Skip to main content
Erschienen in: Distributed and Parallel Databases 3/2015

01.09.2015

A privacy-aware monitoring algorithm for moving \(k\)-nearest neighbor queries in road networks

verfasst von: Hyung-Ju Cho, Se Jin Kwon, Rize Jin, Tae-Sun Chung

Erschienen in: Distributed and Parallel Databases | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Location privacy is a major obstacle in the ubiquitous deployment of mobile and pervasive computing services. In this study, we present a new approach for preserving the trajectory privacy of moving \(k\)-nearest neighbor (M\(k\)NN) queries in road networks. Several location anonymization algorithms have been proposed for providing location privacy to users traveling on a road network. These algorithms focus primarily on the location anonymization of snapshot queries. Indeed, users move freely and arbitrarily, and thus query results provided to them soon become invalid as their locations change. To refresh the query result, each user must therefore periodically contact the location-based service, enabling attackers to identify and track the user easily. In addition, frequent location updates for the user may incur severe computational and communication costs. We address these issues by proposing a privacy-aware monitoring algorithm, called PAMA, for preserving the trajectory privacy of M\(k\)NN queries in road networks. Our simulation results show that PAMA significantly outperforms conventional algorithms in terms of both security and performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of WWW, pp. 237–246, (2008) Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of WWW, pp. 237–246, (2008)
2.
Zurück zum Zitat Bamba, B., Liu, L., Iyengar, A., Yu, P.: Distributed processing of spatial alarms: a safe region-based approach. In: Proceedings of ICDCS, pp. 207–214, (2009) Bamba, B., Liu, L., Iyengar, A., Yu, P.: Distributed processing of spatial alarms: a safe region-based approach. In: Proceedings of ICDCS, pp. 207–214, (2009)
3.
Zurück zum Zitat Bao, J., Chow, C., Mokbel, M., Ku, W.: Efficient evaluation of \(k\)-range nearest neighbor queries in road networks. In: Proceedings of Mobile Data Management, pp. 115–124, (2010) Bao, J., Chow, C., Mokbel, M., Ku, W.: Efficient evaluation of \(k\)-range nearest neighbor queries in road networks. In: Proceedings of Mobile Data Management, pp. 115–124, (2010)
4.
Zurück zum Zitat Brinkhoff, T.: A framework for generating network-based moving cbjects. GeoInformatica 6(2), 153–180 (2002)CrossRefMATH Brinkhoff, T.: A framework for generating network-based moving cbjects. GeoInformatica 6(2), 153–180 (2002)CrossRefMATH
5.
Zurück zum Zitat Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures, pp. 393–412. In: Proceedings of Privacy Enhancing Technologies, Workshop (2006) Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures, pp. 393–412. In: Proceedings of Privacy Enhancing Technologies, Workshop (2006)
6.
Zurück zum Zitat Cho, H., Chung, C.: An efficient scalable approach to CNN queries in a road network. In: Proceedings of VLDB, pp. 865–876, (2005) Cho, H., Chung, C.: An efficient scalable approach to CNN queries in a road network. In: Proceedings of VLDB, pp. 865–876, (2005)
7.
Zurück zum Zitat Cho, H., Choe, S., Chung, T.: A distributed approach to continuous monitoring of constrained \(k\)-nearest neighbor queries in road networks. Mob. Inf. Syst. 8(2), 107–126 (2012) Cho, H., Choe, S., Chung, T.: A distributed approach to continuous monitoring of constrained \(k\)-nearest neighbor queries in road networks. Mob. Inf. Syst. 8(2), 107–126 (2012)
8.
Zurück zum Zitat Cho, H.: Continuous range \(k\)-nearest neighbor queries in vehicular ad hoc networks. J. Syst. Softw. 86(5), 1323–1332 (2013)CrossRef Cho, H.: Continuous range \(k\)-nearest neighbor queries in vehicular ad hoc networks. J. Syst. Softw. 86(5), 1323–1332 (2013)CrossRef
9.
Zurück zum Zitat Chow, C., Mokbel, M., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351–380 (2011)CrossRef Chow, C., Mokbel, M., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351–380 (2011)CrossRef
10.
Zurück zum Zitat Chow, C., Mokbel, M., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Trans. Mob. Comput. 10(1), 94–107 (2011)CrossRef Chow, C., Mokbel, M., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Trans. Mob. Comput. 10(1), 94–107 (2011)CrossRef
11.
Zurück zum Zitat Chow, C., Mokbel, M.: Enabling private continuous queries for revealed user locations. In: Proceedings of SSTD, pp. 258–275, (2007) Chow, C., Mokbel, M.: Enabling private continuous queries for revealed user locations. In: Proceedings of SSTD, pp. 258–275, (2007)
