Title :
A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments
Author :
Lin, Chi ; Wu, Guowei ; Yao, Lin ; Liu, Zuosong
Author_Institution :
Sch. of Software, Dalian Univ. of Technol., Dalian, China
Abstract :
Privacy protection in pervasive environments has attracted great interests in recent years. Two kinds of privacy issues, location privacy and query privacy, are threatening the security of the users. In this paper, a novel combined clustering algorithm for protecting location privacy and query privacy, namely ECC, is proposed. ECC applies a iterative K-means clustering method to group the user requests into clusters for providing location safety while utilizing a hierarchical clustering method for preserving the query privacy. ECC provides the mobile users with their desired anonymity levels and spatial tolerances. Experimental results manifest that the ECC algorithm shows merits in shorter cloaking time and is able to preserve location privacy and query privacy in continuous location based services.
Keywords :
data privacy; iterative methods; mobile computing; pattern clustering; query processing; ECC algorithm; anonymity levels; cloaking time; continuous location-based services; hierarchical clustering method; iterative k-means clustering method; location privacy protection; location safety; mobile user security; pervasive environments; query privacy protection; spatial tolerances; user requests; Clustering algorithms; Clustering methods; Equations; Mobile communication; Pervasive computing; Privacy; Safety; K-means clustering; hierarchical clustering; location privacy; query privacy;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
DOI :
10.1109/TrustCom.2012.19