Skip to main content
Erschienen in: Wireless Personal Communications 1/2018

14.05.2018

Protecting Privacy in Location-Based Services Through Location Anonymization Using Cloaking Algorithms Based on Connected Components

verfasst von: P. Shanthi Saravanan, S. R. Balasundaram

Erschienen in: Wireless Personal Communications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With ever increasing advances in Information and Communication Technologies, location-based services (LBS) have obtained significant attention and popularity. However the services are provided at the cost of exposing the location-context of users, which exposes privacy and security threats to users. This paper presents an efficient location privacy-preserving solution based on location cloaking. Specifically to cloak location-contexts a new component based graph model called Cloaked Region Construction Algorithm (CRCA) is proposed, which can group users in the closer location proximity. To obtain an optimal cloaked region, heuristic search based on the center of spanning tree technique is used. Further, Dice’s coefficient is used to find LBS query similarities that help to avoid query similarity attacks. Through component based graph structure, optimal sub-group selection and query diversity, the proposed CRCA protects users’ location privacy to a greater extend while maintaining the quality of the query service. Experimental results show that CRCA performs well on providing high degree of privacy protection with a reasonably-sized cloaked region, and a high cloaking success rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacy grid. In Proceedings of the 17th international conference on World Wide Web (pp. 237–246). ACM. Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacy grid. In Proceedings of the 17th international conference on World Wide Web (pp. 237–246). ACM.
3.
Zurück zum Zitat Beinat, E. (2001). Privacy and location-based: Stating the policies clearly. GeoInformatics, 4, 14–17. Beinat, E. (2001). Privacy and location-based: Stating the policies clearly. GeoInformatics, 4, 14–17.
4.
Zurück zum Zitat Bina, M., Karaiskos, D., & Giaglis, G. M. (2007). Motives and barriers affecting the use of mobile data services. In International conference on the management of mobile business, 2007. ICMB 2007 (pp. 15–15). IEEE. Bina, M., Karaiskos, D., & Giaglis, G. M. (2007). Motives and barriers affecting the use of mobile data services. In International conference on the management of mobile business, 2007. ICMB 2007 (pp. 15–15). IEEE.
5.
Zurück zum Zitat Buchanan, W. J., Kwecka, Z., & Ekonomou, E. (2013). A privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications, 18(5), 728–737.CrossRef Buchanan, W. J., Kwecka, Z., & Ekonomou, E. (2013). A privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications, 18(5), 728–737.CrossRef
8.
Zurück zum Zitat Chen, J., Ross, W., & Huang, S. (2008). Privacy, trust and justice considerations for location-based mobile telecommunications services. Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media, 10(4), 30–45. Chen, J., Ross, W., & Huang, S. (2008). Privacy, trust and justice considerations for location-based mobile telecommunications services. Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media, 10(4), 30–45.
9.
Zurück zum Zitat Chow, C. Y., & Mokbel, M. F. (2007). Enabling private continuous queries for revealed user locations. In D. Papadias, D. Zhang, & G. Kollios (Eds.), Advances in Spatial and Temporal Databases (pp. 258–275). Berlin: Springer.CrossRef Chow, C. Y., & Mokbel, M. F. (2007). Enabling private continuous queries for revealed user locations. In D. Papadias, D. Zhang, & G. Kollios (Eds.), Advances in Spatial and Temporal Databases (pp. 258–275). Berlin: Springer.CrossRef
10.
Zurück zum Zitat Chow, C. Y., & Mokbel, M. F. (2009). Privacy in location-based services: A system architecture perspective. Sigspatial Special, 1(2), 23–27.CrossRef Chow, C. Y., & Mokbel, M. F. (2009). Privacy in location-based services: A system architecture perspective. Sigspatial Special, 1(2), 23–27.CrossRef
11.
Zurück zum Zitat Clarke, R. (1999). Person-location and person-tracking: Technologies, risks and policy implications. In Proceedings of 21st international conference on privacy and personal data protection (pp. 206–231), Hong Kong. Clarke, R. (1999). Person-location and person-tracking: Technologies, risks and policy implications. In Proceedings of 21st international conference on privacy and personal data protection (pp. 206–231), Hong Kong.
12.
