A bidirectional reversible and multilevel location privacy protection method based on attribute encryption.

PLoS One

School of Computer Science and Artificial Intelligence, Changzhou University, Changzhou, China.

Published: September 2024


Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

Various methods such as k-anonymity and differential privacy have been proposed to safeguard users' private information in the publication of location service data. However, these typically employ a rigid "all-or-nothing" privacy standard that fails to accommodate users' more nuanced and multi-level privacy-related needs. Data is irrecoverable once anonymized, leading to a permanent reduction in location data quality, in turn significantly diminishing data utility. In the paper, a novel, bidirectional and multi-layered location privacy protection method based on attribute encryption is proposed. This method offers layered, reversible, and fine-grained privacy safeguards. A hierarchical privacy protection scheme incorporates various layers of dummy information, using an access structure tree to encrypt identifiers for these dummies. Multi-level location privacy protection is achieved after adding varying amounts of dummy information at different hierarchical levels N. This allows for precise control over the de-anonymization process, where users may adjust the granularity of anonymized data based on their own trust levels for multi-level location privacy protection. This method includes an access policy which functions via an attribute encryption-based access control system, generating decryption keys for data identifiers according to user attributes, facilitating a reversible transformation between data anonymity and de-anonymity. The complexities associated with key generation, distribution, and management are thus markedly reduced. Experimental comparisons with existing methods demonstrate that the proposed method effectively balances service quality and location privacy, providing users with multi-level and reversible privacy protection services.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11379367PMC
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0309990PLOS

Publication Analysis

Top Keywords

privacy protection
24
location privacy
20
protection method
12
privacy
10
method based
8
based attribute
8
attribute encryption
8
proposed method
8
multi-level location
8
location
7

Similar Publications

Toward owner governance in genomic data privacy with Governome.

Cell Rep Methods

August 2025

School of Computing and Data Science, The University of Hong Kong, Hong Kong 999077, China. Electronic address:

Advancements in sequencing technologies grant individuals unprecedented access to their genomic data. However, existing data management systems or protocols are inadequate in privacy protection, limiting individuals' control over their genomic information, hindering data sharing, and posing challenges for biomedical research. Therefore, demand exists for an owner-governed system fulfilling owner authority, life cycle data encryption, and verifiability simultaneously.

View Article and Find Full Text PDF

Medical photography is crucial in modern medicine, and this article offers a five-step framework to help healthcare workers take clear, professional clinical photos. It is widely used globally for diagnosis, documentation, education, and publication. Smartphones have made capturing medical images easier, even without formal training, but quality varies without proper guidance.

View Article and Find Full Text PDF

Ethical insights into AI-driven caries detection: a scoping review.

BDJ Open

September 2025

Operative Dentistry & Endodontics, Department of Surgery, Aga Khan University Hospital, Karachi, Pakistan.

Background: Artificial Intelligence (AI) has become increasingly integrated into dental diagnostics, particularly for detecting carious lesions. While AI offers benefits such as improved accuracy and efficiency, its use raises important ethical concerns, including transparency, patient privacy, autonomy, diversity and accountability. This scoping review aims to identify these ethical concerns using a structured ethical framework.

View Article and Find Full Text PDF

Background: Mobile health (mHealth) interventions can be effective for people living with HIV, who are sensitive to privacy breach risks. Understanding the perceived experiences of intervention participants can provide comprehensive insights into potential users and predict intervention effectiveness. Thus, it is necessary to plan engagement measurement and consider ways to enhance engagement during the app development phase.

View Article and Find Full Text PDF