A low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems
Article
Sazdar, A.M., Ghorashi, S.A., Moghtadaiee, V., Khonsari, A. and Windridge, D. 2020. A low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems. Journal of Information Security and Applications. 53. https://doi.org/10.1016/j.jisa.2020.102515
Type | Article |
---|---|
Title | A low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems |
Authors | Sazdar, A.M., Ghorashi, S.A., Moghtadaiee, V., Khonsari, A. and Windridge, D. |
Abstract | Location fingerprinting is a technique employed when Global Positioning System (GPS) positioning breaks down within indoor environments. Since Location Service Providers (LSPs) would implicitly have access to such information, preserving user privacy has become a challenging issue in location estimation systems. This paper proposes a low-complexity k-anonymity approach for preserving the privacy of user location and trajectory, in which real location/trajectory data is hidden within k fake locations/trajectories held by the LSP, without degrading overall localization accuracy. To this end, three novel location privacy preserving methods and a trajectory privacy preserving algorithm are outlined. The fake trajectories are generated so as to exhibit characteristics of the user’s real trajectory. In the proposed method, no initial knowledge of the environment or location of the Access Points (APs) is required in order for the user to generate the fake location/trajectory. Moreover, the LSP is able to preserve privacy of the fingerprinting database from the users. The proposed approaches are evaluated in both simulation and experimental testing, with the proposed methods outperforming other well-known k-anonymity methods. The method further exhibits a lower implementation complexity and higher movement similarity (of up to 88%) between the real and fake trajectories. |
Keywords | Location privacy-preserving; Trajectory privacy-preserving; Fingerprinting positioning; k-anonymity |
Publisher | Elsevier |
Journal | Journal of Information Security and Applications |
ISSN | |
Electronic | 2214-2126 |
Publication dates | |
Online | 14 May 2020 |
20 Aug 2020 | |
Publication process dates | |
Deposited | 14 May 2021 |
Accepted | 11 Apr 2020 |
Output status | Published |
Accepted author manuscript | License |
Copyright Statement | © 2020. This manuscript version is made available under the CC-BY-NC-ND 4.0 license. |
Digital Object Identifier (DOI) | https://doi.org/10.1016/j.jisa.2020.102515 |
Web of Science identifier | WOS:000541428700003 |
Language | English |
Draft pre-submission version | File Access Level Restricted |
https://repository.mdx.ac.uk/item/895x3
Download files
Accepted author manuscript
64
total views17
total downloads1
views this month1
downloads this month