{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T07:19:01Z","timestamp":1775546341686,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T00:00:00Z","timestamp":1685491200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271341"],"award-info":[{"award-number":["62271341"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702316"],"award-info":[{"award-number":["61702316"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["20201417"],"award-info":[{"award-number":["20201417"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["201901D211313"],"award-info":[{"award-number":["201901D211313"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["20210302123338"],"award-info":[{"award-number":["20210302123338"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["62271341"],"award-info":[{"award-number":["62271341"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["61702316"],"award-info":[{"award-number":["61702316"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["20201417"],"award-info":[{"award-number":["20201417"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201901D211313"],"award-info":[{"award-number":["201901D211313"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["20210302123338"],"award-info":[{"award-number":["20210302123338"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020771","name":"Natural Science Foundation for Young Scientists of Shanxi Province","doi-asserted-by":"publisher","award":["62271341"],"award-info":[{"award-number":["62271341"]}],"id":[{"id":"10.13039\/501100020771","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020771","name":"Natural Science Foundation for Young Scientists of Shanxi Province","doi-asserted-by":"publisher","award":["61702316"],"award-info":[{"award-number":["61702316"]}],"id":[{"id":"10.13039\/501100020771","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020771","name":"Natural Science Foundation for Young Scientists of Shanxi Province","doi-asserted-by":"publisher","award":["20201417"],"award-info":[{"award-number":["20201417"]}],"id":[{"id":"10.13039\/501100020771","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020771","name":"Natural Science Foundation for Young Scientists of Shanxi Province","doi-asserted-by":"publisher","award":["201901D211313"],"award-info":[{"award-number":["201901D211313"]}],"id":[{"id":"10.13039\/501100020771","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020771","name":"Natural Science Foundation for Young Scientists of Shanxi Province","doi-asserted-by":"publisher","award":["20210302123338"],"award-info":[{"award-number":["20210302123338"]}],"id":[{"id":"10.13039\/501100020771","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["62271341"],"award-info":[{"award-number":["62271341"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["61702316"],"award-info":[{"award-number":["61702316"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["20201417"],"award-info":[{"award-number":["20201417"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["201901D211313"],"award-info":[{"award-number":["201901D211313"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["20210302123338"],"award-info":[{"award-number":["20210302123338"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Location-based services (LBS) are widely used due to the rapid development of mobile devices and location technology. Users usually provide precise location information to LBS to access the corresponding services. However, this convenience comes with the risk of location privacy disclosure, which can infringe upon personal privacy and security. In this paper, a location privacy protection method based on differential privacy is proposed, which efficiently protects users\u2019 locations, without degrading the performance of LBS. First, a location-clustering (L-clustering) algorithm is proposed to divide the continuous locations into different clusters based on the distance and density relationships among multiple groups. Then, a differential privacy-based location privacy protection algorithm (DPLPA) is proposed to protect users\u2019 location privacy, where Laplace noise is added to the resident points and centroids within the cluster. The experimental results show that the DPLPA achieves a high level of data utility, with minimal time consumption, while effectively protecting the privacy of location information.<\/jats:p>","DOI":"10.3390\/s23115219","type":"journal-article","created":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T07:21:51Z","timestamp":1685517711000},"page":"5219","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An Efficient Differential Privacy-Based Method for Location Privacy Protection in Location-Based Services"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0394-1482","authenticated-orcid":false,"given":"Bo","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electronic Information Engineering, Taiyuan University of Science and Technology, Taiyuan 030024, China"}]},{"given":"Hongtao","family":"Li","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Shanxi Normal University, Taiyuan 030039, China"}]},{"given":"Xiaoyu","family":"Ren\u00a0","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Shanxi Normal University, Taiyuan 030039, China"}]},{"given":"Yina","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Electronic Information Engineering, Taiyuan University of Science and Technology, Taiyuan 030024, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"11752","DOI":"10.1109\/TITS.2021.3106783","article-title":"SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks","volume":"23","author":"Chen","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Xu, X.Y., Chen, H.F., and Xie, L. (2021). A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles. Appl. Sci., 11.","DOI":"10.3390\/app11104594"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1007\/s12065-020-00375-y","article-title":"A novel authentication and authorization scheme in P2P networking using location-based privacy","volume":"15","author":"Jagdale","year":"2022","journal-title":"Evol. Intell."},{"key":"ref_4","unstructured":"Uday, J., and Ghosh, M. (2022). Security, Privacy and Data Analytics, Springer."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4367","DOI":"10.1109\/TITS.2021.3086837","article-title":"Optimal location privacy preserving and service quality guaranteed task allocation in vehicle-based crowdsensing networks","volume":"22","author":"Qian","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.1109\/JIOT.2018.2842773","article-title":"Enhancing privacy and availability for data clustering in intelligent electrical service of IoT","volume":"6","author":"Xiong","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"4231","DOI":"10.1109\/TII.2019.2948068","article-title":"A personalized privacy protection framework for mobile crowdsensing in IIoT","volume":"16","author":"Xiong","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_8","first-page":"19","article-title":"Research on k-anonymity Algorithm for Personalized Quasi-identifier Attributes","volume":"20","author":"He","year":"2020","journal-title":"Inf. Netw. Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"115120","DOI":"10.1016\/j.eswa.2021.115120","article-title":"Differentially private and utility-aware publication of trajectory data","volume":"180","author":"Liu","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref_10","first-page":"937","article-title":"A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics","volume":"21","author":"Zhang","year":"2019","journal-title":"Int. J. Netw. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3199","DOI":"10.1109\/LCOMM.2021.3072671","article-title":"A location privacy protection algorithm based on double K-anonymity in the social internet of vehicles","volume":"25","author":"Xing","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"54264","DOI":"10.1109\/ACCESS.2021.3071407","article-title":"Semantic and Trade-off Aware Location Privacy Protection in Road Networks via Improved Multi-objective Particle Swarm Optimization","volume":"9","author":"Tian","year":"2021","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"106610","DOI":"10.1016\/j.ijepes.2020.106610","article-title":"Lightweight blockchain framework for location-aware peer-to-peer energy trading","volume":"127","author":"Khorasany","year":"2021","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"12768","DOI":"10.1109\/ACCESS.2020.2964422","article-title":"Service Recommendation Middleware Based on Location Privacy Protection in VANET","volume":"8","author":"Zheng","year":"2020","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"105940","DOI":"10.1016\/j.knosys.2020.105940","article-title":"Novel trajectory privacy-preserving method based on prefix tree using differential privacy","volume":"198","author":"Zhao","year":"2020","journal-title":"Knowl.-Based Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.ins.2019.02.025","article-title":"APS: Attribute-aware privacy-preserving scheme in location-based services","volume":"527","author":"Li","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.jpdc.2018.09.005","article-title":"A privacy preserving location service for cloud-of-things system-Science Direct","volume":"123","author":"Yuan","year":"2019","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_18","unstructured":"Partovi, A., Zheng, W., Jung, T., and Lin, H. (2020). Ensuring Privacy in Location-Based Services: A Model-based Approach. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Yang, X., Gao, L., Wang, H., Li, Y., Zheng, J., Xu, J., and Ma, Y. (2021, January 14\u201316). A User-related Semantic Location Privacy Protection Method in Location-based Service. Proceedings of the IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), Beijing, China.","DOI":"10.1109\/ICPADS53394.2021.00092"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.procs.2020.04.004","article-title":"Graph Similarity-based Hierarchical Clustering of Trajectory Data","volume":"171","author":"Sabarish","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"101728","DOI":"10.1016\/j.is.2021.101728","article-title":"Privacy-preserving location data stream clustering on mobile edge computing and cloud","volume":"107","author":"Stephanie","year":"2022","journal-title":"Inf. Syst."},{"key":"ref_22","first-page":"930","article-title":"Personalized location privacy protection algorithm in crowd sensing networks","volume":"36","author":"Hu","year":"2019","journal-title":"Appl. Res. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wang, S., Nepal, S., Sinnott, R., and Rudolph, C. (2019, January 8\u201313). P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories. Proceedings of the IEEE International Conference on Web Services (ICWS), Milan, Italy.","DOI":"10.1109\/ICWS.2019.00014"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"54483","DOI":"10.1109\/ACCESS.2019.2912006","article-title":"Location Correlated Differential Privacy Protection Based on Mobile Feature Analysis","volume":"7","author":"Peng","year":"2019","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2407","DOI":"10.1007\/s11280-019-00682-0","article-title":"PrivSem: Protecting location privacy using semantic and differential privacy","volume":"22","author":"Li","year":"2019","journal-title":"World Wide Web"},{"key":"ref_26","first-page":"500","article-title":"Transfer Collaborative Fuzzy Clustering in Distributed Peer-to-Peer Networks","volume":"99","author":"Dang","year":"2020","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_27","first-page":"101728","article-title":"Development of the geometrical feature extraction tool using DBSCAN clustering for toolpath generation in incremental forming","volume":"107","author":"Nagargoje","year":"2022","journal-title":"Inf. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.neucom.2020.02.130","article-title":"Social space keyword query based on semantic trajectory","volume":"428","author":"Cao","year":"2020","journal-title":"Neurocomputing"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"21823","DOI":"10.1007\/s11042-021-10789-0","article-title":"Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability","volume":"80","author":"Luo","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Cunha, M., Mendes, R., and Vilela, J.P. (2019, January 10\u201312). Clustering geo-indistinguishability for privacy of continuous location traces. Proceedings of the IEEE 4th International Conference on Computing, Communications and Security (ICCCS), Rome, Italy.","DOI":"10.1109\/CCCS.2019.8888111"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"113241","DOI":"10.1016\/j.eswa.2020.113241","article-title":"Novel trajectory privacy-preserving method based on clustering using differential privacy","volume":"149","author":"Zhao","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"9925","DOI":"10.1109\/TVT.2022.3178379","article-title":"AUV-aided Data Importance based Scheme for Protecting Location Privacy in Smart Ocean","volume":"71","author":"Han","year":"2022","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/11\/5219\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:45:45Z","timestamp":1760125545000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/11\/5219"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,31]]},"references-count":32,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["s23115219"],"URL":"https:\/\/doi.org\/10.3390\/s23115219","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,31]]}}}