Zurück zum Zitat Du, J., Xu, J., Tang, X., & Hu, H. (2007). iPDA: Supporting privacy-preserving location-based mobile services. In 2007 international conference on mobile data management (pp. 212–214). IEEE. Du, J., Xu, J., Tang, X., & Hu, H. (2007). iPDA: Supporting privacy-preserving location-based mobile services. In 2007 international conference on mobile data management (pp. 212–214). IEEE.
15.
Zurück zum Zitat Freudiger, J., Manshaei, M. H., Hubaux, J. P., & Parkes, D. C. (2013). Non-cooperative location privacy. IEEE Transactions on Dependable and Secure Computing, 10(2), 84–98.CrossRef Freudiger, J., Manshaei, M. H., Hubaux, J. P., & Parkes, D. C. (2013). Non-cooperative location privacy. IEEE Transactions on Dependable and Secure Computing, 10(2), 84–98.CrossRef
16.
Zurück zum Zitat Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In 25th IEEE international conference on distributed computing systems, 2005. ICDCS 2005. Proceedings (pp. 620–629). IEEE. Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In 25th IEEE international conference on distributed computing systems, 2005. ICDCS 2005. Proceedings (pp. 620–629). IEEE.
17.
Zurück zum Zitat Ghinita, G., Damiani, M. L., Silvestri, C., & Bertino, E. (2009). Preventing velocity-based linkage attacks in location-aware applications. In Proceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems (pp. 246–255). ACM. Ghinita, G., Damiani, M. L., Silvestri, C., & Bertino, E. (2009). Preventing velocity-based linkage attacks in location-aware applications. In Proceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems (pp. 246–255). ACM.
18.
Zurück zum Zitat Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K. L. (2008). Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on management of data (pp. 121–132). ACM. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K. L. (2008). Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on management of data (pp. 121–132). ACM.
19.
Zurück zum Zitat Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services (pp. 31–42). ACM. Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services (pp. 31–42). ACM.
20.
Zurück zum Zitat Hochreiner, C., Huber, M., Merzdovnik, G., & Weippl, E. (2014, September). Towards practical methods to protect the privacy of location information with mobile devices. In Proceedings of the 7th international conference on security of information and networks (p. 17). ACM. Hochreiner, C., Huber, M., Merzdovnik, G., & Weippl, E. (2014, September). Towards practical methods to protect the privacy of location information with mobile devices. In Proceedings of the 7th international conference on security of information and networks (p. 17). ACM.
21.
Zurück zum Zitat Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, et al. (2008). Virtual trip lines for distributed privacy-preserving traffic monitoring. In Proceedings of the 6th international conference on mobile systems, applications, and services (pp. 15–28). ACM. Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, et al. (2008). Virtual trip lines for distributed privacy-preserving traffic monitoring. In Proceedings of the 6th international conference on mobile systems, applications, and services (pp. 15–28). ACM.
22.
Zurück zum Zitat Kalnis, P., Ghinita, G., Mouratidis, K., & Papadias, D. (2007). Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12), 1719–1733.CrossRef Kalnis, P., Ghinita, G., Mouratidis, K., & Papadias, D. (2007). Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12), 1719–1733.CrossRef
23.
Zurück zum Zitat Khoshgozaran, A., & Shahabi, C. (2010). A taxonomy of approaches to preserve location privacy in location-based services. International Journal of Computational Science and Engineering, 5(2), 86–96.CrossRef Khoshgozaran, A., & Shahabi, C. (2010). A taxonomy of approaches to preserve location privacy in location-based services. International Journal of Computational Science and Engineering, 5(2), 86–96.CrossRef
24.
Zurück zum Zitat Kido, H., Yanagisawa, Y., & Satoh, T. (2005). An anonymous communication technique using dummies for location-based services. In International conference on pervasive services, 2005. ICPS’05. Proceedings (pp. 88–97). IEEE. Kido, H., Yanagisawa, Y., & Satoh, T. (2005). An anonymous communication technique using dummies for location-based services. In International conference on pervasive services, 2005. ICPS’05. Proceedings (pp. 88–97). IEEE.
25.
Zurück zum Zitat Lee, K. C., Unger, B., Zheng, B., & Lee, W. C. (2011). Location-dependent spatial query containment. Data & Knowledge Engineering, 70(10), 842–865.CrossRef Lee, K. C., Unger, B., Zheng, B., & Lee, W. C. (2011). Location-dependent spatial query containment. Data & Knowledge Engineering, 70(10), 842–865.CrossRef
26.
Zurück zum Zitat Li, X. Y., & Jung, T. (2013). Search me if you can: Privacy-preserving location query service. In INFOCOM, proceedings IEEE (pp. 2760–2768). Li, X. Y., & Jung, T. (2013). Search me if you can: Privacy-preserving location query service. In INFOCOM, proceedings IEEE (pp. 2760–2768).
27.
Zurück zum Zitat Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.CrossRef Memon, I. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.CrossRef
28.
Zurück zum Zitat Mokbel, M. F., Chow, C. Y., & Aref, W. G. (2006). The new Casper: Query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on very large data bases (pp. 763–774). Mokbel, M. F., Chow, C. Y., & Aref, W. G. (2006). The new Casper: Query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on very large data bases (pp. 763–774).
29.
Zurück zum Zitat Mueller, R., Schrittwieser, S., Fruehwirt, P., Kieseberg, P., & Weippl, E. (2015). Security and privacy of smartphone messaging applications. International Journal of Pervasive Computing and Communications, 11(2), 132–150.CrossRef Mueller, R., Schrittwieser, S., Fruehwirt, P., Kieseberg, P., & Weippl, E. (2015). Security and privacy of smartphone messaging applications. International Journal of Pervasive Computing and Communications, 11(2), 132–150.CrossRef
30.
Zurück zum Zitat Narsingh, D. (2003). Graph theory: With application to engineering and computer science. Delhi: Prentice Hall of India. ISBN 0133634736. Narsingh, D. (2003). Graph theory: With application to engineering and computer science. Delhi: Prentice Hall of India. ISBN 0133634736.
31.
Zurück zum Zitat Palen, L., & Dourish, P. (2003, April). Unpacking privacy for a networked world. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 129–136). ACM. Palen, L., & Dourish, P. (2003, April). Unpacking privacy for a networked world. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 129–136). ACM.
32.
Zurück zum Zitat Pan, X., Xu, J., & Meng, X. (2012). Protecting location privacy against location-dependent attacks in mobile services. IEEE Transactions on Knowledge and Data Engineering, 24(8), 1506–1519.CrossRef Pan, X., Xu, J., & Meng, X. (2012). Protecting location privacy against location-dependent attacks in mobile services. IEEE Transactions on Knowledge and Data Engineering, 24(8), 1506–1519.CrossRef
33.
Zurück zum Zitat Pan, X., & Meng, X. (2013). Preserving location privacy without exact locations in mobile services. Frontiers of Computer Science, 7(3), 317–340.MathSciNetCrossRef Pan, X., & Meng, X. (2013). Preserving location privacy without exact locations in mobile services. Frontiers of Computer Science, 7(3), 317–340.MathSciNetCrossRef
34.
Zurück zum Zitat Papadopoulos, S., Bakiras, S., & Papadias, D. (2010). Nearest neighbor search with strong location privacy. Proceedings of the VLDB Endowment, 3(1–2), 619–629.CrossRef Papadopoulos, S., Bakiras, S., & Papadias, D. (2010). Nearest neighbor search with strong location privacy. Proceedings of the VLDB Endowment, 3(1–2), 619–629.CrossRef
35.
Zurück zum Zitat Shanthi, P., & Balasundaram, S. R. (2015). A graph-based cloak algorithm to preserve location privacy in location-based services. International Journal of Information Privacy, Security and Integrity, 2(2), 138–158.CrossRef Shanthi, P., & Balasundaram, S. R. (2015). A graph-based cloak algorithm to preserve location privacy in location-based services. International Journal of Information Privacy, Security and Integrity, 2(2), 138–158.CrossRef
36.
Zurück zum Zitat Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals. Concerns about organizational practices. MIS Quarterly, 20(2), 167–196. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals. Concerns about organizational practices. MIS Quarterly, 20(2), 167–196.
37.
Zurück zum Zitat Smith, I., Consolvo, S., Lamarca, A., Hightower, J., Scott, J., Sohn, T., et al. (2005). Social disclosure of place: From location technology to communication practices. In H. W. Gellersen, R. Want, & A. Schmidt (Eds.), Pervasive computing (pp. 134–151). Berlin: Springer.CrossRef Smith, I., Consolvo, S., Lamarca, A., Hightower, J., Scott, J., Sohn, T., et al. (2005). Social disclosure of place: From location technology to communication practices. In H. W. Gellersen, R. Want, & A. Schmidt (Eds.), Pervasive computing (pp. 134–151). Berlin: Springer.CrossRef
39.
Zurück zum Zitat Titkov, L., Poslad, S., & Tan, J. J. (2006). An integrated approach to user-centered privacy for mobile information services. Applied Artificial Intelligence, 20(2–4), 159–178.CrossRef Titkov, L., Poslad, S., & Tan, J. J. (2006). An integrated approach to user-centered privacy for mobile information services. Applied Artificial Intelligence, 20(2–4), 159–178.CrossRef