12.
Zurück zum Zitat Chow, C., Mokbel, M., Aref, W.: Casper*: Query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4), 1–45 (2009)CrossRef Chow, C., Mokbel, M., Aref, W.: Casper*: Query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4), 1–45 (2009)CrossRef
13.
Zurück zum Zitat Chow, C., Mokbel, M., Bao, J., Liu, X.: Query-aware location anonymization for road networks. GeoInformatica 15(3), 571–607 (2011)CrossRef Chow, C., Mokbel, M., Bao, J., Liu, X.: Query-aware location anonymization for road networks. GeoInformatica 15(3), 571–607 (2011)CrossRef
14.
Zurück zum Zitat Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms, 2nd edn, pp. 595–601. MIT Press, Cambridge (2001)MATH Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms, 2nd edn, pp. 595–601. MIT Press, Cambridge (2001)MATH
16.
Zurück zum Zitat Divanis, A., Verykios, V., Mokbel, M.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of SDM, pp. 942–953, (2009) Divanis, A., Verykios, V., Mokbel, M.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of SDM, pp. 942–953, (2009)
17.
Zurück zum Zitat Gedik, B., Liu, L.: Protecting location privacy with personalized \(k\)-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)CrossRef Gedik, B., Liu, L.: Protecting location privacy with personalized \(k\)-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)CrossRef
18.
Zurück zum Zitat Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of SIGMOD, pp. 121–132, (2008) Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of SIGMOD, pp. 121–132, (2008)
19.
Zurück zum Zitat Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of WWW, pp. 371–380, (2007) Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of WWW, pp. 371–380, (2007)
20.
Zurück zum Zitat Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobilea peer-to-peer system for anonymous location-based queries. In: Proceedings of SSTD, pp. 221–238, (2007) Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobilea peer-to-peer system for anonymous location-based queries. In: Proceedings of SSTD, pp. 221–238, (2007)
21.
Zurück zum Zitat Gruteser, M., Hoh, B.: On the anonymity of periodic location samples. In: Proceedings of SPC, pp. 179–192, (2005) Gruteser, M., Hoh, B.: On the anonymity of periodic location samples. In: Proceedings of SPC, pp. 179–192, (2005)
22.
Zurück zum Zitat Hashem, T., Kulik, L., Zhang, R.: Protecting trajectory privacy for moving KNN queries. To appear in VLDB Journal. Hashem, T., Kulik, L., Zhang, R.: Protecting trajectory privacy for moving KNN queries. To appear in VLDB Journal.
23.
Zurück zum Zitat Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proceedings of CCS, pp. 161–171, (2007) Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proceedings of CCS, pp. 161–171, (2007)
24.
Zurück zum Zitat Hu, H., Xu, J., Lee, D.: A generic framework for monitoring continuous spatial queries over moving objects. In: Proceedngs of SIGMOD, pp. 479–490, (2005) Hu, H., Xu, J., Lee, D.: A generic framework for monitoring continuous spatial queries over moving objects. In: Proceedngs of SIGMOD, pp. 479–490, (2005)
25.
Zurück zum Zitat Hu, H., Xu, J., Lee, D.: PAM: an efficient and privacy-aware monitoring framework for continuously moving objects. IEEE Trans. Knowl. Data Eng. 22(3), 404–419 (2010)CrossRef Hu, H., Xu, J., Lee, D.: PAM: an efficient and privacy-aware monitoring framework for continuously moving objects. IEEE Trans. Knowl. Data Eng. 22(3), 404–419 (2010)CrossRef
26.
Zurück zum Zitat Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proceedings of ICDE Workshops, pp. 1248, (2005) Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proceedings of ICDE Workshops, pp. 1248, (2005)
27.
Zurück zum Zitat Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of SSTD, pp. 239–257, (2007) Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of SSTD, pp. 239–257, (2007)
28.
Zurück zum Zitat Ku, W., Zimmermann, R., Peng, W., Shroff, S.: Privacy protected query processing on spatial networks. In: Proceedings of ICDE Workshops, pp. 215–220, (2007) Ku, W., Zimmermann, R., Peng, W., Shroff, S.: Privacy protected query processing on spatial networks. In: Proceedings of ICDE Workshops, pp. 215–220, (2007)
29.
Zurück zum Zitat Lee, K., Lee, W., Leong, H., Zheng, B.: Navigational path privacy protection: navigational path privacy protection. In: Proceedings of CIKM, pp. 691–700, (2009) Lee, K., Lee, W., Leong, H., Zheng, B.: Navigational path privacy protection: navigational path privacy protection. In: Proceedings of CIKM, pp. 691–700, (2009)
30.
