Skip to main content
Erschienen in: World Wide Web 1/2021

06.07.2020

Constructing dummy query sequences to protect location privacy and query privacy in location-based services

verfasst von: Zongda Wu, Guiling Li, Shigen Shen, Xinze Lian, Enhong Chen, Guandong Xu

Erschienen in: World Wide Web | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Location-based services (LBS) have become an important part of people’s daily life. However, while providing great convenience for mobile users, LBS result in a serious problem on personal privacy, i.e., location privacy and query privacy. However, existing privacy methods for LBS generally take into consideration only location privacy or query privacy, without considering the problem of protecting both of them simultaneously. In this paper, we propose to construct a group of dummy query sequences, to cover up the query locations and query attributes of mobile users and thus protect users’ privacy in LBS. First, we present a client-based framework for user privacy protection in LBS, which requires not only no change to the existing LBS algorithm on the server-side, but also no compromise to the accuracy of a LBS query. Second, based on the framework, we introduce a privacy model to formulate the constraints that ideal dummy query sequences should satisfy: (1) the similarity of feature distribution, which measures the effectiveness of the dummy query sequences to hide a true user query sequence; and (2) the exposure degree of user privacy, which measures the effectiveness of the dummy query sequences to cover up the location privacy and query privacy of a mobile user. Finally, we present an implementation algorithm to well meet the privacy model. Besides, both theoretical analysis and experimental evaluation demonstrate the effectiveness of our proposed approach, which show that the location privacy and attribute privacy behind LBS queries can be effectively protected by the dummy queries generated by our approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Peng, T., Liu, Q., Wang, G.: Enhanced location privacy preserving scheme in location-based services. IEEE Syst. J. 11(1), 219–230 (2017)CrossRef Peng, T., Liu, Q., Wang, G.: Enhanced location privacy preserving scheme in location-based services. IEEE Syst. J. 11(1), 219–230 (2017)CrossRef
2.
Zurück zum Zitat Zeng, S., Mu, Y., He, M., et al.: New approach for privacy-aware location-based service communications. Wirel. Pers. Commun. 11(2), 1057–1073 (2018)CrossRef Zeng, S., Mu, Y., He, M., et al.: New approach for privacy-aware location-based service communications. Wirel. Pers. Commun. 11(2), 1057–1073 (2018)CrossRef
3.
Zurück zum Zitat Li, Z., Pei, Q., Markwood, I., et al.: Location privacy violation via GPS-agnostic smart phone car tracking. IEEE Trans. Veh. Technol. 67(6), 5042–5053 (2018) Li, Z., Pei, Q., Markwood, I., et al.: Location privacy violation via GPS-agnostic smart phone car tracking. IEEE Trans. Veh. Technol. 67(6), 5042–5053 (2018)
4.
Zurück zum Zitat Ghaffari, M., Ghadiri, N., Manshaei, M.H., et al.: P4QS: A peer to peer privacy preserving query service for location-based mobile applications. IEEE Trans. Veh. Technol. 66(10), 9458–9469 (2017)CrossRef Ghaffari, M., Ghadiri, N., Manshaei, M.H., et al.: P4QS: A peer to peer privacy preserving query service for location-based mobile applications. IEEE Trans. Veh. Technol. 66(10), 9458–9469 (2017)CrossRef
5.
Zurück zum Zitat Kalaiarasy, C., Sreenath, N., Amuthan, A.: Location privacy preservation in VANET using mix zones - a survey. Proc ICCCI , 1–5 (2019) Kalaiarasy, C., Sreenath, N., Amuthan, A.: Location privacy preservation in VANET using mix zones - a survey. Proc ICCCI , 1–5 (2019)
6.
Zurück zum Zitat Ding, X., Yang, W., Choo, R., et al.: Privacy-preserving similarity joins using MapReduce. Inf. Sci. 493, 20–33 (2019)CrossRef Ding, X., Yang, W., Choo, R., et al.: Privacy-preserving similarity joins using MapReduce. Inf. Sci. 493, 20–33 (2019)CrossRef
7.
Zurück zum Zitat Dewri, R., Thurimella, R.: Mobile local search with noisy locations. Pervasive Mob Comput 32, 78–92 (2016)CrossRef Dewri, R., Thurimella, R.: Mobile local search with noisy locations. Pervasive Mob Comput 32, 78–92 (2016)CrossRef
8.
Zurück zum Zitat Zhang, L., Li, J., Yang, S., et al.: Privacy preserving in cloud environment for obstructed shortest path query. Wirel. Pers. Commun. 96(2), 2305–2322 (2017)CrossRef Zhang, L., Li, J., Yang, S., et al.: Privacy preserving in cloud environment for obstructed shortest path query. Wirel. Pers. Commun. 96(2), 2305–2322 (2017)CrossRef
9.
Zurück zum Zitat Niu, B., Li, Q., Zhu, Q., et al.: Achieving k-anonymity in privacy-aware location-based services (2014) Niu, B., Li, Q., Zhu, Q., et al.: Achieving k-anonymity in privacy-aware location-based services (2014)
10.
Zurück zum Zitat Wu, Z., Li, G., Liu, Q., Xu, G., Chen, E.: Covering the sensitive subjects to protect personal privacy in personalized pecommendation. IEEE Trans. Serv. Comput. 11(3), 493–506 (2018)CrossRef Wu, Z., Li, G., Liu, Q., Xu, G., Chen, E.: Covering the sensitive subjects to protect personal privacy in personalized pecommendation. IEEE Trans. Serv. Comput. 11(3), 493–506 (2018)CrossRef
11.
Zurück zum Zitat Li, F., Zhang, C., Niu, B., et al.: Efficient scheme for user’s trajectory privacy. Chin. J. Commun. 36(12), 114–123 (2015) Li, F., Zhang, C., Niu, B., et al.: Efficient scheme for user’s trajectory privacy. Chin. J. Commun. 36(12), 114–123 (2015)
12.
Zurück zum Zitat Ravi, N., Krishna, C., Koren, I.: Enhancing vehicular anonymity in ITS: a new scheme for mix zones and their placement. IEEE Trans. Veh. Technol. 68 (11), 10372–10381 (2019)CrossRef Ravi, N., Krishna, C., Koren, I.: Enhancing vehicular anonymity in ITS: a new scheme for mix zones and their placement. IEEE Trans. Veh. Technol. 68 (11), 10372–10381 (2019)CrossRef
13.
Zurück zum Zitat Palanisamy, B., Liu, L., Lee, K., et al.: Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distrib Parallel Databases 32(1), 91–118 (2014)CrossRef Palanisamy, B., Liu, L., Lee, K., et al.: Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distrib Parallel Databases 32(1), 91–118 (2014)CrossRef
14.
Zurück zum Zitat Memon, I., Ali, Q., Zubedi, A., et al.: DPMM: Dynamic Pseudonym-based multiple mix-zones generation for mobile traveler. Multimed Tools Appl, 1–30 (2016) Memon, I., Ali, Q., Zubedi, A., et al.: DPMM: Dynamic Pseudonym-based multiple mix-zones generation for mobile traveler. Multimed Tools Appl, 1–30 (2016)
15.
Zurück zum Zitat Zhao, D., Jin, Y., Zhang, K., et al.: EPLA: efficient personal location anonymity. GeoInformatica 22(1), 29–47 (2018)CrossRef Zhao, D., Jin, Y., Zhang, K., et al.: EPLA: efficient personal location anonymity. GeoInformatica 22(1), 29–47 (2018)CrossRef
16.
Zurück zum Zitat Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)CrossRef Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)CrossRef
17.
Zurück zum Zitat Xue, D., Wu, L., Li, H., et al.: A novel destination prediction attack and corresponding location privacy protection method in geo-social networks. Int. J. Distrib. Sens. Netw. 13(1), 1–16 (2017)CrossRef Xue, D., Wu, L., Li, H., et al.: A novel destination prediction attack and corresponding location privacy protection method in geo-social networks. Int. J. Distrib. Sens. Netw. 13(1), 1–16 (2017)CrossRef
18.
Zurück zum Zitat Soma, S., Hashem, T., Cheema, M., et al.: Trip planning queries with location privacy in spatial databases. World Wide Web 20, 205–236 (2017)CrossRef Soma, S., Hashem, T., Cheema, M., et al.: Trip planning queries with location privacy in spatial databases. World Wide Web 20, 205–236 (2017)CrossRef
19.
Zurück zum Zitat Agir, B., Papaioannou, T., Narendula, R., et al.: User-side adaptive protection of location privacy in participatory sensing. GeoInformatica 18 (1), 165–191 (2014)CrossRef Agir, B., Papaioannou, T., Narendula, R., et al.: User-side adaptive protection of location privacy in participatory sensing. GeoInformatica 18 (1), 165–191 (2014)CrossRef
20.
Zurück zum Zitat Dewri, R., Thurimella, R.: Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 25(2), 374–383 (2014)CrossRef Dewri, R., Thurimella, R.: Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 25(2), 374–383 (2014)CrossRef
21.
Zurück zum Zitat Andrs, M.E., Bordenabe, N.E., Chatzikokolakis, K., et al.: Geo-indistinguishability: Differential privacy for location-based systems. Proc. CCS, 901–914 (2013) Andrs, M.E., Bordenabe, N.E., Chatzikokolakis, K., et al.: Geo-indistinguishability: Differential privacy for location-based systems. Proc. CCS, 901–914 (2013)
