Skip to main content
Erschienen in: Cluster Computing 3/2017

20.06.2017

The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems

verfasst von: Dan Liao, Gang Sun, Hui Li, Hongfang Yu, Victor Chang

Erschienen in: Cluster Computing | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of things (IoT) based location-based services (LBS) are playing an increasingly important role in our daily lives. However, since the LBS server may be hacked, malicious or not credible, there is a good chance that interacting with the LBS server may result in loss of privacy.As per journal instruction, author photo and biography are mandatory for this article. Please provide. Thus, protecting user privacy such as the privacy of user location and trajectory is an important issue to be addressed while using LBS. To address this problem, we first construct three kinds of attack models that may expose a user’s trajectory or path while the user is sending continuous queries to a LBS server. Then we construct a novel LBS system model for preserving privacy, and propose the k-anonymity trajectory (KAT) algorithm which is suitable for both single query and continuous queries. Different from existing works, the KAT algorithm selects \(k-1\) dummy locations using the sliding window based k-anonymity mechanism when the user is making single query, and selects \(k-1\) dummy trajectories using the trajectory select mechanism for continuous queries. We evaluate the effectiveness of our proposed algorithm by conducting simulations for the single-query and continuous-query scenarios. The simulation results show that our proposed algorithm can protect privacy of users better than existing approaches, while incurring a lower time complexity than those approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Truong, H., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)CrossRef Truong, H., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)CrossRef
2.
Zurück zum Zitat Barcelo, M., Correa, A., Llorca, J., et al.: IoT-cloud service optimization in next generation smart environments. IEEE J. Sel. Areas Commun. 34(12), 4077–4090 (2016)CrossRef Barcelo, M., Correa, A., Llorca, J., et al.: IoT-cloud service optimization in next generation smart environments. IEEE J. Sel. Areas Commun. 34(12), 4077–4090 (2016)CrossRef
3.
Zurück zum Zitat Kalmar, E., Kertesz, A., Varadi, S., et al.: Legal and regulative aspects of IoT cloud systems. In: IEEE International Conference on Future Internet of Things and Cloud Workshops, pp. 15–20 (2016) Kalmar, E., Kertesz, A., Varadi, S., et al.: Legal and regulative aspects of IoT cloud systems. In: IEEE International Conference on Future Internet of Things and Cloud Workshops, pp. 15–20 (2016)
4.
Zurück zum Zitat Cai, H., Xu, B., Jiang, L., et al.: IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J. 387, 75–87 (2016) Cai, H., Xu, B., Jiang, L., et al.: IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J. 387, 75–87 (2016)
5.
Zurück zum Zitat Botta, A., de Donato, W., Persico, V., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRef Botta, A., de Donato, W., Persico, V., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRef
6.
Zurück zum Zitat Landwehr, C.: Privacy research directions. Commun. ACM 59(2), 29–31 (2016)CrossRef Landwehr, C.: Privacy research directions. Commun. ACM 59(2), 29–31 (2016)CrossRef
7.
Zurück zum Zitat Xin, M., Lu, M., Li, W.: An adaptive collaboration evaluation model and its algorithm oriented to multi-domain location-based services. Expert Syst. Appl. 42, 2798–2807 (2015)CrossRef Xin, M., Lu, M., Li, W.: An adaptive collaboration evaluation model and its algorithm oriented to multi-domain location-based services. Expert Syst. Appl. 42, 2798–2807 (2015)CrossRef
8.
Zurück zum Zitat Wang, Y., Xu, D., He, X., et al.: L2p2: location aware location privacy protection for location-based services. In: IEEE INFOCOM, 1996- 2004 (2012) Wang, Y., Xu, D., He, X., et al.: L2p2: location aware location privacy protection for location-based services. In: IEEE INFOCOM, 1996- 2004 (2012)