Zurück zum Zitat Li, P., Peng, W., Wang, T., Ku, W., Xu, J., Hamilton Jr, J.: A cloaking algorithm based on spatial networks for location privacy. In: Proceedings of SUTC, pp. 90–97, (2008) Li, P., Peng, W., Wang, T., Ku, W., Xu, J., Hamilton Jr, J.: A cloaking algorithm based on spatial networks for location privacy. In: Proceedings of SUTC, pp. 90–97, (2008)
31.
Zurück zum Zitat Meyerowitz, J., Choudhury, R.: Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of MOBICOM, pp. 345–356, (2009) Meyerowitz, J., Choudhury, R.: Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of MOBICOM, pp. 345–356, (2009)
32.
Zurück zum Zitat Mokbel, M., Chow, C., Aref, W.: The new Casper: query processing for location services without compromising privacy. In: Proceedings of VLDB, pp. 763–774, (2006) Mokbel, M., Chow, C., Aref, W.: The new Casper: query processing for location services without compromising privacy. In: Proceedings of VLDB, pp. 763–774, (2006)
33.
Zurück zum Zitat Mouratidis, K., Yiu, M.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. 22(1), 2–15 (2010)CrossRef Mouratidis, K., Yiu, M.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. 22(1), 2–15 (2010)CrossRef
34.
Zurück zum Zitat Mouratidis, K., Yiu, M., Papadias, D., Mamoulis, N.: Continuous nearest neighbor monitoring in road networks. In: Proceedings of VLDB, pp. 43–54, (2006) Mouratidis, K., Yiu, M., Papadias, D., Mamoulis, N.: Continuous nearest neighbor monitoring in road networks. In: Proceedings of VLDB, pp. 43–54, (2006)
35.
Zurück zum Zitat Shokri, R., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J.: Collaborative location privacy. In: Proceedings of MASS, pp. 500–509 (2011) Shokri, R., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J.: Collaborative location privacy. In: Proceedings of MASS, pp. 500–509 (2011)
36.
Zurück zum Zitat Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH
37.
Zurück zum Zitat Palanisamy, B., Liu, L.: MobiMix: Protecting location privacy with mix-zones over road networks. In: Proceedings of ICDE, pp. 494–505, (2011) Palanisamy, B., Liu, L.: MobiMix: Protecting location privacy with mix-zones over road networks. In: Proceedings of ICDE, pp. 494–505, (2011)
38.
Zurück zum Zitat Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506–1519 (2012)CrossRef Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506–1519 (2012)CrossRef
39.
Zurück zum Zitat Papadias, D., Zhang, J., Mamoulis, N., Tao, Y.: Query processing in spatial network databases. In: Proceedings of VLDB, pp. 802–813, (2003) Papadias, D., Zhang, J., Mamoulis, N., Tao, Y.: Query processing in spatial network databases. In: Proceedings of VLDB, pp. 802–813, (2003)
40.
Zurück zum Zitat Wang, T., Liu, L.: Privacy-aware mobile services over road networks. PVLDB 2(1), 1042–1053 (2009) Wang, T., Liu, L.: Privacy-aware mobile services over road networks. PVLDB 2(1), 1042–1053 (2009)
41.
Zurück zum Zitat Xu, J., Tang, X., Hu, H., Du, J.: Privacy-conscious location-based queries in mobile environments. IEEE Trans. Parallel Distrib. Syst. 21(3), 313–326 (2010)CrossRef Xu, J., Tang, X., Hu, H., Du, J.: Privacy-conscious location-based queries in mobile environments. IEEE Trans. Parallel Distrib. Syst. 21(3), 313–326 (2010)CrossRef
42.
Zurück zum Zitat Xu, T., Cai, Y.L: Location anonymity in continuous location-based services. In: Proceedings of ACM GIS, (2007) Xu, T., Cai, Y.L: Location anonymity in continuous location-based services. In: Proceedings of ACM GIS, (2007)
43.
Zurück zum Zitat Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of INFOCOM, pp. 547–555, (2008) Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of INFOCOM, pp. 547–555, (2008)
44.
Zurück zum Zitat Yiu, M., Jensen, C., Huang, X., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of ICDE, pp. 366–375, (2008) Yiu, M., Jensen, C., Huang, X., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of ICDE, pp. 366–375, (2008)
45.
Zurück zum Zitat Yung, D., Yiu, M., Lo, E.: A safe-exit approach for efficient network-based moving range queries. Data Knowl. Eng. 72, 126–147 (2012)CrossRef Yung, D., Yiu, M., Lo, E.: A safe-exit approach for efficient network-based moving range queries. Data Knowl. Eng. 72, 126–147 (2012)CrossRef
Metadaten
Titel
A privacy-aware monitoring algorithm for moving -nearest neighbor queries in road networks
verfasst von
Hyung-Ju Cho
Se Jin Kwon
Rize Jin
Tae-Sun Chung
Publikationsdatum
01.09.2015
Verlag
Springer US
Erschienen in
Distributed and Parallel Databases / Ausgabe 3/2015
Print ISSN: 0926-8782
Elektronische ISSN: 1573-7578
DOI
https://doi.org/10.1007/s10619-014-7152-z

Weitere Artikel der Ausgabe 3/2015

Distributed and Parallel Databases 3/2015 Zur Ausgabe