22.
Zurück zum Zitat Mendes, R., Cunha, M., Vilela, J.: Impact of frequency of location reports on the privacy level of geo-indistinguishability. Proc. Priv. Enhanc. Technol. 2, 379–396 (2020) Mendes, R., Cunha, M., Vilela, J.: Impact of frequency of location reports on the privacy level of geo-indistinguishability. Proc. Priv. Enhanc. Technol. 2, 379–396 (2020)
23.
Zurück zum Zitat Dong, X., Zhang, T., Lu, D., et al.: Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing. IEEE Trans. Veh. Technol. 68(9), 8881–8892 (2019)CrossRef Dong, X., Zhang, T., Lu, D., et al.: Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing. IEEE Trans. Veh. Technol. 68(9), 8881–8892 (2019)CrossRef
24.
Zurück zum Zitat Lai, J., Mu, Y., Guo, F., et al.: Privacy-enhanced attribute-based private information retrieval. Inf. Sci. 454, 275–291 (2018)MathSciNetCrossRef Lai, J., Mu, Y., Guo, F., et al.: Privacy-enhanced attribute-based private information retrieval. Inf. Sci. 454, 275–291 (2018)MathSciNetCrossRef
25.
Zurück zum Zitat Mei, Z., Zhu, H., Cui, Z., et al.: Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud. Inf. Sci. 432, 79–96 (2018)CrossRef Mei, Z., Zhu, H., Cui, Z., et al.: Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud. Inf. Sci. 432, 79–96 (2018)CrossRef
26.
Zurück zum Zitat Zhang, L., Tang, S., Chen, J., et al.: Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wirel. Pers. Commun. 81(1), 53–75 (2015)CrossRef Zhang, L., Tang, S., Chen, J., et al.: Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wirel. Pers. Commun. 81(1), 53–75 (2015)CrossRef
27.
Zurück zum Zitat Ding, X., Liu, P., Jin, H.: Privacy-preserving multi-keyword top-k similarity search over encrypted Data. IEEE Trans. Depend. Secure Comput. 16(2), 344–357 (2019)CrossRef Ding, X., Liu, P., Jin, H.: Privacy-preserving multi-keyword top-k similarity search over encrypted Data. IEEE Trans. Depend. Secure Comput. 16(2), 344–357 (2019)CrossRef
28.
Zurück zum Zitat Khoshgozaran, A., Shirani-Mehr, H., Shahabi, C.: Blind evaluation of location based queries using space transformation to preserve location privacy. GeoInformatica 17(4), 599–634 (2013)CrossRef Khoshgozaran, A., Shirani-Mehr, H., Shahabi, C.: Blind evaluation of location based queries using space transformation to preserve location privacy. GeoInformatica 17(4), 599–634 (2013)CrossRef
29.
Zurück zum Zitat Meng, W., Lee, B., Xing, X., et al.: Trackmeornot: Enabling flexible control on web tracking. Proc. of WWW, 99–109 (2016) Meng, W., Lee, B., Xing, X., et al.: Trackmeornot: Enabling flexible control on web tracking. Proc. of WWW, 99–109 (2016)
30.
Zurück zum Zitat Wu, Z., Shi, J., Lu, C., et al.: Constructing plausible innocuous pseudo queries to protect user query intention. Inf. Sci. 325, 215–226 (2015)CrossRef Wu, Z., Shi, J., Lu, C., et al.: Constructing plausible innocuous pseudo queries to protect user query intention. Inf. Sci. 325, 215–226 (2015)CrossRef
31.
Zurück zum Zitat Wu, Z., Li, R., Xie, J., et al.: A user sensitive subject protection approach for book search service. J. Assoc. Inf. Sci. Technol. 71(2), 183–195 (2020)CrossRef Wu, Z., Li, R., Xie, J., et al.: A user sensitive subject protection approach for book search service. J. Assoc. Inf. Sci. Technol. 71(2), 183–195 (2020)CrossRef
32.
Zurück zum Zitat Leskovec, J., Sosic, R.: SNAP: A general-purpose network analysis and graph-mining library. ACM Trans. Intell. Syst. Technol. 8(1), 1 (2016)CrossRef Leskovec, J., Sosic, R.: SNAP: A general-purpose network analysis and graph-mining library. ACM Trans. Intell. Syst. Technol. 8(1), 1 (2016)CrossRef
33.
Zurück zum Zitat Haus, M., Waqas, M., Ding, A., et al.: Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054–1079 (2017)CrossRef Haus, M., Waqas, M., Ding, A., et al.: Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054–1079 (2017)CrossRef
Metadaten
Titel
Constructing dummy query sequences to protect location privacy and query privacy in location-based services
verfasst von
Zongda Wu
Guiling Li
Shigen Shen
Xinze Lian
Enhong Chen
Guandong Xu
Publikationsdatum
06.07.2020
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 1/2021
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-020-00830-x

Weitere Artikel der Ausgabe 1/2021

World Wide Web 1/2021 Zur Ausgabe

Premium Partner