skip to main content
research-article

Privacy-aware mobile services over road networks

Published:01 August 2009Publication History
Skip Abstract Section

Abstract

Consider a mobile client who travels over roads and wishes to receive location-based services (LBS) from untrusted service providers. How might the user obtain such services without exposing her private position information? Meanwhile, how could the privacy protection mechanism incur no disincentive, e.g., excessive computation or communication cost, for any service provider or mobile user to participate in such a scheme? We detail this problem and present a general model for privacy-aware mobile services. A series of key features distinguish our solution from existing ones: a) it adopts the network-constrained mobility model (instead of the conventional random-waypoint model) to capture the privacy vulnerability of mobile users; b) it regards the attack resilience (for mobile users) and the query-processing cost (for service providers) as two critical measures for designing location privatization solutions, and provides corresponding analytical models; c) it proposes a robust and scalable location anonymization model, XStar, which best leverages the two measures; d) it introduces multi-folded optimizations in implementing XStar, which lead to further performance improvement. A comprehensive experimental evaluation is conducted to validate the analytical models and the efficacy of XStar.

References

  1. B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with pirvacygrid. In WWW, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Beresford. Location privacy in ubiquitous computing. In IEEE Pervasive Computing, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In IEEE PerSec, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva. Multi-hop wireless ad hoc network routing protocols. In MOBICOM, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Cho and C. Chung. An efficient and scalable approach to cnn queries in a road network. In VLDB, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Federrath, A. Jerichow, and A. Pfitzmann. Mixes in mobile communication systems: Location management with privacy. In Information Hiding, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Foxs-News. Man accused of stalking ex-grilfriend with gps. http://www.foxnews.com/story/0293313148700.Google ScholarGoogle Scholar
  8. B. Gedik and L. Liu. A customizable k-anonymity model for protecting location privacy. In ICDCS, 2005.Google ScholarGoogle Scholar
  9. G. Ghinita, P. Kalnis, and S. Skiadopoulos. Prive: Anonymous location based queries in distributed mobile systems. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Goldberg, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. In CACM, 1999.Google ScholarGoogle Scholar
  11. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Hong and J. Landay. An architecture for privacy-sensitive ubiquitous computing. In MobiSys, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Hu, J. Xu, and D. Lee. A generic framework for monitoring continuous spatial queries over moving objects. In SIGMOD, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. Hyytiä and J. Virtamo. Random waypoint model in cellular networks. Wireless Network, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Kamat, W. Xu, W. Trappe, and Y. Zhang. Temporal privacy in wireless sensor networks. In ICDCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source-location privacy in sensor network routing. In ICDCS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Karger and Y. Frankel. Security and privacy threats to its. In World Congress on Intelligent Transport Systems, 1995.Google ScholarGoogle Scholar
  18. H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. In ICPS, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  19. D. Kifer and J. Gehrke. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.Google ScholarGoogle Scholar
  20. M. Kolahdouzan and C. Shahabi. Voronoi-based k nearest neighbor search for spatial network databases. In VLDB, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Kong and X. Hong. Anodr: Anonymous on demand routing with untraceable routes for mobile adhoc networks. In ACM MobiHoc, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. Ku, R. Zimmermann, W. Peng, and S. Shroff. Privacy protected query processing on spatial networks. In IEEE Workshop on Privacy Data Management, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. F. Li, D. Cheng, M. Hadjieleftheriou, G. Kollios, and S. Teng. On trip planning queries in spatial databases. In SSTD, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Mokbel, C. Chow, and W. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. Mouratidis, M. Yiu, D. Papadias, and N. Mamoulis. Continuous nearest neighbor monitoring in road networks. In VLDB, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Papadias, J. Zhang, N. Mamoulis, and Y. Tao. Query processing in spatial network databases. In VLDB, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. USAToday. Authorities: Gps systems used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x. htm.Google ScholarGoogle Scholar
  28. T. Wang and L. Liu. Location privacy over road networks. GIT-CC Technical Report, 2009.Google ScholarGoogle Scholar
  29. R. Want, A. Hopper, V. Falco, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems (TOIS), 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Yiu, C. Jensen, X. Huang, and H. Lu. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In ICDE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy-aware mobile services over road networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader