Skip to main content

2018 | OriginalPaper | Buchkapitel

EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension

verfasst von : Honghao Zhou, Tinghuai Ma, Jing Jia, Yuan Tian, Mznah Al-Rodhaan

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In location based services, users can request interesting services around them at any time and anywhere through mobile devices. They need to send their locations to get the service, which may cause the disclosure of their location privacy. In order to protect the location privacy, a typical way is to convert the specific location into a location area. After finding the interest points around the region, the server needs to refine the result set to get the exact result of the query. In this article, we extended the existing kNN query algorithm based on the circular region, and proposed an algorithm called EkCRNN. This algorithm used an anonymous server to exchange information between the user and the LBS server. We compared two algorithms through experiments, and the experimental results show that our algorithm has higher accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3), 1–27 (2015)CrossRef Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3), 1–27 (2015)CrossRef
2.
Zurück zum Zitat Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: International Conference on World Wide Web, pp. 237–246 (2008) Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: International Conference on World Wide Web, pp. 237–246 (2008)
3.
Zurück zum Zitat Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4), 1–48 (2009)CrossRef Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4), 1–48 (2009)CrossRef
4.
Zurück zum Zitat Du, J., Xu, J., Tang, X., Hu, H.: iPDA: supporting privacy-preserving location-based mobile services. In: International Conference on Mobile Data Management, pp. 212–214 (2007) Du, J., Xu, J., Tang, X., Hu, H.: iPDA: supporting privacy-preserving location-based mobile services. In: International Conference on Mobile Data Management, pp. 212–214 (2007)
5.
Zurück zum Zitat Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003) Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)
6.
Zurück zum Zitat Hashem, T., Kulik, L., Zhang, R.: Countering overlapping rectangle privacy attack for moving kNN queries. Elsevier Science Ltd. (2013) Hashem, T., Kulik, L., Zhang, R.: Countering overlapping rectangle privacy attack for moving kNN queries. Elsevier Science Ltd. (2013)
7.
Zurück zum Zitat Hu, H., Xu, J.: Non-exposure location anonymity. In: IEEE International Conference on Data Engineering, pp. 1120–1131 (2009) Hu, H., Xu, J.: Non-exposure location anonymity. In: IEEE International Conference on Data Engineering, pp. 1120–1131 (2009)
8.
Zurück zum Zitat Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)CrossRef Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)CrossRef
9.
Zurück zum Zitat Kalnis, P., et al.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19, 1719–1733 (2007)CrossRef Kalnis, P., et al.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19, 1719–1733 (2007)CrossRef
11.
Zurück zum Zitat Lv, Y., et al.: An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171(C), 9–22 (2016)CrossRef Lv, Y., et al.: An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171(C), 9–22 (2016)CrossRef
12.
Zurück zum Zitat Ma, T., et al.: LED: a fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207, 488–500 (2016)CrossRef Ma, T., et al.: LED: a fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207, 488–500 (2016)CrossRef
13.
Zurück zum Zitat Ma, T., Ying, C., Ying, C., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M.: Detect structural-connected communities based on BSCHEF in C-DBLP. Concurr. Comput. Pract. Exp. 28(2), 311–330 (2016)CrossRef Ma, T., Ying, C., Ying, C., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M.: Detect structural-connected communities based on BSCHEF in C-DBLP. Concurr. Comput. Pract. Exp. 28(2), 311–330 (2016)CrossRef
14.
Zurück zum Zitat Ma, T., et al.: KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12), 1165–1184 (2015)MathSciNetCrossRef Ma, T., et al.: KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12), 1165–1184 (2015)MathSciNetCrossRef
15.
Zurück zum Zitat Ma, T., et al.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. 98(4), 902–910 (2015)CrossRef Ma, T., et al.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. 98(4), 902–910 (2015)CrossRef
16.
Zurück zum Zitat Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: International Conference on Very Large Data Bases, pp. 763–774 (2006) Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: International Conference on Very Large Data Bases, pp. 763–774 (2006)
17.
Zurück zum Zitat Niu, B., Zhu, X., Li, Q., Chen, J., Li, H.: A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49(C), 125–132 (2015)CrossRef Niu, B., Zhu, X., Li, Q., Chen, J., Li, H.: A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49(C), 125–132 (2015)CrossRef
18.
Zurück zum Zitat Niu, B., Zhu, X., Li, W., Li, H., Wang, Y., Lu, Z.: A personalized two-tier cloaking scheme for privacy-aware location-based services. In: International Conference on Computing, Networking and Communications, pp. 94–98 (2015) Niu, B., Zhu, X., Li, W., Li, H., Wang, Y., Lu, Z.: A personalized two-tier cloaking scheme for privacy-aware location-based services. In: International Conference on Computing, Networking and Communications, pp. 94–98 (2015)
19.
Zurück zum Zitat Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attack in mobile services. In: ACM Conference on Information and Knowledge Management, pp. 1475–1476 (2008) Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attack in mobile services. In: ACM Conference on Information and Knowledge Management, pp. 1475–1476 (2008)
20.
Zurück zum Zitat Rong, H., Ma, T., Tang, M., Cao, J.: A novel subgraph \(k^{+}\)-isomorphism method in social network based on graph similarity detection. Soft Comput. 22(8), 2583–2601 (2018)CrossRef Rong, H., Ma, T., Tang, M., Cao, J.: A novel subgraph \(k^{+}\)-isomorphism method in social network based on graph similarity detection. Soft Comput. 22(8), 2583–2601 (2018)CrossRef
21.
Zurück zum Zitat Shokri, R., Theodorakopoulos, G., Le Boudec, J.Y., Hubaux, J.P.: Quantifying location privacy. In: Security and Privacy, pp. 247–262 (2011) Shokri, R., Theodorakopoulos, G., Le Boudec, J.Y., Hubaux, J.P.: Quantifying location privacy. In: Security and Privacy, pp. 247–262 (2011)
22.
Zurück zum Zitat Stenneth, L., Yu, P.S., Wolfson, O.: Mobile systems location privacy: MobiPriv a robust k anonymous system. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 54–63 (2010) Stenneth, L., Yu, P.S., Wolfson, O.: Mobile systems location privacy: MobiPriv a robust k anonymous system. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 54–63 (2010)
23.
Zurück zum Zitat Um, J.H., Kim, Y.K., Lee, H.J., Jang, M., Chang, J.W.: k-Nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services. J. Syst. Archit. 58(9), 354–371 (2012)CrossRef Um, J.H., Kim, Y.K., Lee, H.J., Jang, M., Chang, J.W.: k-Nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services. J. Syst. Archit. 58(9), 354–371 (2012)CrossRef
24.
Zurück zum Zitat Wang, H.S., Zhou, H.Y.: Development of tourism geographic information system based on Baidu map API. Mod. Comput. 23, 16 (2012) Wang, H.S., Zhou, H.Y.: Development of tourism geographic information system based on Baidu map API. Mod. Comput. 23, 16 (2012)
25.
Zurück zum Zitat Xu, J., Tang, X., Hu, H., Du, J.: Privacy-conscious location-based queries in mobile environments. IEEE Trans. Parallel Distrib. Syst. 21(3), 313–326 (2010)CrossRef Xu, J., Tang, X., Hu, H., Du, J.: Privacy-conscious location-based queries in mobile environments. IEEE Trans. Parallel Distrib. Syst. 21(3), 313–326 (2010)CrossRef
Metadaten
Titel
EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension
verfasst von
Honghao Zhou
Tinghuai Ma
Jing Jia
Yuan Tian
Mznah Al-Rodhaan
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_4