Abstract
Consider a mobile client who travels over roads and wishes to receive location-based services (LBS) from untrusted service providers. How might the user obtain such services without exposing her private position information? Meanwhile, how could the privacy protection mechanism incur no disincentive, e.g., excessive computation or communication cost, for any service provider or mobile user to participate in such a scheme? We detail this problem and present a general model for privacy-aware mobile services. A series of key features distinguish our solution from existing ones: a) it adopts the network-constrained mobility model (instead of the conventional random-waypoint model) to capture the privacy vulnerability of mobile users; b) it regards the attack resilience (for mobile users) and the query-processing cost (for service providers) as two critical measures for designing location privatization solutions, and provides corresponding analytical models; c) it proposes a robust and scalable location anonymization model, XStar, which best leverages the two measures; d) it introduces multi-folded optimizations in implementing XStar, which lead to further performance improvement. A comprehensive experimental evaluation is conducted to validate the analytical models and the efficacy of XStar.
- B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with pirvacygrid. In WWW, 2008. Google ScholarDigital Library
- A. Beresford. Location privacy in ubiquitous computing. In IEEE Pervasive Computing, 2005. Google ScholarDigital Library
- A. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In IEEE PerSec, 2004. Google ScholarDigital Library
- J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva. Multi-hop wireless ad hoc network routing protocols. In MOBICOM, 1998. Google ScholarDigital Library
- H. Cho and C. Chung. An efficient and scalable approach to cnn queries in a road network. In VLDB, 2005. Google ScholarDigital Library
- H. Federrath, A. Jerichow, and A. Pfitzmann. Mixes in mobile communication systems: Location management with privacy. In Information Hiding, 1996. Google ScholarDigital Library
- Foxs-News. Man accused of stalking ex-grilfriend with gps. http://www.foxnews.com/story/0293313148700.Google Scholar
- B. Gedik and L. Liu. A customizable k-anonymity model for protecting location privacy. In ICDCS, 2005.Google Scholar
- G. Ghinita, P. Kalnis, and S. Skiadopoulos. Prive: Anonymous location based queries in distributed mobile systems. In WWW, 2007. Google ScholarDigital Library
- D. Goldberg, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. In CACM, 1999.Google Scholar
- M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003. Google ScholarDigital Library
- J. Hong and J. Landay. An architecture for privacy-sensitive ubiquitous computing. In MobiSys, 2004. Google ScholarDigital Library
- H. Hu, J. Xu, and D. Lee. A generic framework for monitoring continuous spatial queries over moving objects. In SIGMOD, 2005. Google ScholarDigital Library
- E. Hyytiä and J. Virtamo. Random waypoint model in cellular networks. Wireless Network, 2006. Google ScholarDigital Library
- P. Kamat, W. Xu, W. Trappe, and Y. Zhang. Temporal privacy in wireless sensor networks. In ICDCS, 2007. Google ScholarDigital Library
- P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source-location privacy in sensor network routing. In ICDCS, 2005. Google ScholarDigital Library
- P. Karger and Y. Frankel. Security and privacy threats to its. In World Congress on Intelligent Transport Systems, 1995.Google Scholar
- H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. In ICPS, 2005.Google ScholarCross Ref
- D. Kifer and J. Gehrke. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.Google Scholar
- M. Kolahdouzan and C. Shahabi. Voronoi-based k nearest neighbor search for spatial network databases. In VLDB, 2004. Google ScholarDigital Library
- J. Kong and X. Hong. Anodr: Anonymous on demand routing with untraceable routes for mobile adhoc networks. In ACM MobiHoc, 2003. Google ScholarDigital Library
- W. Ku, R. Zimmermann, W. Peng, and S. Shroff. Privacy protected query processing on spatial networks. In IEEE Workshop on Privacy Data Management, 2007. Google ScholarDigital Library
- F. Li, D. Cheng, M. Hadjieleftheriou, G. Kollios, and S. Teng. On trip planning queries in spatial databases. In SSTD, 2005. Google ScholarDigital Library
- M. Mokbel, C. Chow, and W. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, 2006. Google ScholarDigital Library
- K. Mouratidis, M. Yiu, D. Papadias, and N. Mamoulis. Continuous nearest neighbor monitoring in road networks. In VLDB, 2005. Google ScholarDigital Library
- D. Papadias, J. Zhang, N. Mamoulis, and Y. Tao. Query processing in spatial network databases. In VLDB, 2003. Google ScholarDigital Library
- USAToday. Authorities: Gps systems used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x. htm.Google Scholar
- T. Wang and L. Liu. Location privacy over road networks. GIT-CC Technical Report, 2009.Google Scholar
- R. Want, A. Hopper, V. Falco, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems (TOIS), 1992. Google ScholarDigital Library
- M. Yiu, C. Jensen, X. Huang, and H. Lu. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In ICDE, 2008. Google ScholarDigital Library
Index Terms
Privacy-aware mobile services over road networks
Recommendations
Anonymizing user location and profile information for privacy-aware mobile services
LBSN '10: Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social NetworksDue to the growing use of mobile devices, location-based services have become popular. A location service often requires the user's exact location to provide appropriate services and this brings the risk of threats to privacy. In this paper, we propose ...
Privacy-aware DaaS services composition
DEXA'11: Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part IData as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new privacy concerns that traditional privacy models do not handle since they only focus on the ...
Privacy-Aware Web Services Selection and Composition
ICSS '14: Proceedings of the 2014 International Conference on Service SciencesPrivacy protection is still a key challenge in the web service composition area. The user and web service provider frequently share their privacy data with other web service will increase the risk of misuse and disclosure of privacy. In this paper, we ...
Comments