Machine Learning and Intelligent Communications. Second International Conference, MLICOM 2017, Weihai, China, August 5-6, 2017, Proceedings, Part I

Research Article

Privacy Protection for Location Sharing Services in Social Networks

Download
195 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-73564-1_10,
        author={Hui Wang and Juan Chen and Xianzhi Wang and Xin Liu and Zhenyu Na},
        title={Privacy Protection for Location Sharing Services in Social Networks},
        proceedings={Machine Learning and Intelligent Communications. Second International Conference, MLICOM 2017, Weihai, China, August 5-6, 2017, Proceedings, Part I},
        proceedings_a={MLICOM},
        year={2018},
        month={2},
        keywords={Privacy protection protocol Location sharing Wireless social network},
        doi={10.1007/978-3-319-73564-1_10}
    }
    
  • Hui Wang
    Juan Chen
    Xianzhi Wang
    Xin Liu
    Zhenyu Na
    Year: 2018
    Privacy Protection for Location Sharing Services in Social Networks
    MLICOM
    Springer
    DOI: 10.1007/978-3-319-73564-1_10
Hui Wang1,*, Juan Chen2,*, Xianzhi Wang3, Xin Liu4, Zhenyu Na2
  • 1: National Computer Network Emergency Response Technical Team/Coordination Center of China
  • 2: Dalian Maritime University
  • 3: University of New South Wales
  • 4: Dalian University of Technology
*Contact email: wh@cert.org.cn, juanchencs@gmail.com

Abstract

Recently, there is an increase interest in location sharing services in social networks. Behind the convenience brought by location sharing, there comes an indispensable security risk of privacy. Though many efforts have been made to protect user’s privacy for location sharing, they are not suitable for social network. Most importantly, little research so far can support user relationship privacy and identity privacy. Thus, we propose a new privacy protection protocol for location sharing in social networks. Different from previous work, the proposed protocol can provide perfect privacy for location sharing services. Simulation results validate the feasibility and efficiency of the proposed protocol.