Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2018

13.03.2017

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service

verfasst von: Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the widespread use of Location-base Services(LBSs), the problem of location privacy has drawn significant attention from the research community. To protect the user’s exact location, a new notion of privacy, named geo-indistinguishability, that adapts differential privacy has been proposed for LBSs, recently. However, the obfuscation mechanism satisfying this privacy notion only works well in the case of snapshot LBS, which would not apply to the case of continuous LBSs due to the quick loss of privacy caused by the correlation between locations in the trace. In this paper, we propose a novel mechanism, namely AGENT, to protect the user’s location privacy in continuous LBSs. In AGENT, a R-tree is introduced to realize the reusable of generated sanitized locations, which achieves the notion of geo-indistinguishability with less consumption of privacy budget. Finally, empirical results over real-world dataset demonstrate that with the same utility, our mechanism consumes less privacy budget to obfuscate the same trace.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Xiao Y, Xiong L (2015) Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p 1298–1309 Xiao Y, Xiong L (2015) Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p 1298–1309
2.
Zurück zum Zitat Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2 (1):46–55CrossRef Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2 (1):46–55CrossRef
3.
Zurück zum Zitat Dwork C Differential privacy Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, p 1–12, vol 2006 Dwork C Differential privacy Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, p 1–12, vol 2006
4.
Zurück zum Zitat Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: Differential privacy for locationbased systems. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p 901–914 Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: Differential privacy for locationbased systems. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p 901–914
5.
Zurück zum Zitat Ghinita G (2013) Privacy for location-based services. Synthesis Lectures on Information Security Privacy, & Trust 4(1):1–85CrossRef Ghinita G (2013) Privacy for location-based services. Synthesis Lectures on Information Security Privacy, & Trust 4(1):1–85CrossRef
6.
Zurück zum Zitat Guo M, Jin X, Pissinou N, Zanlongo S, Carbunar B, Iyengar SS (2015) In-network trajectory privacy preservation. ACM Comput Surv 48(2):23CrossRef Guo M, Jin X, Pissinou N, Zanlongo S, Carbunar B, Iyengar SS (2015) In-network trajectory privacy preservation. ACM Comput Surv 48(2):23CrossRef
7.
Zurück zum Zitat Terrovitis M (2011) Privacy preservation in the dissemination of location data. ACM SIGKDD Explorations Newsletter 13(1):6–18CrossRef Terrovitis M (2011) Privacy preservation in the dissemination of location data. ACM SIGKDD Explorations Newsletter 13(1):6–18CrossRef
8.
Zurück zum Zitat Gao S, Ma J, Shi W, Zhan G, Sun C (2013) Trpf: A trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887CrossRef Gao S, Ma J, Shi W, Zhan G, Sun C (2013) Trpf: A trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887CrossRef
9.
Zurück zum Zitat Niu B, Li Q, Zhu X, Cao G, Li H (2015) Enhancing privacy through caching in location-based services. In: 2015 IEEE Conference on Computer Communications (INFOCOM), p 1017–1025 Niu B, Li Q, Zhu X, Cao G, Li H (2015) Enhancing privacy through caching in location-based services. In: 2015 IEEE Conference on Computer Communications (INFOCOM), p 1017–1025
10.
Zurück zum Zitat Fawaz K, Feng H, Shin KG (2015) Anatomization and protection of mobile apps’ location privacy threats. In: 24th USENIX Security Symposium, Washington, D.C., USA., p 753–s768 Fawaz K, Feng H, Shin KG (2015) Anatomization and protection of mobile apps’ location privacy threats. In: 24th USENIX Security Symposium, Washington, D.C., USA., p 753–s768
11.