9.
Zurück zum Zitat Li, Y., Yiu, M.: Route-saver: leveraging route APIs for accurate and efficient query processing at location-based services. IEEE Trans. Knowl. Data Eng. 27(1), 235–249 (2015)CrossRef Li, Y., Yiu, M.: Route-saver: leveraging route APIs for accurate and efficient query processing at location-based services. IEEE Trans. Knowl. Data Eng. 27(1), 235–249 (2015)CrossRef
10.
Zurück zum Zitat Schlegel, R., Chow, C., Huang, Q., et al.: User-defined privacy grid system for continuous location-based services. IEEE Trans. Mob. Comput. 14(10), 2158–2172 (2015)CrossRef Schlegel, R., Chow, C., Huang, Q., et al.: User-defined privacy grid system for continuous location-based services. IEEE Trans. Mob. Comput. 14(10), 2158–2172 (2015)CrossRef
11.
Zurück zum Zitat Zhou, T.: Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors. Inf. Syst. Front. 17(2), 413–422 (2015)CrossRef Zhou, T.: Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors. Inf. Syst. Front. 17(2), 413–422 (2015)CrossRef
12.
Zurück zum Zitat Niu, B., Li, Q., Zhu, X., et al.: Achieving K-anonymity in privacy-aware location-based services. In: IEEE INFOCOM, pp. 754–762 (2014) Niu, B., Li, Q., Zhu, X., et al.: Achieving K-anonymity in privacy-aware location-based services. In: IEEE INFOCOM, pp. 754–762 (2014)
13.
Zurück zum Zitat Niu, B., Li, Q., Zhu, X., et al.: Enhancing privacy through caching in location-based services. In: IEEE INFOCOM (2015) Niu, B., Li, Q., Zhu, X., et al.: Enhancing privacy through caching in location-based services. In: IEEE INFOCOM (2015)
14.
Zurück zum Zitat Liu, X., Zhao, H., Pan, M., et al.: Traffic aware multiple mix zone placement for protecting location privacy. In: IEEE INFOCOM, pp. 972–980 (2012) Liu, X., Zhao, H., Pan, M., et al.: Traffic aware multiple mix zone placement for protecting location privacy. In: IEEE INFOCOM, pp. 972–980 (2012)
15.
Zurück zum Zitat Zhu, X., Chi, H., Niu, B., et al.: Mobi Cache: when k-anonymity meets cache. In: IEEE GLOBECOM, pp. 820–825 (2013) Zhu, X., Chi, H., Niu, B., et al.: Mobi Cache: when k-anonymity meets cache. In: IEEE GLOBECOM, pp. 820–825 (2013)
16.
Zurück zum Zitat Shu, T., Chen, Y., Yang, J.: Multi-lateral privacy preserving localization in pervasive environments. In: IEEE INFOCOM, pp. 2319–2327 (2014) Shu, T., Chen, Y., Yang, J.: Multi-lateral privacy preserving localization in pervasive environments. In: IEEE INFOCOM, pp. 2319–2327 (2014)
17.
Zurück zum Zitat Li, H., Sun, L., Zhu, H., et al.: Achieving privacy preservation in WiFi fingerprint-based localization. In: IEEE INFOCOM, pp. 2337–2345 (2014) Li, H., Sun, L., Zhu, H., et al.: Achieving privacy preservation in WiFi fingerprint-based localization. In: IEEE INFOCOM, pp. 2337–2345 (2014)
18.
Zurück zum Zitat Beresford, A., Stajano, F.: Mix zones: user privacy in location-aware services. In: The Second IEEE Conference on Pervasive Computing and Communications Workshops, pp. 127–131 (2004) Beresford, A., Stajano, F.: Mix zones: user privacy in location-aware services. In: The Second IEEE Conference on Pervasive Computing and Communications Workshops, pp. 127–131 (2004)
19.
Zurück zum Zitat Liu, X., Liu, K., Guo, L., et al.: A game-theoretic approach for achieving k-anonymity in location based services. In: IEEE INFCOM, pp. 2985–2993 (2013) Liu, X., Liu, K., Guo, L., et al.: A game-theoretic approach for achieving k-anonymity in location based services. In: IEEE INFCOM, pp. 2985–2993 (2013)
20.
Zurück zum Zitat Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATH
21.
Zurück zum Zitat Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: IEEE INFOCOM, pp. 2994–3002 (2013) Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: IEEE INFOCOM, pp. 2994–3002 (2013)
22.
Zurück zum Zitat Sharma, V., Shen, C.: Evaluation of an entropy-based k-anonymity model for location based services. In: International Conference on Computing, Networking and Communications (ICNC), pp. 374–378 (2015) Sharma, V., Shen, C.: Evaluation of an entropy-based k-anonymity model for location based services. In: International Conference on Computing, Networking and Communications (ICNC), pp. 374–378 (2015)
23.
Zurück zum Zitat Shokri, R., Troncoso, C., Diaz, C.: Unraveling an old cloak: K-anonymity for location privacy. In: ACM Workshop on Privacy in the Electronic Society, pp. 115–118 (2010) Shokri, R., Troncoso, C., Diaz, C.: Unraveling an old cloak: K-anonymity for location privacy. In: ACM Workshop on Privacy in the Electronic Society, pp. 115–118 (2010)
24.
Zurück zum Zitat Lu, R., Lin, X., Shi, Z., et al.: PLAM: a privacy-preserving framework for local-area mobile social networks. In: IEEE INFOCOM, pp. 763–771 (2014) Lu, R., Lin, X., Shi, Z., et al.: PLAM: a privacy-preserving framework for local-area mobile social networks. In: IEEE INFOCOM, pp. 763–771 (2014)
25.
Zurück zum Zitat Li, X., Miao, M., Liu, H., et al.: An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Computing (2016). 10.1007/s00500-016-2040-2 Li, X., Miao, M., Liu, H., et al.: An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Computing (2016). 10.​1007/​s00500-016-2040-2
26.
Zurück zum Zitat Caballero-Gil, C., Molina-Gil, J., Hernández-Serrano, J., et al.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482–494 (2016)CrossRef Caballero-Gil, C., Molina-Gil, J., Hernández-Serrano, J., et al.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482–494 (2016)CrossRef
27.
Zurück zum Zitat Andrews, M., Wilfong, G., Zhang, L.: Analysis of k-anonymity algorithms for streaming location data. In: IEEE Conference on Computer Communications Workshops, pp. 1–6 (2015) Andrews, M., Wilfong, G., Zhang, L.: Analysis of k-anonymity algorithms for streaming location data. In: IEEE Conference on Computer Communications Workshops, pp. 1–6 (2015)
28.
Zurück zum Zitat Gedik, B., liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Mob. Comput. 7, 1–18 (2007) Gedik, B., liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Mob. Comput. 7, 1–18 (2007)
29.
Zurück zum Zitat Buttyan, L., Holczer, T.: A practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular Networking Conference, pp. 1–8 (2009) Buttyan, L., Holczer, T.: A practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular Networking Conference, pp. 1–8 (2009)
30.
Zurück zum Zitat Du, J., Xu, J.: IPDA: supporting privacy-preserving location-based mobile services. In: International Conference Mobile Data Management, pp. 212–214 (2007) Du, J., Xu, J.: IPDA: supporting privacy-preserving location-based mobile services. In: International Conference Mobile Data Management, pp. 212–214 (2007)
31.
Zurück zum Zitat Yao, L., Lin, C., Liu, G., et al.: Location anonymity based on fake queries in continuous location-based services. In: The 7th International Conference on Availability, Reliability and Security, pp. 375–382 (2012) Yao, L., Lin, C., Liu, G., et al.: Location anonymity based on fake queries in continuous location-based services. In: The 7th International Conference on Availability, Reliability and Security, pp. 375–382 (2012)
32.
Zurück zum Zitat Feng, Y., Liu, P., Zhang, J.: A mobile terminal based trajectory preserving strategy for continuous querying LBS users. In: IEEE International Conference on Distributed Computing in Sensor Systems, pp. 92–98 (2012) Feng, Y., Liu, P., Zhang, J.: A mobile terminal based trajectory preserving strategy for continuous querying LBS users. In: IEEE International Conference on Distributed Computing in Sensor Systems, pp. 92–98 (2012)
33.
Zurück zum Zitat Mohammed, N., Fung, B., Debbabi, M.: Walking in the crowd, anonymizing trajectory data for pattern analysis. In: The 18th ACM Conference on Information and Knowledge, pp. 1441–1444 (2009) Mohammed, N., Fung, B., Debbabi, M.: Walking in the crowd, anonymizing trajectory data for pattern analysis. In: The 18th ACM Conference on Information and Knowledge, pp. 1441–1444 (2009)
