Skip to main content
Top
Published in: Wireless Networks 7/2020

27-05-2020

A ε-sensitive indistinguishable scheme for privacy preserving

Authors: Lei Zhang, Meina Chen, Desheng Liu, Lili He, Chao Wang, Yue Sun, Bin Wang

Published in: Wireless Networks | Issue 7/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In general, continuous queries in location-based service usually point to a predetermined destination, as the destination usually means the most sensitive point for a user, the process of moving will show a trend of sensitivity increasing. As a result, this trend can be used to infer the destination as well as some other personal privacy such as workspace and home addresses. In order to cope with this privacy issue, in this paper we first formalize the pattern of sensitivity increasing and study this pattern to discuss the effectiveness on inferring the security that disposed by several currently used privacy preservation schemes. Then, we propose a ε-sensitive indistinguishable scheme to address the attack of sensitivity inference. Specifically, the proposed scheme utilizes a grid of Voronoi diagram to depict the sensitive contours and adds dummies according to the conception of differential privacy to cloak the trend of sensitivity increasing. At last, we illustrate the security analysis to verify the capacity of privacy preservation and we also verify the performance of this scheme with experimental verification in both Euclidean space and road networks and compare it with other schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Yin, C., et al. (2018). Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3628–3636.CrossRef Yin, C., et al. (2018). Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3628–3636.CrossRef
4.
go back to reference Lei, Z., et al. (2017). A real-time similar trajectories generation algorithm for trajectories differences identification resistance. Journal of Harbin Engineering University, 07, 1173–1178. Lei, Z., et al. (2017). A real-time similar trajectories generation algorithm for trajectories differences identification resistance. Journal of Harbin Engineering University, 07, 1173–1178.
5.
go back to reference Ye, A. Y., Li, Y., & Xu, L. (2017). A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 98, 1–10.CrossRef Ye, A. Y., Li, Y., & Xu, L. (2017). A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 98, 1–10.CrossRef
6.
go back to reference Zhao, P., et al. (2019). Synthesizing privacy preserving traces: Enhancing plausibility with social networks. Ieee-Acm Transactions on Networking, 27(6), 2391–2404.CrossRef Zhao, P., et al. (2019). Synthesizing privacy preserving traces: Enhancing plausibility with social networks. Ieee-Acm Transactions on Networking, 27(6), 2391–2404.CrossRef
7.
go back to reference Wang, S., et al. (2018). A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs. Peer-to-Peer Networking and Applications, 11(3), 548–560.CrossRef Wang, S., et al. (2018). A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs. Peer-to-Peer Networking and Applications, 11(3), 548–560.CrossRef
8.
go back to reference Zhang, L., et al. (2018). A particle swarm optimization clustering-based attribute generalization privacy protection scheme. Journal of Circuits, Systems and Computers, 27(11), 641–654.CrossRef Zhang, L., et al. (2018). A particle swarm optimization clustering-based attribute generalization privacy protection scheme. Journal of Circuits, Systems and Computers, 27(11), 641–654.CrossRef
9.
go back to reference Lei, Z., et al. (2017). CP-ABE based users collaborative privacy protection scheme for continuous query. Journal on Communications, 38(09), 76–85. Lei, Z., et al. (2017). CP-ABE based users collaborative privacy protection scheme for continuous query. Journal on Communications, 38(09), 76–85.
10.
go back to reference Zhang, L. (2017). OTIBAAGKA: A new security tool for cryptographic mix-zone establishment in vehicular ad hoc networks. Ieee Transactions on Information Forensics and Security, 12(12), 2998–3010.CrossRef Zhang, L. (2017). OTIBAAGKA: A new security tool for cryptographic mix-zone establishment in vehicular ad hoc networks. Ieee Transactions on Information Forensics and Security, 12(12), 2998–3010.CrossRef
11.
go back to reference Chunguang, M., et al. (2017). Hiding yourself behind collaborative users when using continuous location-based services. Journal of Circuits, Systems and Computers, 26(07), 1750119:1–1750119:25. Chunguang, M., et al. (2017). Hiding yourself behind collaborative users when using continuous location-based services. Journal of Circuits, Systems and Computers, 26(07), 1750119:1–1750119:25.
