Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2016

01.07.2016

An optimal query strategy for protecting location privacy in location-based services

verfasst von: Wei-dong Yang, Yun-hua He, Li-min Sun, Xiang Lu, Xinghua Li

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, an optimal query strategy is proposed for location privacy in location-based services (LBSs) from a game-theoretic perspective. Distributed location privacy metrics are proposed, and a user-centric model is proposed, in which users make their own decisions to protect their location privacy. In addition, the mobile users’ cooperation is formalized as a query strategy selection optimizing problem by using the framework of Bayesian games. Based on the analysis of Bayesian Nash Equilibria, a User Query Strategy Optimization Algorithm (UQSOA) is designed to help users achieve optimized utilities. We perform simulations to assess the privacy protection effectiveness of our approach and validate the theoretical properties of the UQSOA algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Xu T & Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE Xu T & Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE
2.
Zurück zum Zitat Liu X, Liu K, Guo L, Li X, & Fang Y (2013) A game-theoretic approach for achieving k-anonymity in Location Based Services. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 2985–2993 Liu X, Liu K, Guo L, Li X, & Fang Y (2013) A game-theoretic approach for achieving k-anonymity in Location Based Services. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 2985–2993
3.
Zurück zum Zitat Shokri R, Theodorakopoulos G, Troncoso C, Hubaux JP & Le Boudec JY (2012) Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 617–627 Shokri R, Theodorakopoulos G, Troncoso C, Hubaux JP & Le Boudec JY (2012) Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 617–627
4.
Zurück zum Zitat Shokri R, Theodorakopoulos G, Le Boudec JY & Hubaux JP (2011) Quantifying location privacy. In: Security and Privacy (SP), 2011 I.E. Symposium on. IEEE, pp 247–262 Shokri R, Theodorakopoulos G, Le Boudec JY & Hubaux JP (2011) Quantifying location privacy. In: Security and Privacy (SP), 2011 I.E. Symposium on. IEEE, pp 247–262
5.
Zurück zum Zitat de Montjoye YA, Hidalgo CA, Verleysen M & Blondel VD (2013) Unique in the crowd: The privacy bounds of human mobility. Sci Rep 3 de Montjoye YA, Hidalgo CA, Verleysen M & Blondel VD (2013) Unique in the crowd: The privacy bounds of human mobility. Sci Rep 3
6.
Zurück zum Zitat Wang T, Liu L (2009) Privacy-aware mobile services over road networks. Proc VLDB Endowment 2(1):1042–1053CrossRef Wang T, Liu L (2009) Privacy-aware mobile services over road networks. Proc VLDB Endowment 2(1):1042–1053CrossRef
7.
Zurück zum Zitat Kido H, Yanagisawa Y & Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Pervasive Services, 2005. ICPS’05. Proceedings. International Conference on. IEEE, pp 88–97 Kido H, Yanagisawa Y & Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Pervasive Services, 2005. ICPS’05. Proceedings. International Conference on. IEEE, pp 88–97
8.
Zurück zum Zitat Chow CY & Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in Spatial and Temporal Databases. Springer Berlin Heidelberg, pp 258–275 Chow CY & Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in Spatial and Temporal Databases. Springer Berlin Heidelberg, pp 258–275
9.
Zurück zum Zitat Freudiger J, Manshaei MH, Hubaux JP & Parkes DC (2009). On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM, pp 324–337 Freudiger J, Manshaei MH, Hubaux JP & Parkes DC (2009). On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM, pp 324–337
10.
Zurück zum Zitat Yang D, Xue G, Fang X, & Tang J (2012) Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, pp 173–184 Yang D, Xue G, Fang X, & Tang J (2012) Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, pp 173–184
11.
Zurück zum Zitat Srivatsa M, & Hicks M (2012) Deanonymizing mobility traces: using social network as a side-channel. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 628–637 Srivatsa M, & Hicks M (2012) Deanonymizing mobility traces: using social network as a side-channel. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 628–637
12.
Zurück zum Zitat Tan R, Badrinath Krishna V, Yau DK, & Kalbarczyk Z (2013) Impact of integrity attacks on real-time pricing in smart grids. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, pp 439–450 Tan R, Badrinath Krishna V, Yau DK, & Kalbarczyk Z (2013) Impact of integrity attacks on real-time pricing in smart grids. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, pp 439–450
13.
Zurück zum Zitat Dong M, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans 97-D(10):2606–2612 Dong M, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans 97-D(10):2606–2612
Metadaten
Titel
An optimal query strategy for protecting location privacy in location-based services
verfasst von
Wei-dong Yang
Yun-hua He
Li-min Sun
Xiang Lu
Xinghua Li
Publikationsdatum
01.07.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2016
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0328-0

Weitere Artikel der Ausgabe 4/2016

Peer-to-Peer Networking and Applications 4/2016 Zur Ausgabe

Premium Partner