34.
Zurück zum Zitat Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM, pp. 547–555 (2008) Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM, pp. 547–555 (2008)
35.
Zurück zum Zitat Yigitoglu, E., Luisa, M.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: IEEE 13th International Conference on Mobile Data Management, pp. 186–195 (2012) Yigitoglu, E., Luisa, M.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: IEEE 13th International Conference on Mobile Data Management, pp. 186–195 (2012)
36.
Zurück zum Zitat Chow, C., Mokebel, M.F.: Trajectory privacy in location-based services and data publications. ACM SIGKDD Explor. Newsl. 13(1), 19–29 (2011)CrossRef Chow, C., Mokebel, M.F.: Trajectory privacy in location-based services and data publications. ACM SIGKDD Explor. Newsl. 13(1), 19–29 (2011)CrossRef
37.
Zurück zum Zitat Schmid, F., Richter, K.: Semantic trajectory compression. Advances in spatial and temporal databases. In: Lecture Notes in Computer Science, pp. 411–416 (2009) Schmid, F., Richter, K.: Semantic trajectory compression. Advances in spatial and temporal databases. In: Lecture Notes in Computer Science, pp. 411–416 (2009)
38.
Zurück zum Zitat Peng, T., Liu, Q., Meng, D., et al.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165–179 (2016)CrossRef Peng, T., Liu, Q., Meng, D., et al.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165–179 (2016)CrossRef
39.
Zurück zum Zitat Li, X., Wang, E., Yang, W., et al.: DALP: a demand-aware location privacy protection scheme in continuous location-based services. Concurr. Comput. Pract. Exp. 28(4), 1219–1236 (2016)CrossRef Li, X., Wang, E., Yang, W., et al.: DALP: a demand-aware location privacy protection scheme in continuous location-based services. Concurr. Comput. Pract. Exp. 28(4), 1219–1236 (2016)CrossRef
40.
Zurück zum Zitat Niu, B., Gao, S., Li, F., et al.: Protection of location privacy in continuous LBSs against adversaries with background information. In: IEEE International Conference on Computing, Networking and Communications, pp. 1–6 (2016) Niu, B., Gao, S., Li, F., et al.: Protection of location privacy in continuous LBSs against adversaries with background information. In: IEEE International Conference on Computing, Networking and Communications, pp. 1–6 (2016)
41.
Zurück zum Zitat Sun, G., Liao, D., Li, H., et al.: L2P2: a location-label based approach for privacy preserving in LBS. Future Gener. Comput. Syst. 74, 375–384 (2016)CrossRef Sun, G., Liao, D., Li, H., et al.: L2P2: a location-label based approach for privacy preserving in LBS. Future Gener. Comput. Syst. 74, 375–384 (2016)CrossRef
42.
Zurück zum Zitat Sun, G., Chang, V., Ramachandran, M., et al.: Efficient location privacy algorithm for Internet of Things (IoT) services and applications. J. Netw. Comput. Appl. 89, 3–3 (2016)CrossRef Sun, G., Chang, V., Ramachandran, M., et al.: Efficient location privacy algorithm for Internet of Things (IoT) services and applications. J. Netw. Comput. Appl. 89, 3–3 (2016)CrossRef
43.
Zurück zum Zitat Sun, G., Xie, Y., Liao, D., et al.: User-defined privacy location-sharing system in mobile online social networks. J. Netw. Comput. Appl. 86, 34–45 (2017)CrossRef Sun, G., Xie, Y., Liao, D., et al.: User-defined privacy location-sharing system in mobile online social networks. J. Netw. Comput. Appl. 86, 34–45 (2017)CrossRef
Metadaten
Titel
The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems
verfasst von
Dan Liao
Gang Sun
Hui Li
Hongfang Yu
Victor Chang
Publikationsdatum
20.06.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2017
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-0986-1

Weitere Artikel der Ausgabe 3/2017

Cluster Computing 3/2017 Zur Ausgabe

Premium Partner