Skip to main content

Generative adversarial networks enhanced location privacy in 5G networks


5G networks, as the up-to-date communication platforms, are experiencing fast booming. Meanwhile, increasing volumes of sensitive data, especially location information, are being generated and shared using 5G networks for various purposes ceaselessly. Location and trajectory information in the published data has always been and will keep courting risks and attacks by malicious adversaries. Therefore, there are still privacy leakage threats by simply sharing the original data, especially data with location information, due to the short cover range of 5G signal tower. To better address these issues, we proposed a generative adversarial networks (GAN) enhanced location privacy protection model to cloak the location and even trajectory information. We use posterior sampling to generate a subset of data, which is proved complying with differential privacy requirements from the end device side. After that, a data augmentation algorithm modified from classic GAN is devised to generate a series of privacy-preserving full-sized synthetic data from the central server side. With the synthetic data generated from a real-world dataset, we demonstrate the superiority of the proposed model in terms of location privacy protection, data utility, and prediction accuracy.

This is a preview of subscription content, access via your institution.


  1. Ahmad I, Kumar T, Liyanage M, et al. Overview of 5G security challenges and solutions. IEEE Commun Stand Mag, 2018, 2: 36–43

    Article  Google Scholar 

  2. Domo. Data never sleeps. 2018.

  3. Qu Y Y, Yu S, Gao L X, et al. A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans Comput Soc Syst, 2018, 5: 773–784

    Article  Google Scholar 

  4. Ji X S, Huang K Z, Jin L, et al. Overview of 5G security technology. Sci China Inf Sci, 2018, 61: 081301

    Article  Google Scholar 

  5. Finlayson S G, Bowers J D, Ito J, et al. Adversarial attacks on medical machine learning. Science, 2019, 363: 1287–289

    Article  Google Scholar 

  6. Dwork C. Differential privacy. In: Proceedings of International Colloquium on Automata, Languages, and Programming, Venice, 2006

  7. Dwork C, Kenthapadi K, McSherry F, et al. Our data, ourselves: privacy via distributed noise generation. In: Proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, 2006. 486–503

  8. Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, San Francisco, 2003

  9. Qu Y Y, Yu S, Zhou W L, et al. Privacy of things: emerging challenges and opportunities in wireless Internet of things. IEEE Wirel Commun, 2018, 25: 91–97

    Article  Google Scholar 

  10. Chaudhary R, Kumar N, Zeadally S. Network service chaining in fog and cloud computing for the 5G environment: data management and security challenges. IEEE Commun Mag, 2017, 55: 114–122

    Article  Google Scholar 

  11. Zeng D Z, Gu L, Guo S, et al. Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system. IEEE Trans Comput, 2016, 65: 3702–3712

    MathSciNet  Article  Google Scholar 

  12. Eiza M H, Ni Q, Shi Q. Secure and privacy-aware cloud-assisted video reporting service in 5G-enabled vehicular networks. IEEE Trans Veh Technol, 2016, 65: 7868–7881

    Article  Google Scholar 

  13. Yu S. Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access, 2016, 4: 2751–2763

    Article  Google Scholar 

  14. Samarati P. Protecting respondents’ identities in microdata release. IEEE Trans Knowl Data Eng, 2001, 13: 1010–1027

    Article  Google Scholar 

  15. Machanavajjhala A, Kifer D, Gehrke J, et al. L-diversity: privacy beyond k-anonymity. IEEE Trans Knowl Data Eng, 2007. doi:

  16. Li N H, Li T C, Venkatasubramanian S. Closeness: a new privacy measure for data publishing. IEEE Trans Knowl Data Eng, 2010, 22: 943–956

    Article  Google Scholar 

  17. Qu Y Y, Yu S, Gao L X, et al. Big data set privacy preserving through sensitive attribute-based grouping. In: Proceedings of IEEE International Conference on Communications (ICC), 2017

  18. Ma L C, Pei Q Q, Qu Y Y, et al. Decentralized privacy-preserving reputation management for mobile crowdsensing. In: Proceedings of International Conference on Security and Privacy in Communication Systems, 2019. 532–548

  19. Xu C Q, Zhu L, Liu Y, et al. DP-LTOD: differential privacy latent trajectory community discovering services over location-based social networks. IEEE Trans Serv Comput, 2019. doi:

  20. Gu B S, Gao L X, Wang X D, et al. Privacy on the edge: customizable privacy-preserving context sharing in hierarchical edge computing. IEEE Trans Netw Sci Eng, 2019. doi:

  21. Qu Y Y, Nosouhi M R, Cui L, et al. Privacy preservation in smart cities. In: Smart Cities Cybersecurity Privacy. Amsterdam: Elsevier, 2019. 75–88

  22. Duan X Y, Wang X B. Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun Mag, 2015, 53: 28–35

    Article  Google Scholar 

  23. Zhang A Q, Lin X D. Security-Aware and privacy-preserving D2D communications in 5G. IEEE Netw, 2017, 31: 70–77

    Article  Google Scholar 

  24. Ni J B, Lin X D, Shen X S. Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J Sel Areas Commun, 2018, 36: 644–657

    Article  Google Scholar 

  25. Liao D, Li H, Sun G, et al. Location and trajectory privacy preservation in 5G-Enabled vehicle social network services. J Netw Comput Appl, 2018, 110: 108–118

    Article  Google Scholar 

  26. Qu Y Y, Pokhrel S R, Garg S, et al. A blockchained federated learning framework for cognitive computing in industry 4.0 networks. IEEE Trans Ind Inf, 2020. doi:

  27. Qu Y Y, Gao L X, Luan T H, et al. Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Int Things J, 2020, 7: 5171–5183

    Article  Google Scholar 

  28. Yu S, Zhou W L, Jia W J, et al. Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans Parallel Distrib Syst, 2012, 23: 1073–1080

    Article  Google Scholar 

  29. Yu S, Zhou W L, Doss R, et al. Traceback of DDoS attacks using entropy variations. IEEE Trans Parallel Distrib Syst, 2011, 22: 412–425

    Article  Google Scholar 

  30. Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative adversarial nets. In: Proceedings of Annual Conference on Neural Information Processing Systems, Montreal, 2014. 2672–2680

  31. Arjovsky M, Chintala S, Bottou L. Wasserstein generative adversarial networks. In: Proceedings of the 34th International Conference on Machine Learning, Sydney, 2017. 214–223

  32. Li C X, Xu T, Zhu J, et al. Triple generative adversarial nets. In: Proceedings of Annual Conference on Neural Information Processing Systems, Long Beach, 2017. 4091–4101

  33. Song S, Chaudhuri K, Sarwate A D. Stochastic gradient descent with differentially private updates. In: Proceedigns of IEEE Global Conference on Signal and Information Processing, Austin, 2013. 245–248

  34. Lee J, Kifer D. Concentrated differentially private gradient descent with adaptive per-iteration privacy budget. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, London, 2018. 1656–1665

  35. Qu Y Y, Yu S, Zhang J W, et al. GAN-DP: generative adversarial net driven differentially privacy-preserving big data publishing. In: Proceedings of IEEE International Conference on Communications (ICC), 2019

  36. Qu Y Y, Yu S, Zhou W L, et al. Gan-driven personalized spatial-temporal private data sharing in cyber-physical social systems. IEEE Trans Netw Sci Eng, 2020. doi:

  37. Dwork C, Feldman V, Hardt M, et al. The reusable holdout: preserving validity in adaptive data analysis. Science, 2015, 349: 636–638

    MathSciNet  Article  Google Scholar 

  38. Shokri R, Shmatikov V. Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, 2015. 1310–1321

  39. Abadi M, Chu A, Goodfellow I J, et al. Deep learning with differential privacy. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Vienna, 2016. 308–318

  40. Acs G, Melis L, Castelluccia C, et al. Differentially private mixture of generative neural networks. In: Proceedings of IEEE International Conference on Data Mining, New Orleans, 2017. 715–720

  41. Elshaer H, Boccardi F, Dohler M, et al. Downlink and uplink decoupling: a disruptive architectural design for 5G networks. In: Proceedings of IEEE Global Communications Conference, Austin, 2014. 1798–1803

  42. Wang Y X, Fienberg S E, Smola A J. Privacy for free: posterior sampling and stochastic gradient monte carlo. In: Proceedings of the 32nd International Conference on Machine Learning, Lille, 2015. 2493–2502

  43. Huang S W, Lin C T, Chen S P, et al. Auggan: cross domain adaptation with gan-based data augmentation. In: Proceedings of the 15th European Conference, Munich, 2018. 731–744

  44. Dheeru D, Taniskidou E K. UCI machine learning repository. 2017.

  45. Dwork C. Differential privacy. In: Encyclopedia of Cryptography and Security. 2nd ed. 2011. 338–340

Download references


This work was partly supported by JSPS KAKENHI (Grant No. JP19H04105).

Author information

Authors and Affiliations


Corresponding author

Correspondence to Shui Yu.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Qu, Y., Zhang, J., Li, R. et al. Generative adversarial networks enhanced location privacy in 5G networks. Sci. China Inf. Sci. 63, 220303 (2020).

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI:


  • 5G
  • privacy preservation
  • generative adversarial nets
  • differential privacy