A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large number of research works have emerged to protect user...
| Published in: | Sensors |
|---|---|
| Main Authors: | , , , , |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2022-08-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/1424-8220/22/16/6141 |
| _version_ | 1851830736118611968 |
|---|---|
| author | Shiwen Zhang Mengling Li Wei Liang Voundi Koe Arthur Sandor Xiong Li |
| author_facet | Shiwen Zhang Mengling Li Wei Liang Voundi Koe Arthur Sandor Xiong Li |
| author_sort | Shiwen Zhang |
| collection | DOAJ |
| container_title | Sensors |
| description | As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large number of research works have emerged to protect users’ privacy. Dummy-based location privacy protection solutions have been widely adopted for their simplicity and enhanced privacy protection results, but there are few reviews on dummy-based location privacy protection. Or, for existing works, some focus on aspects of cryptography, anonymity, or other comprehensive reviews that do not provide enough reviews on dummy-based privacy protection. In this paper, the authors provide a review of dummy-based location privacy protection techniques for location-based services. More specifically, the connection between the level of privacy protection, the quality of service, and the system overhead is summarized. The difference and connection between various location privacy protection techniques are also described. The dummy-based attack models are presented. Then, the algorithms for dummy location selection are analyzed and evaluated. Finally, we thoroughly evaluate different dummy location selection methods and arrive at a highly useful evaluation result. This result is valuable both to users and researchers who are studying this field. |
| format | Article |
| id | doaj-art-1bf2dba67f9c49efbbd97e79f97620fc |
| institution | Directory of Open Access Journals |
| issn | 1424-8220 |
| language | English |
| publishDate | 2022-08-01 |
| publisher | MDPI AG |
| record_format | Article |
| spelling | doaj-art-1bf2dba67f9c49efbbd97e79f97620fc2025-08-19T22:32:10ZengMDPI AGSensors1424-82202022-08-012216614110.3390/s22166141A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based ServicesShiwen Zhang0Mengling Li1Wei Liang2Voundi Koe Arthur Sandor3Xiong Li4School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, ChinaSchool of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, ChinaSchool of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, ChinaSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, ChinaSchool of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, ChinaAs smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large number of research works have emerged to protect users’ privacy. Dummy-based location privacy protection solutions have been widely adopted for their simplicity and enhanced privacy protection results, but there are few reviews on dummy-based location privacy protection. Or, for existing works, some focus on aspects of cryptography, anonymity, or other comprehensive reviews that do not provide enough reviews on dummy-based privacy protection. In this paper, the authors provide a review of dummy-based location privacy protection techniques for location-based services. More specifically, the connection between the level of privacy protection, the quality of service, and the system overhead is summarized. The difference and connection between various location privacy protection techniques are also described. The dummy-based attack models are presented. Then, the algorithms for dummy location selection are analyzed and evaluated. Finally, we thoroughly evaluate different dummy location selection methods and arrive at a highly useful evaluation result. This result is valuable both to users and researchers who are studying this field.https://www.mdpi.com/1424-8220/22/16/6141location privacyprivacy protectiondummy location |
| spellingShingle | Shiwen Zhang Mengling Li Wei Liang Voundi Koe Arthur Sandor Xiong Li A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services location privacy privacy protection dummy location |
| title | A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services |
| title_full | A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services |
| title_fullStr | A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services |
| title_full_unstemmed | A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services |
| title_short | A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services |
| title_sort | survey of dummy based location privacy protection techniques for location based services |
| topic | location privacy privacy protection dummy location |
| url | https://www.mdpi.com/1424-8220/22/16/6141 |
| work_keys_str_mv | AT shiwenzhang asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT menglingli asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT weiliang asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT voundikoearthursandor asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT xiongli asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT shiwenzhang surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT menglingli surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT weiliang surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT voundikoearthursandor surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices AT xiongli surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices |
