skip to main content
10.1145/1741866.1741873acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Preventing multi-query attack in location-based services

Published:22 March 2010Publication History

ABSTRACT

Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy concerns for users. The existing third-party privacy protection methods hide the exact location of users from service providers by sending cloaking regions (CR) that contain several other user locations in the vicinity. However, this has not ensured LBS full immunity from the privacy concerns. In this paper, we describe a serious privacy problem of LBS called multi-query attack. In this attack, the exact location of the service requester can be inferred by the adversary through obtaining cloaking regions that are shrunk or extended in subsequent queries. This problem can be addressed by judiciously retaining, over a period of time, the cloaking regions for the same set of users. Most methods in the literature are weakened for considering only a static snapshot of users during evaluation. Thus, any update due to user movements in real time becomes very costly. Our proposed approach, ANNC (Adaptive Nearest Neighborhood Cloaking) ,emphasizes developing disjoint sets of users dynamically over time in order to share the common CRs. The CRs are organized in balanced binary trees with restricted height. Thus ANNC achieves the balance between search efficiency and quality of cloaking with higher anonymity levels. The experimental evaluation demonstrates that ANNC will be more efficient in practice than other well-known approaches.

References

  1. Beresford, A., and Stajano, F. 2003. Location Privacy in Pervasive Computing. IEEE PERVASIVE computing: Volume 2 Issue 1, 2003, 46--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Sweeney, L. 2002. K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 557--570. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bettini, C., Mascetti, S., Wang, X.S., and Jajodia, S. 2007. Anonymity in Location-based Services: Towards a General Framework. In Proceedings of Mobile Data Managment, 2007, 69--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gruteser, M., and Grunwald, D. 2003. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of MobiSys 2003, 31--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gedik, B., and Liu, L. 2005. Location-Privacy in Mobile Systems: A Personalized Anonymization Model. In Proceedings of ICDCS 2005, 620--629. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mokbel, M.F., Chow, C. and Aref, W.G. 2006. The new casper: query processing for location services without compromising privacy. In Proceedings of VLDB 2006, 763--774. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kalnis, P., Ghinita, G., Mouratidis, K., and Papadias, D. 2007. Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Transactions on Knowledge and Data Engineering, Vol 19 No. 12 (Dec 2007), 1719--1733. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ghinita, G., Kalnis, P., and Skiadopoulos, S. 2007. PRIVÉ: Anonymous Location-Based Queries in Distributed Mobile Systems. In Proceedings of WWW 2007, 371--380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Smart phone leads market growth: http://www.pcworld.com/businesscenter/article/158697/smart_phones_lead_market_growth.htmlGoogle ScholarGoogle Scholar
  10. Zhong, G., and Hengartner, U. 2008. Toward a Distributed k-Anonymity Protocol for Location Privacy. In Proceedings of WPES 2008, 33--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Xiong, X., Mokbel, M.F., and Aref, W.G. 2005. SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-Temporal Databases. In Proceedings of ICDE 2005, 643--654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Theodoridis, Y. The R-Tree-Portal. http://ww.rtreeportal.org.Google ScholarGoogle Scholar
  13. Chow, C., Mokbel, M., and Liu, X. 2006. A peer-to-peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In Proceedings of ACM-GIS 2006, 171--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Krumm, J. 2007. Inference Attacks on Location Tracks. In Proceedings of Pervasive, 2007, 127--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hashem, T., and Kulik, L. 2007. Safeguarding Location Privacy in Wireless Ad-hoc Networks. In Proceedings of Ubicomp, 2007, 372--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ghinita, G., Kalnis, P., Khoshgozraran, A., Shahabi, C., and Tan, K. 2008. Private Queries in Location Based Services: Anonymizers are not Necessary. In Proceedings of SIGMOD 2008, 121--132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Haque, M., and Ahamed, S.I. 2007. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment. In Proceedings of COMPSAC 2007, 49--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Bamba, B., Liu, L., Pesti, P., and Wang, T. 2008. Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid. In Proceedings of WWW 2008, 327--246. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hilbert Curve: http://en.wikipedia.org/wiki/Hilbert_curveGoogle ScholarGoogle Scholar
  20. Hoh, B., and Gruteser, M. 2005. Protecting Location Privacy Through PathConfusion. In Proceedings of SecureComm 2005, 194--205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Hengartner, U. 2008. Location Privacy based on Trusted Computing and Secure Logging. In Proceedings of SecureComm 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    WiSec '10: Proceedings of the third ACM conference on Wireless network security
    March 2010
    186 pages
    ISBN:9781605589237
    DOI:10.1145/1741866

    Copyright © 2010 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 22 March 2010

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate98of338submissions,29%

    Upcoming Conference

    WiSec '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader