Skip to main content
Top
Published in: Wireless Personal Communications 3/2015

01-06-2015

Authentication User’s Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services

Author: Imran Memon

Published in: Wireless Personal Communications | Issue 3/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Location based services (LBSs) are gaining importance due to the advancement in mobile networks and positioning technologies. The proliferation of location-based services in recent years has highlighted the need to consider location privacy. This has led to the development of methods enhancing location privacy, and to the investigation of reasons for sharing location information. While computational attacks on location privacy and their prevention have attracted a lot of research, attacks based on humans strategies and tactics have mostly been considered implicitly. Nevertheless, in querying LBSs, a user send its exact locations to their location service providers but in the process, location information of the users are misused either purposefully or otherwise by service providers creating privacy issues for users. It has therefore become important that mechanisms necessary to protect the privacy of users are adopted when querying location based services. It’s on this premise that we introduced a novel query privacy algorithm called the authentication speed dynamic transportation mode cloaking algorithm for continuous query LBSs that considers users’ similarity in speed, direction and travelling with the same transport mode for cloaking for anonymization. Experimental evaluation of the algorithm on a real world map shows that our model ensures total privacy for users, enhanced privacy guarantee, improves quality of service significantly and achieved an excellent performance measure also we compare our method with existing privacy protection methods such as V-DCA, DSDCA, AVD-DCA,D-TC and GCA.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mun, M. Y., Kim, D. H., Shilton, K., Estrin, D., Hansen, M. H., & Govindan, R. (2014). PDVLoc: A personal data vault for controlled location data sharing. Transactions on Sensor Networks (TOSN), 10(4), 58. doi:10.1145/2523820. Mun, M. Y., Kim, D. H., Shilton, K., Estrin, D., Hansen, M. H., & Govindan, R. (2014). PDVLoc: A personal data vault for controlled location data sharing. Transactions on Sensor Networks (TOSN), 10(4), 58. doi:10.​1145/​2523820.
2.
go back to reference Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2014). Travel recommendation using geo-tagged photos in social media for tourist. Journal Wireless Personal Communications. doi:10.1007/s11277-014-2082-7. Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2014). Travel recommendation using geo-tagged photos in social media for tourist. Journal Wireless Personal Communications. doi:10.​1007/​s11277-014-2082-7.
3.
go back to reference Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.CrossRef Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.CrossRef
4.
go back to reference Wernke, M., Skvortsov, P., Dürr, F., & Rothermel, K. (2014). A classification of location privacy attacks and approaches. Personal and Ubiquitous Computing, 18(1), 163–175. Wernke, M., Skvortsov, P., Dürr, F., & Rothermel, K. (2014). A classification of location privacy attacks and approaches. Personal and Ubiquitous Computing, 18(1), 163–175.
5.
go back to reference Sun, M., & Tan, G. (2014). NativeGuard: Protecting android applications from third-party native libraries. In WiSec ’14: Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks. Sun, M., & Tan, G. (2014). NativeGuard: Protecting android applications from third-party native libraries. In WiSec14: Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks.
6.
go back to reference Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. Architecture of hybrid mobile social networks for efficient content delivery. Journal Wireless Personal Communications. doi:10.1007/s11277-014-1996-4 Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. Architecture of hybrid mobile social networks for efficient content delivery. Journal Wireless Personal Communications. doi:10.​1007/​s11277-014-1996-4
7.
go back to reference Kamenyi, D. M., Wang, Y., Zhang, F., & Memon, I. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864. Kamenyi, D. M., Wang, Y., Zhang, F., & Memon, I. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857–9864.
8.
go back to reference Chow, C.-Y., Mokbel, M. F., Bao, J., & Liu, X. (2011). Query-aware location anonymization for road networks. GeoInformatica, 15(3), 571–607.CrossRef Chow, C.-Y., Mokbel, M. F., Bao, J., & Liu, X. (2011). Query-aware location anonymization for road networks. GeoInformatica, 15(3), 571–607.CrossRef
9.
go back to reference Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., & Martínez, S. (2014). Enhancing data utility in differential privacy via microaggregation-based \(k\)k-anonymity. The International Journal on Very Large Data Bases, 23(5), 771–794. Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., & Martínez, S. (2014). Enhancing data utility in differential privacy via microaggregation-based \(k\)k-anonymity. The International Journal on Very Large Data Bases, 23(5), 771–794.
10.
go back to reference Serwadda, A., & Phoha, V. V. (2013). Examining a large keystroke biometrics dataset for statistical-attack openings. Transactions on Information and System Security, 16(2), 1–30. Serwadda, A., & Phoha, V. V. (2013). Examining a large keystroke biometrics dataset for statistical-attack openings. Transactions on Information and System Security, 16(2), 1–30.
11.
go back to reference Pan, X., Meng, X., & Xu, J. (2009). Distortion-based anonymity for continuous queries in location-based mobile services, ACM GIS. Pan, X., Meng, X., & Xu, J. (2009). Distortion-based anonymity for continuous queries in location-based mobile services, ACM GIS.
12.
go back to reference Akhtar, R., Amin, N. U., Memon, I., & Shah, M. (2013). Source: Proceedings of SPIE—The international society for optical engineering (vol. 8768). Akhtar, R., Amin, N. U., Memon, I., & Shah, M. (2013). Source: Proceedings of SPIE—The international society for optical engineering (vol. 8768).
13.
go back to reference Nilizadeh, S., Kapadia, A., & Ahn, Y.-Y. (2014). Community-enhanced de-anonymization of online social networks. In CCS ’14: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. Nilizadeh, S., Kapadia, A., & Ahn, Y.-Y. (2014). Community-enhanced de-anonymization of online social networks. In CCS ’14: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security.
14.
go back to reference Stenneth, L., Wolfson, O., Xu, B., & Yu, P. S. (2012). PhonePark: Street parking using mobile phones. In Proceedings—2012 IEEE 13th international conference on mobile data management (MDM 2012) (pp. 278–279). Stenneth, L., Wolfson, O., Xu, B., & Yu, P. S. (2012). PhonePark: Street parking using mobile phones. In Proceedings—2012 IEEE 13th international conference on mobile data management (MDM 2012) (pp. 278–279).
15.
go back to reference Xiong, J., Xiong, J., & Claramunt, C. (2014). A spatial entropy-based approach to improve mobile risk-based authentication. In GeoPrivacy ’14: Proceedings of the 1st ACM SIGSPATIAL international workshop on privacy in geographic information collection and analysis. Xiong, J., Xiong, J., & Claramunt, C. (2014). A spatial entropy-based approach to improve mobile risk-based authentication. In GeoPrivacy ’14: Proceedings of the 1st ACM SIGSPATIAL international workshop on privacy in geographic information collection and analysis.
16.
go back to reference Ahmadinejad, S. H., & Fong, P. W. L. (2013). On the feasibility of inference attacks by third-party extensions to social network systems. In ASIA CCS ’13: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security. Ahmadinejad, S. H., & Fong, P. W. L. (2013). On the feasibility of inference attacks by third-party extensions to social network systems. In ASIA CCS ’13: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security.
17.
go back to reference Pan, X., Meng, X., & Xu, J. (2011). Protecting location privacy against location-dependent attack in mobile services. Knowledge and Data Engineering, 24(8), 1506–1519. doi:10.1109/TKDE.2011.105. Pan, X., Meng, X., & Xu, J. (2011). Protecting location privacy against location-dependent attack in mobile services. Knowledge and Data Engineering, 24(8), 1506–1519. doi:10.​1109/​TKDE.​2011.​105.
18.
go back to reference Wang, Y., He, l.-p., Peng, J., Zhang, T., & Li, H. (2012). Privacy preserving for continuous query in location based services. In Parallel and Distributed Systems (ICPADS), IEEE. Wang, Y., He, l.-p., Peng, J., Zhang, T., & Li, H. (2012). Privacy preserving for continuous query in location based services. In Parallel and Distributed Systems (ICPADS), IEEE.
19.
go back to reference Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433–436). doi:10.1109/ICCPS.2013.6893578 Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433–436). doi:10.​1109/​ICCPS.​2013.​6893578
20.
go back to reference Stenneth, L., & Yu, P. S. (2010). Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries. In CollaborateCom. Stenneth, L., & Yu, P. S. (2010). Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries. In CollaborateCom.
21.
go back to reference Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys’03. New York, NY, USA: ACM. Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys’03. New York, NY, USA: ACM.
22.
go back to reference Gedik, B., & Liu, L. (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing – TMC, 7(1), 1–18. doi:10.1109/TMC.2007.1062. Gedik, B., & Liu, L. (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing – TMC, 7(1), 1–18. doi:10.​1109/​TMC.​2007.​1062.
23.
go back to reference Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. In INFOCOM. Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. In INFOCOM.
24.
go back to reference Wang, Y., Zhou, L., & Wang, R. (2011). A novel frequency sense solution for cognitive radio based on tracing localization. In 2011 IEEE international conference on communications (ICC). doi:10.1109/icc.2011.5962510 Wang, Y., Zhou, L., & Wang, R. (2011). A novel frequency sense solution for cognitive radio based on tracing localization. In 2011 IEEE international conference on communications (ICC). doi:10.​1109/​icc.​2011.​5962510
25.
go back to reference Sun, Y., Yin, L., Liu, L., & Xin, S. (2014). Toward inference attacks for k-anonymity. Personal and Ubiquitous Computing, 18(8). Sun, Y., Yin, L., Liu, L., & Xin, S. (2014). Toward inference attacks for k-anonymity. Personal and Ubiquitous Computing, 18(8).
26.
go back to reference Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Proceedings of the privacy enhancing technology workshop (PET ’06). Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Proceedings of the privacy enhancing technology workshop (PET ’06).
27.
go back to reference Du, J., Xu, J., Tang, X., & Hu, H. (2007). iPDA: Enabling privacy-preserving location-based services. In Proceedings of the conference on mobile data management (MDM). Du, J., Xu, J., Tang, X., & Hu, H. (2007). iPDA: Enabling privacy-preserving location-based services. In Proceedings of the conference on mobile data management (MDM).
28.
go back to reference Xu, J., Tang, X., Hu, H., & Du, J. (2010). Privacy-conscious location-based queries in mobile environments. IEEE Transactions on Parallel and Distributed Systems, 21(3), 313–326.CrossRef Xu, J., Tang, X., Hu, H., & Du, J. (2010). Privacy-conscious location-based queries in mobile environments. IEEE Transactions on Parallel and Distributed Systems, 21(3), 313–326.CrossRef
29.
go back to reference Domenic, M. K., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Preserving users’ privacy for continuous query services in road networks. In Proceedings of 2013 6th international conference on information management, innovation management and industrial engineering, ICIII 2013 (vol. 1, pp. 352–355). Domenic, M. K., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Preserving users’ privacy for continuous query services in road networks. In Proceedings of 2013 6th international conference on information management, innovation management and industrial engineering, ICIII 2013 (vol. 1, pp. 352–355).
Metadata
Title
Authentication User’s Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services
Author
Imran Memon
Publication date
01-06-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2300-y

Other articles of this Issue 3/2015

Wireless Personal Communications 3/2015 Go to the issue