manuscript | License File Access Level Anyone |
Digital Object Identifier (DOI) | https://doi.org/10.1016/j.jisa.2020.102515 |
Web address (URL) | https://doi.org/10.1016/j.jisa.2020.102515 |
Publication dates | |
Online | 14 May 2020 |
Publication process dates | |
Accepted | 08 Apr 2020 |
Deposited | 01 Jul 2020 |
Copyright holder | © 2020 Elsevier |
https://repository.uel.ac.uk/item/882w9
Download files
Accepted author manuscript
Ghorashi - Journal of Information Security and Applications-2020.pdf | ||
License: CC BY-NC-ND 4.0 | ||
File access level: Anyone |
162
total views80
total downloads0
views this month0
downloads this month