Zurück zum Zitat Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Trans Veh Technol 64(12):5631–5641CrossRef Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Trans Veh Technol 64(12):5631–5641CrossRef
12.
Zurück zum Zitat Rios R, Cuėllar J, Lopez J (2015) Probabilistic receiver-location privacy protection in wireless sensor networks. Inf Sci 321:205–223CrossRef Rios R, Cuėllar J, Lopez J (2015) Probabilistic receiver-location privacy protection in wireless sensor networks. Inf Sci 321:205–223CrossRef
13.
Zurück zum Zitat Ercument Cicek A, Nergiz ME, Saygin Y (2014) Ensuring location diversity in privacy-preserving spatio-temporal data publishing. The VLDB J 23(4):609–625CrossRef Ercument Cicek A, Nergiz ME, Saygin Y (2014) Ensuring location diversity in privacy-preserving spatio-temporal data publishing. The VLDB J 23(4):609–625CrossRef
14.
Zurück zum Zitat Ma T, Zhou J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M, Lee S (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans 98-D(4):902–910CrossRef Ma T, Zhou J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M, Lee S (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans 98-D(4):902–910CrossRef
15.
Zurück zum Zitat Gao S, Ma J, Shi W, Zhan G (2015) LTPPM: a location and trajectory privacy protection mechanism in participatory sensing. Wirel Commun Mob Comput 15(1):155–169CrossRef Gao S, Ma J, Shi W, Zhan G (2015) LTPPM: a location and trajectory privacy protection mechanism in participatory sensing. Wirel Commun Mob Comput 15(1):155–169CrossRef
16.
Zurück zum Zitat Gong X, Chen X, Xing K, Shin D-H, Zhang M, Zhang J (2015) Personalized location privacy in mobile networks: A social group utility approach. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp 1008–1016 Gong X, Chen X, Xing K, Shin D-H, Zhang M, Zhang J (2015) Personalized location privacy in mobile networks: A social group utility approach. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp 1008–1016
17.
Zurück zum Zitat Qi J, Wei F, Shuai F, Ma J, Li G, Alelaiwi A (2015) Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn 83(4):2085–2101MathSciNetMATH Qi J, Wei F, Shuai F, Ma J, Li G, Alelaiwi A (2015) Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn 83(4):2085–2101MathSciNetMATH
18.
Zurück zum Zitat Qi J, Khan MK, Xiang L, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. The Journal of Supercomputing, p 1–24 Qi J, Khan MK, Xiang L, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. The Journal of Supercomputing, p 1–24
19.
Zurück zum Zitat Qi J, Ma J, Wei F (2016) On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal Qi J, Ma J, Wei F (2016) On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal
20.
Zurück zum Zitat Zhangjie F, Fengxiao H, Xingming S, Vasilakos A, Yang C-N (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Transactions on Services Computing Zhangjie F, Fengxiao H, Xingming S, Vasilakos A, Yang C-N (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Transactions on Services Computing
21.
Zurück zum Zitat Fu Z, Sun X, Ji S, Xie G (2016) Towards efficient contentaware search over encrypted outsourced data in cloud. In: IEEE Conference on Computer Communications, pp 1–9 Fu Z, Sun X, Ji S, Xie G (2016) Towards efficient contentaware search over encrypted outsourced data in cloud. In: IEEE Conference on Computer Communications, pp 1–9
22.
Zurück zum Zitat Zhangjie F, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9): 2546–2559CrossRef Zhangjie F, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9): 2546–2559CrossRef
23.
Zurück zum Zitat Zhangjie F, Xinle W, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716CrossRef Zhangjie F, Xinle W, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716CrossRef
24.
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
25.
Zurück zum Zitat Wang X, Yi M, Chen R (2016) One-round privacy-preserving meeting location determination for smartphone applications. IEEE Trans Inf Forensics Secur 11(8):1712–1721CrossRef Wang X, Yi M, Chen R (2016) One-round privacy-preserving meeting location determination for smartphone applications. IEEE Trans Inf Forensics Secur 11(8):1712–1721CrossRef
26.
