Skip to main content
Erschienen in: Soft Computing 18/2018

12.06.2017 | Methodologies and Application

A trajectory privacy-preserving scheme based on query exchange in mobile social networks

verfasst von: Shaobo Zhang, Guojun Wang, Qin Liu, Jemal H. Abawajy

Erschienen in: Soft Computing | Ausgabe 18/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the increase in the number of active location-based service (LBS) users, protecting the privacy of user trajectory has become a significant concern. In this paper, we propose a deviation-based query exchange (DQE) scheme that obfuscates the users’ query point to mitigate trajectory disclosure in mobile social networks (MSNs). The user finds a best matching user (BMU) in an MSN to exchange queries when a query request is issued. The DQE scheme can prevent the attacker from reconstructing the user’s trajectory by collecting data from the LBS server which records only the user’s ID and his BMUs’ locations (fake locations). By virtue of the private matching algorithm based on the matrix confusion, the DQE scheme allows LBS users to enjoy the service while preserving their privacy. In order to test the effectiveness and efficiency of the proposed scheme, we carried out extensive security and performance analyses under various conditions. The results of the experiments show that the proposed DQE scheme can protect users’ trajectory privacy effectively and reduce the overhead of the LBS server.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Brinkhoff T (2003) Generating traffic data. Bull Tech Comm Data Eng IEEE Comput Soc 26:2003 Brinkhoff T (2003) Generating traffic data. Bull Tech Comm Data Eng IEEE Comput Soc 26:2003
Zurück zum Zitat Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in spatial and temporal databases, international symposium, SSTD 2007, Boston, MA, USA. pp 258–275. 16–18 Jul 2007 Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in spatial and temporal databases, international symposium, SSTD 2007, Boston, MA, USA. pp 258–275. 16–18 Jul 2007
Zurück zum Zitat Chow CY (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: ACM international symposium on geographic information systems, ACM-Gis 2006, Arlington, VA, USA. pp 171–178. 10–11 Nov 2006 Chow CY (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: ACM international symposium on geographic information systems, ACM-Gis 2006, Arlington, VA, USA. pp 171–178. 10–11 Nov 2006
Zurück zum Zitat Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM, New york Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM, New york
Zurück zum Zitat Dai J, Hua L (2015) A method for the trajectory privacy protection based on the segmented fake trajectory under road networks. In: International conference on information science and control engineering. pp 13–17 Dai J, Hua L (2015) A method for the trajectory privacy protection based on the segmented fake trajectory under road networks. In: International conference on information science and control engineering. pp 13–17
Zurück zum Zitat Ficco M, Pietrantuono R, Russo S (2016) Using multi-objective metaheuristics for the optimal selection of positioning systems. Soft Comput 20(7):2641–2664CrossRef Ficco M, Pietrantuono R, Russo S (2016) Using multi-objective metaheuristics for the optimal selection of positioning systems. Soft Comput 20(7):2641–2664CrossRef
Zurück zum Zitat Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200CrossRef Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200CrossRef
Zurück zum Zitat Gao S, Ma J, Shi W, Zhan G, Sun C (2013) TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887CrossRef Gao S, Ma J, Shi W, Zhan G, Sun C (2013) TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887CrossRef
Zurück zum Zitat Huo Z, Huang Y, Meng X (2011) History trajectory privacy-preserving through graph partition. In International workshop on mobile location-based service. pp 71–78 Huo Z, Huang Y, Meng X (2011) History trajectory privacy-preserving through graph partition. In International workshop on mobile location-based service. pp 71–78
Zurück zum Zitat Huo Z, Meng X, Hu H, Huang Y (2012) You can walk alone: trajectory privacy-preserving through significant stays protection. In: International conference on database systems for advanced applications. pp 351–366 Huo Z, Meng X, Hu H, Huang Y (2012) You can walk alone: trajectory privacy-preserving through significant stays protection. In: International conference on database systems for advanced applications. pp 351–366
Zurück zum Zitat Hwang RH, Hsueh YL, Chung HW (2014) A novel time-obfuscated algorithm for trajectory privacy protection. In: International symposium on pervasive systems, algorithms and networks. pp 208–215 Hwang RH, Hsueh YL, Chung HW (2014) A novel time-obfuscated algorithm for trajectory privacy protection. In: International symposium on pervasive systems, algorithms and networks. pp 208–215
Zurück zum Zitat Jin L, Palanisamy B, Joshi JBD (2014) Poster: compromising cloaking-based location privacy preserving mechanisms with location injection attacks. In: ACM SIGSAC conference on computer and communications security. pp 1439–1441 Jin L, Palanisamy B, Joshi JBD (2014) Poster: compromising cloaking-based location privacy preserving mechanisms with location injection attacks. In: ACM SIGSAC conference on computer and communications security. pp 1439–1441
Zurück zum Zitat Kim HI, Kim YK, Chang JW (2013) A grid-based coaking area creation scheme for continuous LBS queries in distributed systems. JoC 4(1):23–30 Kim HI, Kim YK, Chang JW (2013) A grid-based coaking area creation scheme for continuous LBS queries in distributed systems. JoC 4(1):23–30
Zurück zum Zitat Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener Comput Syst 63(C):56–75CrossRef Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener Comput Syst 63(C):56–75CrossRef
Zurück zum Zitat Lei PR, Peng WC, Su J, Chang CP (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350MathSciNet Lei PR, Peng WC, Su J, Chang CP (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350MathSciNet
