Generative adversarial networks enhanced location privacy in 5G networks
Version 2 2024-06-06, 07:29Version 2 2024-06-06, 07:29
Version 1 2020-11-26, 10:47Version 1 2020-11-26, 10:47
journal contribution
posted on 2024-06-06, 07:29 authored by Y Qu, J Zhang, R Li, X Zhang, X Zhai, S Yu© 2020, Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature. 5G networks, as the up-to-date communication platforms, are experiencing fast booming. Meanwhile, increasing volumes of sensitive data, especially location information, are being generated and shared using 5G networks for various purposes ceaselessly. Location and trajectory information in the published data has always been and will keep courting risks and attacks by malicious adversaries. Therefore, there are still privacy leakage threats by simply sharing the original data, especially data with location information, due to the short cover range of 5G signal tower. To better address these issues, we proposed a generative adversarial networks (GAN) enhanced location privacy protection model to cloak the location and even trajectory information. We use posterior sampling to generate a subset of data, which is proved complying with differential privacy requirements from the end device side. After that, a data augmentation algorithm modified from classic GAN is devised to generate a series of privacy-preserving full-sized synthetic data from the central server side. With the synthetic data generated from a real-world dataset, we demonstrate the superiority of the proposed model in terms of location privacy protection, data utility, and prediction accuracy.
History
Journal
Science China Information SciencesVolume
63Article number
ARTN 220303Location
Beijing, ChinaPublisher DOI
ISSN
1674-733XeISSN
1869-1919Language
EnglishPublication classification
C1 Refereed article in a scholarly journalCopyright notice
2020, Science China Press and Springer-Verlag GmbH GermanyIssue
12Publisher
SCIENCE PRESSUsage metrics
Categories
Keywords
Science & TechnologyTechnologyComputer Science, Information SystemsEngineering, Electrical & ElectronicComputer ScienceEngineering5Gprivacy preservationgenerative adversarial netsdifferential privacyPROTECTIONMANAGEMENTFaculty of Science Engineering and Built EnvironmentSchool of Information Technology4604 Cybersecurity and privacy
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC