A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services

As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large number of research works have emerged to protect user...

Full description

Bibliographic Details
Published in:Sensors
Main Authors: Shiwen Zhang, Mengling Li, Wei Liang, Voundi Koe Arthur Sandor, Xiong Li
Format: Article
Language:English
Published: MDPI AG 2022-08-01
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/16/6141
_version_ 1851830736118611968
author Shiwen Zhang
Mengling Li
Wei Liang
Voundi Koe Arthur Sandor
Xiong Li
author_facet Shiwen Zhang
Mengling Li
Wei Liang
Voundi Koe Arthur Sandor
Xiong Li
author_sort Shiwen Zhang
collection DOAJ
container_title Sensors
description As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large number of research works have emerged to protect users’ privacy. Dummy-based location privacy protection solutions have been widely adopted for their simplicity and enhanced privacy protection results, but there are few reviews on dummy-based location privacy protection. Or, for existing works, some focus on aspects of cryptography, anonymity, or other comprehensive reviews that do not provide enough reviews on dummy-based privacy protection. In this paper, the authors provide a review of dummy-based location privacy protection techniques for location-based services. More specifically, the connection between the level of privacy protection, the quality of service, and the system overhead is summarized. The difference and connection between various location privacy protection techniques are also described. The dummy-based attack models are presented. Then, the algorithms for dummy location selection are analyzed and evaluated. Finally, we thoroughly evaluate different dummy location selection methods and arrive at a highly useful evaluation result. This result is valuable both to users and researchers who are studying this field.
format Article
id doaj-art-1bf2dba67f9c49efbbd97e79f97620fc
institution Directory of Open Access Journals
issn 1424-8220
language English
publishDate 2022-08-01
publisher MDPI AG
record_format Article
spelling doaj-art-1bf2dba67f9c49efbbd97e79f97620fc2025-08-19T22:32:10ZengMDPI AGSensors1424-82202022-08-012216614110.3390/s22166141A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based ServicesShiwen Zhang0Mengling Li1Wei Liang2Voundi Koe Arthur Sandor3Xiong Li4School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, ChinaSchool of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, ChinaSchool of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, ChinaSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, ChinaSchool of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, ChinaAs smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large number of research works have emerged to protect users’ privacy. Dummy-based location privacy protection solutions have been widely adopted for their simplicity and enhanced privacy protection results, but there are few reviews on dummy-based location privacy protection. Or, for existing works, some focus on aspects of cryptography, anonymity, or other comprehensive reviews that do not provide enough reviews on dummy-based privacy protection. In this paper, the authors provide a review of dummy-based location privacy protection techniques for location-based services. More specifically, the connection between the level of privacy protection, the quality of service, and the system overhead is summarized. The difference and connection between various location privacy protection techniques are also described. The dummy-based attack models are presented. Then, the algorithms for dummy location selection are analyzed and evaluated. Finally, we thoroughly evaluate different dummy location selection methods and arrive at a highly useful evaluation result. This result is valuable both to users and researchers who are studying this field.https://www.mdpi.com/1424-8220/22/16/6141location privacyprivacy protectiondummy location
spellingShingle Shiwen Zhang
Mengling Li
Wei Liang
Voundi Koe Arthur Sandor
Xiong Li
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
location privacy
privacy protection
dummy location
title A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
title_full A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
title_fullStr A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
title_full_unstemmed A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
title_short A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
title_sort survey of dummy based location privacy protection techniques for location based services
topic location privacy
privacy protection
dummy location
url https://www.mdpi.com/1424-8220/22/16/6141
work_keys_str_mv AT shiwenzhang asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT menglingli asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT weiliang asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT voundikoearthursandor asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT xiongli asurveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT shiwenzhang surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT menglingli surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT weiliang surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT voundikoearthursandor surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices
AT xiongli surveyofdummybasedlocationprivacyprotectiontechniquesforlocationbasedservices