Zurück zum Zitat Li X, Miao M, Liu H, Ma J, Li KC (2016) An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Comput. doi:10.1007/s00500-016-2040-2 Li X, Miao M, Liu H, Ma J, Li KC (2016) An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Comput. doi:10.​1007/​s00500-016-2040-2
Zurück zum Zitat Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233CrossRef Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233CrossRef
Zurück zum Zitat Niu B , Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: INFOCOM, 2014 proceedings IEEE. pp 754–762 Niu B , Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: INFOCOM, 2014 proceedings IEEE. pp 754–762
Zurück zum Zitat Niu B, Zhu X, Chi H, Li H (2013) 3plus: privacy-preserving pseudo-location updating system in location-based services. In: Wireless communications and networking conference. pp 4564–4569 Niu B, Zhu X, Chi H, Li H (2013) 3plus: privacy-preserving pseudo-location updating system in location-based services. In: Wireless communications and networking conference. pp 4564–4569
Zurück zum Zitat Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495–508CrossRef Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495–508CrossRef
Zurück zum Zitat Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519CrossRef Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519CrossRef
Zurück zum Zitat Primault V, Boutet A, Mokhtar SB, Brunie L (2016) Adaptive location privacy with alp. In: The 35th symposium on reliable distributed systems, pp 269–278 Primault V, Boutet A, Mokhtar SB, Brunie L (2016) Adaptive location privacy with alp. In: The 35th symposium on reliable distributed systems, pp 269–278
Zurück zum Zitat Sang Y, Shen H, Tian H, Zhang Z (2016) Achieving probabilistic anonymity in a linear and hybrid randomization model. IEEE Trans Inf Forensics Secur 11(10):2187–2202CrossRef Sang Y, Shen H, Tian H, Zhang Z (2016) Achieving probabilistic anonymity in a linear and hybrid randomization model. IEEE Trans Inf Forensics Secur 11(10):2187–2202CrossRef
Zurück zum Zitat Schlegel R, Chow CY, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172CrossRef Schlegel R, Chow CY, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172CrossRef
Zurück zum Zitat Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux JP (2014) Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans Dependable Secur Comput 11(3):266–279CrossRef Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux JP (2014) Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans Dependable Secur Comput 11(3):266–279CrossRef
Zurück zum Zitat Sui X, Chen Z, Guo L, Kai W, Ma J, Wang G (2017) Social media as sensor in real world: movement trajectory detection with microblog. Soft Comput 21(3):765–779CrossRef Sui X, Chen Z, Guo L, Kai W, Ma J, Wang G (2017) Social media as sensor in real world: movement trajectory detection with microblog. Soft Comput 21(3):765–779CrossRef
Zurück zum Zitat Tang F, Li J, You I, Guo M (2016) Long-term location privacy protection for location-based services in mobile cloud computing. Soft Comput 20(5):1735–1747CrossRef Tang F, Li J, You I, Guo M (2016) Long-term location privacy protection for location-based services in mobile cloud computing. Soft Comput 20(5):1735–1747CrossRef
Zurück zum Zitat Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: International conference on mobile data management. pp 65–72 Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: International conference on mobile data management. pp 65–72
Zurück zum Zitat Vu K, Zheng R, Gao J (2012) Efficient algorithms for k-anonymous location privacy in participatory sensing. Proc IEEE INFOCOM 131(5):2399–2407 Vu K, Zheng R, Gao J (2012) Efficient algorithms for k-anonymous location privacy in participatory sensing. Proc IEEE INFOCOM 131(5):2399–2407
Zurück zum Zitat Wang G, Du Q, Zhou W, Liu Q (2013) A scalable encryption scheme for multi-privileged group communications. J Supercomput 64(3):1075–1091CrossRef Wang G, Du Q, Zhou W, Liu Q (2013) A scalable encryption scheme for multi-privileged group communications. J Supercomput 64(3):1075–1091CrossRef
Zurück zum Zitat Wang X, Pande A, Zhu J, Mohapatra P (2016) Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans Netw 99:1–1 Wang X, Pande A, Zhu J, Mohapatra P (2016) Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans Netw 99:1–1
Zurück zum Zitat Xiao X, Chen C, Sangaiah AK, Hu G, Ye R, Jiang Y (2017) Cenlocshare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener Comput Syst. doi:10.1016/j.future.2017.01.035 Xiao X, Chen C, Sangaiah AK, Hu G, Ye R, Jiang Y (2017) Cenlocshare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener Comput Syst. doi:10.​1016/​j.​future.​2017.​01.​035
Zurück zum Zitat Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559CrossRef Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559CrossRef
Zurück zum Zitat Zhang S, Liu Q, Wang G (2015) Deviation-based location switching protocol for trajectory privacy protection. Springer, BerlinCrossRef Zhang S, Liu Q, Wang G (2015) Deviation-based location switching protocol for trajectory privacy protection. Springer, BerlinCrossRef
Zurück zum Zitat Zhu X, Liu J, Jiang S, Chen Z (2014) Efficient weight-based private matching for proximity-based mobile social networks. In: IEEE international conference on communications. pp 4114–4119 Zhu X, Liu J, Jiang S, Chen Z (2014) Efficient weight-based private matching for proximity-based mobile social networks. In: IEEE international conference on communications. pp 4114–4119
Metadaten
Titel
A trajectory privacy-preserving scheme based on query exchange in mobile social networks
verfasst von
Shaobo Zhang
Guojun Wang
Qin Liu
Jemal H. Abawajy
Publikationsdatum
12.06.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 18/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2676-6

Weitere Artikel der Ausgabe 18/2018

Soft Computing 18/2018 Zur Ausgabe