12.
go back to reference Peng, T., et al. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165–179.CrossRef Peng, T., et al. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165–179.CrossRef
13.
go back to reference Fei, F., et al. (2017). A K-anonymity based schema for location privacy preservation. IEEE Transactions on Sustainable Computing, 4(2), 156–167.CrossRef Fei, F., et al. (2017). A K-anonymity based schema for location privacy preservation. IEEE Transactions on Sustainable Computing, 4(2), 156–167.CrossRef
14.
go back to reference Ghaffari, M., et al. (2017). P(4)QS: A peer-to-peer privacy preserving query service for location-based mobile applications. Ieee Transactions on Vehicular Technology, 66(10), 9458–9469.CrossRef Ghaffari, M., et al. (2017). P(4)QS: A peer-to-peer privacy preserving query service for location-based mobile applications. Ieee Transactions on Vehicular Technology, 66(10), 9458–9469.CrossRef
15.
go back to reference Li, Z., Wang, J., & Zhang, W. (2019). Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications. Journal of Ambient Intelligence and Humanized Computing, 2019, 1–11. Li, Z., Wang, J., & Zhang, W. (2019). Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications. Journal of Ambient Intelligence and Humanized Computing, 2019, 1–11.
17.
go back to reference Palanisamy, B., & Liu, L. (2015). Attack-resilient mix-zones over road networks: Architecture and algorithms. IEEE Transactions on Mobile Computing, 14(3), 495–508.CrossRef Palanisamy, B., & Liu, L. (2015). Attack-resilient mix-zones over road networks: Architecture and algorithms. IEEE Transactions on Mobile Computing, 14(3), 495–508.CrossRef
18.
go back to reference Schlegel, R., et al. (2015). User-defined privacy grid system for continuous location-based services. IEEE Transactions on Mobile Computing, 14(10), 2158–2172.CrossRef Schlegel, R., et al. (2015). User-defined privacy grid system for continuous location-based services. IEEE Transactions on Mobile Computing, 14(10), 2158–2172.CrossRef
19.
go back to reference Ni, W., Gu, M., & Chen, X. (2016). Location privacy-preserving k nearest neighbor query under user's preference. Knowledge-Based Systems, 103, 19–27.CrossRef Ni, W., Gu, M., & Chen, X. (2016). Location privacy-preserving k nearest neighbor query under user's preference. Knowledge-Based Systems, 103, 19–27.CrossRef
20.
go back to reference Zhang, L. C., Cai, Z. P., & Wang, X. M. (2016). FakeMask: A novel privacy preserving approach for smartphones. Ieee Transactions on Network and Service Management, 13(2), 335–348.CrossRef Zhang, L. C., Cai, Z. P., & Wang, X. M. (2016). FakeMask: A novel privacy preserving approach for smartphones. Ieee Transactions on Network and Service Management, 13(2), 335–348.CrossRef
21.
go back to reference Dewri, R., & Thurimella, R. (2014). Exploiting service similarity for privacy in location-based search queries. IEEE Transactions on Parallel and Distributed Systems, 25(2), 374–383.CrossRef Dewri, R., & Thurimella, R. (2014). Exploiting service similarity for privacy in location-based search queries. IEEE Transactions on Parallel and Distributed Systems, 25(2), 374–383.CrossRef
22.
go back to reference Sun, G., et al. (2017). L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 74, 375–384.CrossRef Sun, G., et al. (2017). L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 74, 375–384.CrossRef
23.
go back to reference Shokri, R., Theodorakopoulos, G., & Troncoso, C. (2017). Privacy games along location traces: A game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security, 19(4), 1–31.CrossRef Shokri, R., Theodorakopoulos, G., & Troncoso, C. (2017). Privacy games along location traces: A game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security, 19(4), 1–31.CrossRef
24.
go back to reference Shen, H., et al. (2017). Protecting trajectory privacy: A user-centric analysis. Journal of Network and Computer Applications, 82, 128–139.CrossRef Shen, H., et al. (2017). Protecting trajectory privacy: A user-centric analysis. Journal of Network and Computer Applications, 82, 128–139.CrossRef
25.
go back to reference Montazeri, Z., Houmansadr, A., & Pishro-Nik, H. (2017). Achieving perfect location privacy in wireless devices using anonymization. Ieee Transactions on Information Forensics and Security, 12(11), 2683–2698.CrossRef Montazeri, Z., Houmansadr, A., & Pishro-Nik, H. (2017). Achieving perfect location privacy in wireless devices using anonymization. Ieee Transactions on Information Forensics and Security, 12(11), 2683–2698.CrossRef
26.
go back to reference Wang, X. F., Mu, Y., & Chen, R. M. (2016). One-round privacy-preserving meeting location determination for smartphone applications. Ieee Transactions on Information Forensics and Security, 11(8), 1723–1732. Wang, X. F., Mu, Y., & Chen, R. M. (2016). One-round privacy-preserving meeting location determination for smartphone applications. Ieee Transactions on Information Forensics and Security, 11(8), 1723–1732.
27.
go back to reference Aivodji, U. M., et al. (2016). Meeting points in ridesharing: A privacy-preserving approach. Transportation Research Part C-Emerging Technologies, 72, 239–253.CrossRef Aivodji, U. M., et al. (2016). Meeting points in ridesharing: A privacy-preserving approach. Transportation Research Part C-Emerging Technologies, 72, 239–253.CrossRef
28.
go back to reference Rabieh, K., Mahmoud, M., & Younis, M. (2017). Privacy-preserving route reporting schemes for traffic management systems. Ieee Transactions on Vehicular Technology, 66(3), 2703–2713.CrossRef Rabieh, K., Mahmoud, M., & Younis, M. (2017). Privacy-preserving route reporting schemes for traffic management systems. Ieee Transactions on Vehicular Technology, 66(3), 2703–2713.CrossRef
29.
go back to reference Zhang, L., et al. (2017). Privacy preserving in cloud environment for obstructed shortest path query. Wireless Personal Communications, 96(2), 2305–2322.CrossRef Zhang, L., et al. (2017). Privacy preserving in cloud environment for obstructed shortest path query. Wireless Personal Communications, 96(2), 2305–2322.CrossRef
30.
go back to reference Zhao, P., et al. (2018). ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. Ieee Internet of Things Journal, 5(2), 1033–1042.CrossRef Zhao, P., et al. (2018). ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. Ieee Internet of Things Journal, 5(2), 1033–1042.CrossRef
31.
go back to reference Peng, Z., et al. (2019). Location correlated differential privacy protection based on mobile feature analysis. Ieee Access, 7, 54483–54496.CrossRef Peng, Z., et al. (2019). Location correlated differential privacy protection based on mobile feature analysis. Ieee Access, 7, 54483–54496.CrossRef
32.
go back to reference Zhang, L., et al. (2017). Probability indistinguishable: A query and location correlation attack resistance scheme. Wireless Personal Communications, 97(4), 6167–6187.CrossRef Zhang, L., et al. (2017). Probability indistinguishable: A query and location correlation attack resistance scheme. Wireless Personal Communications, 97(4), 6167–6187.CrossRef
34.
go back to reference Wu, Y. C., et al. (2018). Differentially private trajectory protection based on spatial and temporal correlation. Chinese Journal of Computers, 41(02), 309–322. Wu, Y. C., et al. (2018). Differentially private trajectory protection based on spatial and temporal correlation. Chinese Journal of Computers, 41(02), 309–322.
35.
go back to reference Hua, J., et al. (2018). A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries. Ieee Transactions on Information Forensics and Security, 13(5), 1155–1168. Hua, J., et al. (2018). A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries. Ieee Transactions on Information Forensics and Security, 13(5), 1155–1168.
36.
go back to reference Elsalamouny, E., & Gambs, S. (2018). Optimal noise functions for location privacy on continuous regions. International Journal of Information Security, 17(1), 1–18.CrossRef Elsalamouny, E., & Gambs, S. (2018). Optimal noise functions for location privacy on continuous regions. International Journal of Information Security, 17(1), 1–18.CrossRef
37.
go back to reference Al-Dhubhani, R., & Cazalas, J. M. (2017). An adaptive geo-indistinguishability mechanism for continuous LBS queries. Wireless Networks, 24, 1–19.CrossRef Al-Dhubhani, R., & Cazalas, J. M. (2017). An adaptive geo-indistinguishability mechanism for continuous LBS queries. Wireless Networks, 24, 1–19.CrossRef
38.
go back to reference Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services (pp. 31–42). Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services (pp. 31–42).
39.
go back to reference Fuyu, L., Hua, K.A., & Ying, C. (2009). Query l-diversity in location-based services. In Proceedings of mobile data management: systems, services and middleware (pp. 436–442). Fuyu, L., Hua, K.A., & Ying, C. (2009). Query l-diversity in location-based services. In Proceedings of mobile data management: systems, services and middleware (pp. 436–442).
40.
go back to reference Rebollo-Monedero, D., et al. (2010). Private location-based information retrieval through user collaboration. Computer Communications, 33(6), 762–774.CrossRef Rebollo-Monedero, D., et al. (2010). Private location-based information retrieval through user collaboration. Computer Communications, 33(6), 762–774.CrossRef
41.
go back to reference Khoshgozaran, A., Shahabi, C., & Shirani-Mehr, H. (2011). Location privacy: Going beyond K-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 26(3), 435–465.CrossRef Khoshgozaran, A., Shahabi, C., & Shirani-Mehr, H. (2011). Location privacy: Going beyond K-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 26(3), 435–465.CrossRef
42.
go back to reference Grissa, M., Yavuz, A. A., & Hamdaoui, B. (2017). Preserving the location privacy of secondary users in cooperative spectrum sensing. Ieee Transactions on Information Forensics and Security, 12(2), 418–431.CrossRef Grissa, M., Yavuz, A. A., & Hamdaoui, B. (2017). Preserving the location privacy of secondary users in cooperative spectrum sensing. Ieee Transactions on Information Forensics and Security, 12(2), 418–431.CrossRef
43.
go back to reference Hashem, T., Kulik, L., & Zhang, R. (2013). Countering overlapping rectangle privacy attack for moving kNN queries. Information Systems, 38(3), 430–453.CrossRef Hashem, T., Kulik, L., & Zhang, R. (2013). Countering overlapping rectangle privacy attack for moving kNN queries. Information Systems, 38(3), 430–453.CrossRef
44.
go back to reference Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7(2), 126–139.CrossRef Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7(2), 126–139.CrossRef
45.
go back to reference Lei, Z., et al. (2017). Correlation probability indistinguishable location privacy protection algorithm. Journal on Communications, 38(08), 37–49. Lei, Z., et al. (2017). Correlation probability indistinguishable location privacy protection algorithm. Journal on Communications, 38(08), 37–49.
46.
go back to reference Niu, B., et al. (2014). Achieving k-anonymity in privacy-aware location-based services. In International conference on computer communications (pp. 754–762). Niu, B., et al. (2014). Achieving k-anonymity in privacy-aware location-based services. In International conference on computer communications (pp. 754–762).
Metadata
Title
A ε-sensitive indistinguishable scheme for privacy preserving
Authors
Lei Zhang
Meina Chen
Desheng Liu
Lili He
Chao Wang
Yue Sun
Bin Wang
Publication date
27-05-2020
Publisher
Springer US
Published in
Wireless Networks / Issue 7/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02378-0

Other articles of this Issue 7/2020

Wireless Networks 7/2020 Go to the issue