Zurück zum Zitat Bilogrevic I, Jadliwala M, Joneja V, Kalkan K, Hubaux J-P, Aad I (2014) Privacy-preserving optimal meeting location determination on mobile devices. IEEE Trans Inf Forensics Secur 9(7):1141–1156CrossRef Bilogrevic I, Jadliwala M, Joneja V, Kalkan K, Hubaux J-P, Aad I (2014) Privacy-preserving optimal meeting location determination on mobile devices. IEEE Trans Inf Forensics Secur 9(7):1141–1156CrossRef
27.
Zurück zum Zitat Puttaswamy KPN, Wang S, Steinbauer T, Agrawal D, Abbadi AE, Kruegel C, Zhao BY (2014) Preserving location privacy in geosocial applications. IEEE Trans Mob Comput 13(1):159–173CrossRef Puttaswamy KPN, Wang S, Steinbauer T, Agrawal D, Abbadi AE, Kruegel C, Zhao BY (2014) Preserving location privacy in geosocial applications. IEEE Trans Mob Comput 13(1):159–173CrossRef
28.
Zurück zum Zitat Shen Y, Huang L, Li L, Xiaorong L, Wang S, Yang W (2015) Towards preserving worker location privacy in spatial crowdsourcing. In: 2015 IEEE Global Communications Conference, San Diego, CA, USA, p 1–6 Shen Y, Huang L, Li L, Xiaorong L, Wang S, Yang W (2015) Towards preserving worker location privacy in spatial crowdsourcing. In: 2015 IEEE Global Communications Conference, San Diego, CA, USA, p 1–6
29.
Zurück zum Zitat Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559CrossRef Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559CrossRef
30.
Zurück zum Zitat Schlegel R, Chow C-Y, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172CrossRef Schlegel R, Chow C-Y, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172CrossRef
31.
Zurück zum Zitat Shao J, Lu R, Lin X (2014) Fine: A fine-grained privacypreserving location-based service framework for mobile devices. In: IEEE Conference on Computer Communications, p 244–252 Shao J, Lu R, Lin X (2014) Fine: A fine-grained privacypreserving location-based service framework for mobile devices. In: IEEE Conference on Computer Communications, p 244–252
32.
Zurück zum Zitat To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment 7(10):919–930CrossRef To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment 7(10):919–930CrossRef
33.
Zurück zum Zitat Chatzikokolakis K, Palamidessi C, StronatiM(2014) A predictive differentially-private mechanism for mobility traces. International Symposium on Privacy Enhancing Technologies Symposium, pp 21–41 Chatzikokolakis K, Palamidessi C, StronatiM(2014) A predictive differentially-private mechanism for mobility traces. International Symposium on Privacy Enhancing Technologies Symposium, pp 21–41
34.
Zurück zum Zitat Xi H, Cormode G, Machanavajjhala A, Procopiuc CM, Srivastava D (2015) DPT: differentially private trajectory synthesis using hierarchical reference systems. PVLDB 8(11):1154–1165 Xi H, Cormode G, Machanavajjhala A, Procopiuc CM, Srivastava D (2015) DPT: differentially private trajectory synthesis using hierarchical reference systems. PVLDB 8(11):1154–1165
35.
Zurück zum Zitat Reed J, Pierce BC (2010) Distance makes the types grow stronger: a calculus for differential privacy. In: ACM Sigplan Notices, volume 45, p 157–168 Reed J, Pierce BC (2010) Distance makes the types grow stronger: a calculus for differential privacy. In: ACM Sigplan Notices, volume 45, p 157–168
36.
Zurück zum Zitat Roth A, Roughgarden T (2010) Interactive privacy via the median mechanism. In: Proceedings of the forty-second ACM symposium on Theory of computing, pp 765–774. ACM Roth A, Roughgarden T (2010) Interactive privacy via the median mechanism. In: Proceedings of the forty-second ACM symposium on Theory of computing, pp 765–774. ACM
37.
Zurück zum Zitat Zheng Y, Xie X, Geolife W-YM (2010) A collaborative social networking service among user, location and trajectory. IEEE Data Eng Bull 33(2):32–39 Zheng Y, Xie X, Geolife W-YM (2010) A collaborative social networking service among user, location and trajectory. IEEE Data Eng Bull 33(2):32–39
Metadaten
Titel
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service
verfasst von
Xindi Ma
Jianfeng Ma
Hui Li
Qi Jiang
Sheng Gao
Publikationsdatum
13.03.2017
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-017-0545-9

Weitere Artikel der Ausgabe 3/2018

Peer-to-Peer Networking and Applications 3/2018 Zur Ausgabe