40.
Zurück zum Zitat Tjostheim, I., Nordlund, B., Vestgaarden, J. I., & Frew, A. J. (2004). Location-based mobile services and privacy: Controlling access to location information. In Information and communication technologies in tourism 2004, the 11th ENTER international conference (pp. 85–95), Cairo, Egypt. New York: Springer. Tjostheim, I., Nordlund, B., Vestgaarden, J. I., & Frew, A. J. (2004). Location-based mobile services and privacy: Controlling access to location information. In Information and communication technologies in tourism 2004, the 11th ENTER international conference (pp. 85–95), Cairo, Egypt. New York: Springer.
41.
Zurück zum Zitat Um, J. H., Kim, H. D., & Chang, J. W. (2010). An advanced cloaking algorithm using Hilbert curves for anonymous location based service. In IEEE second international conference on social computing (pp. 1093–1098). Um, J. H., Kim, H. D., & Chang, J. W. (2010). An advanced cloaking algorithm using Hilbert curves for anonymous location based service. In IEEE second international conference on social computing (pp. 1093–1098).
42.
Zurück zum Zitat Wang, C., Liu, H., Wright, K. L., Krishnamachari, B., & Annavaram, M. (2015). A privacy mechanism for mobile-based urban traffic monitoring. Pervasive and Mobile Computing, 20, 1–12.CrossRef Wang, C., Liu, H., Wright, K. L., Krishnamachari, B., & Annavaram, M. (2015). A privacy mechanism for mobile-based urban traffic monitoring. Pervasive and Mobile Computing, 20, 1–12.CrossRef
45.
Zurück zum Zitat Xu, J., Tang, X., Hu, H., & Du, J. (2010). Privacy-conscious location-based queries in mobile environments. IEEE Transactions on Parallel and Distributed Systems, 21(3), 313–326.CrossRef Xu, J., Tang, X., Hu, H., & Du, J. (2010). Privacy-conscious location-based queries in mobile environments. IEEE Transactions on Parallel and Distributed Systems, 21(3), 313–326.CrossRef
46.
Zurück zum Zitat Xu, T., & Cai, Y. (2007). Location anonymity in continuous location-based services. In Proceedings of the 15th annual ACM international symposium on advances in geographic information systems (p. 39). ACM. Xu, T., & Cai, Y. (2007). Location anonymity in continuous location-based services. In Proceedings of the 15th annual ACM international symposium on advances in geographic information systems (p. 39). ACM.
47.
Zurück zum Zitat Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. In The 27th conference on computer communications INFOCOM 2008. IEEE. Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. In The 27th conference on computer communications INFOCOM 2008. IEEE.
48.
Zurück zum Zitat Yu, R., Bai, Z., Yang, L., Wang, P., Move, O. A., & Liu, Y. (2016). A location cloaking algorithm based on combinatorial optimization for location-based services in 5G networks. IEEE Access, 4, 6515–6527.CrossRef Yu, R., Bai, Z., Yang, L., Wang, P., Move, O. A., & Liu, Y. (2016). A location cloaking algorithm based on combinatorial optimization for location-based services in 5G networks. IEEE Access, 4, 6515–6527.CrossRef
49.
Zurück zum Zitat Yuan, J., Zheng, Y., Xie, X., & Sun, G. (2011). Driving with knowledge from the physical world. In Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 316–324), ACM. Yuan, J., Zheng, Y., Xie, X., & Sun, G. (2011). Driving with knowledge from the physical world. In Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 316–324), ACM.
50.
Zurück zum Zitat Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., et al. (2010). T-drive: Driving directions based on taxi trajectories. In Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems (pp. 99–108). ACM. Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., et al. (2010). T-drive: Driving directions based on taxi trajectories. In Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems (pp. 99–108). ACM.
51.
Zurück zum Zitat Zhang, X., Xia, Y., Bae, H., Min, K. S., Chai, S. W., Han, M., et al. (2015). A novel location privacy preservation method for moving object. International Journal of Security and Its Applications, 9(2), 1–12.CrossRef Zhang, X., Xia, Y., Bae, H., Min, K. S., Chai, S. W., Han, M., et al. (2015). A novel location privacy preservation method for moving object. International Journal of Security and Its Applications, 9(2), 1–12.CrossRef
Metadaten
Titel
Protecting Privacy in Location-Based Services Through Location Anonymization Using Cloaking Algorithms Based on Connected Components
verfasst von
P. Shanthi Saravanan
S. R. Balasundaram
Publikationsdatum
14.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5852-9

Weitere Artikel der Ausgabe 1/2018

Wireless Personal Communications 1/2018 Zur Ausgabe

Neuer Inhalt