Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

17.08.2017

Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme

verfasst von: Zhang Lei, Ma Chunguang, Yang Songtao, Zheng Xiaodong

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As location-based services (LBSs) require users to report their location to obtain services, many people are starting to realize the exposed to high privacy threats. In order to preserve the privacy, a great deal of privacy preserving algorithms is preserved in the last several years. Unfortunately, existing privacy preserving algorithms for LBSs usually mainly consider generalizing or cloaking the location and neglect the correlation probability between the query and location, and the adversary can use the probability to guess the real location. In this paper, based on the concept of differential privacy, we propose a mechanism for achieving probability indistinguishable, and then based on this mechanism a location-shift scheme to obfuscate the correlation between the query and location is proposed. To address the correlation probability obfuscation, we first show the correlation attack model with four potential methods based on the correlation probability. Then we study the proposed attacks on several existing algorithms designed for snapshot as well as continues services and define a formalization of probability indistinguishable to propose a countermeasure with location-shift, which can mitigate this type of attacks. At last, we verify the security of our location-shift scheme with entropy and mutual information, and the empirical evaluations further verify the effectiveness and efficiency of our scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gruteser, M. & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on mobile systems, applications and services, San Francisco, California, pp. 31–42. Gruteser, M. & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on mobile systems, applications and services, San Francisco, California, pp. 31–42.
2.
Zurück zum Zitat Gedik, B. & Ling, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In Proceedings of 25th IEEE international conference on distributed computing systems. ICDCS 2005, pp. 620–629. Gedik, B. & Ling, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In Proceedings of 25th IEEE international conference on distributed computing systems. ICDCS 2005, pp. 620–629.
3.
Zurück zum Zitat Fuyu, L., Hua, K. A., & Ying, C. (2009). Query l-diversity in location-based services. In Tenth international conference on mobile data management: Systems, services and middleware, 2009. MDM ‘09, pp. 436–442. Fuyu, L., Hua, K. A., & Ying, C. (2009). Query l-diversity in location-based services. In Tenth international conference on mobile data management: Systems, services and middleware, 2009. MDM ‘09, pp. 436–442.
4.
Zurück zum Zitat Rebollo-Monedero, D., Forne, J., Solanas, A., & Martinez-Balleste, A. (2010). Private location-based information retrieval through user collaboration. Computer Communications, 33, 762–774.CrossRef Rebollo-Monedero, D., Forne, J., Solanas, A., & Martinez-Balleste, A. (2010). Private location-based information retrieval through user collaboration. Computer Communications, 33, 762–774.CrossRef
5.
Zurück zum Zitat Rebollo-Monedero, D., Forne, J., & Domingo-Ferrer, J. (2012). Query profile obfuscation by means of optimal query exchange between users. IEEE Transactions on Dependable and Secure Computing, 9, 641–654. Rebollo-Monedero, D., Forne, J., & Domingo-Ferrer, J. (2012). Query profile obfuscation by means of optimal query exchange between users. IEEE Transactions on Dependable and Secure Computing, 9, 641–654.
6.
Zurück zum Zitat Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., & Hubaux, J. P. (2014). Hiding in the mobile crowd: Location privacy through collaboration. IEEE Transactions on Dependable and Secure Computing, 11, 266–279.CrossRef Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., & Hubaux, J. P. (2014). Hiding in the mobile crowd: Location privacy through collaboration. IEEE Transactions on Dependable and Secure Computing, 11, 266–279.CrossRef
7.
Zurück zum Zitat Niu, B., Zhu, X. Y., Li, Q. H., Chen, J., & Li, H. (2015). A novel attack to spatial cloaking schemes in location-based services. Future Generation Computer Systems—The International Journal of Grid Computing and Escience, 49, 125–132.CrossRef Niu, B., Zhu, X. Y., Li, Q. H., Chen, J., & Li, H. (2015). A novel attack to spatial cloaking schemes in location-based services. Future Generation Computer Systems—The International Journal of Grid Computing and Escience, 49, 125–132.CrossRef
8.
Zurück zum Zitat Khoshgozaran, A., Shirani-Mehr, H., & Shahabi, C. (2008). SPIRAL: A scalable private information retrieval approach to location privacy. In 2008 Ninth international conference on mobile data management workshops, pp. 49–56. Khoshgozaran, A., Shirani-Mehr, H., & Shahabi, C. (2008). SPIRAL: A scalable private information retrieval approach to location privacy. In 2008 Ninth international conference on mobile data management workshops, pp. 49–56.
9.
Zurück zum Zitat Khoshgozaran, A., Shahabi, C., & Shirani-Mehr, H. (2011). Location privacy: Going beyond K-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 26, 435–465.CrossRef Khoshgozaran, A., Shahabi, C., & Shirani-Mehr, H. (2011). Location privacy: Going beyond K-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 26, 435–465.CrossRef
10.
Zurück zum Zitat Lien, I. T., Lin, Y.-H., Shieh, J.-R., & Wu, J.-L. (2013). A novel privacy preserving location-based service protocol with secret circular shift for k-NN search. IEEE Transactions on Information Forensics and Security, 8, 863–873.CrossRef Lien, I. T., Lin, Y.-H., Shieh, J.-R., & Wu, J.-L. (2013). A novel privacy preserving location-based service protocol with secret circular shift for k-NN search. IEEE Transactions on Information Forensics and Security, 8, 863–873.CrossRef
11.
Zurück zum Zitat Paulet, R., Kaosar, M. G., Yi, X., & Bertino, E. (2014). Privacy-preserving and content-protecting location based queries. IEEE Transactions on Knowledge and Data Engineering, 26, 1200–1210.CrossRef Paulet, R., Kaosar, M. G., Yi, X., & Bertino, E. (2014). Privacy-preserving and content-protecting location based queries. IEEE Transactions on Knowledge and Data Engineering, 26, 1200–1210.CrossRef
12.
Zurück zum Zitat Ben, N., Qinghua, L., Xiaoyan, Z., Guohong, C., & Hui, L. (2015). Enhancing privacy through caching in location-based services. In 2015 IEEE conference on computer communications (INFOCOM), pp. 1017–1025. Ben, N., Qinghua, L., Xiaoyan, Z., Guohong, C., & Hui, L. (2015). Enhancing privacy through caching in location-based services. In 2015 IEEE conference on computer communications (INFOCOM), pp. 1017–1025.
13.
Zurück zum Zitat Ma, C. G., Zhou, C. L., & Yang, S. T. (2015). A voronoi-based location privacy-preserving method for continuous query in LBS. International Journal of Distributed Sensor Networks, 2015, 1–17. Ma, C. G., Zhou, C. L., & Yang, S. T. (2015). A voronoi-based location privacy-preserving method for continuous query in LBS. International Journal of Distributed Sensor Networks, 2015, 1–17.
14.
Zurück zum Zitat Schlegel, R., Chow, C. Y., Huang, Q., & Wong, D. S. (2015). User-defined privacy grid system for continuous location-based services. IEEE Transactions on Mobile Computing, 14, 2158–2172.CrossRef Schlegel, R., Chow, C. Y., Huang, Q., & Wong, D. S. (2015). User-defined privacy grid system for continuous location-based services. IEEE Transactions on Mobile Computing, 14, 2158–2172.CrossRef
15.
Zurück zum Zitat Wang, Y., Xia, Y., Hou, J., Gao, S. M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 53, 57–73.CrossRef Wang, Y., Xia, Y., Hou, J., Gao, S. M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 53, 57–73.CrossRef
16.
Zurück zum Zitat Palanisamy, B., & Liu, L. (2015). Attack-resilient mix-zones over road networks: Architecture and algorithms. IEEE Transactions on Mobile Computing, 14, 495–508.CrossRef Palanisamy, B., & Liu, L. (2015). Attack-resilient mix-zones over road networks: Architecture and algorithms. IEEE Transactions on Mobile Computing, 14, 495–508.CrossRef
17.
Zurück zum Zitat Gao, S., Ma, J. F., Shi, W. S., & Zhan, G. X. (2015). LTPPM: A location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications & Mobile Computing, 15, 155–169.CrossRef Gao, S., Ma, J. F., Shi, W. S., & Zhan, G. X. (2015). LTPPM: A location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications & Mobile Computing, 15, 155–169.CrossRef
18.
Zurück zum Zitat Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7, 126–139.CrossRef Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7, 126–139.CrossRef
19.
Zurück zum Zitat Ozer, M., Keles, I., Toroslu, H., Karagoz, P., Hakki, I., & Ergut, S. (2014). Predicting the next location change and time of change for mobile phone users. In Presented at the proceedings of the third ACM SIGSPATIAL international workshop on mobile geographic information systems, Dallas, Texas, 2014. Ozer, M., Keles, I., Toroslu, H., Karagoz, P., Hakki, I., & Ergut, S. (2014). Predicting the next location change and time of change for mobile phone users. In Presented at the proceedings of the third ACM SIGSPATIAL international workshop on mobile geographic information systems, Dallas, Texas, 2014.
20.
Zurück zum Zitat Xue, A. Y., Zhang, R., Zheng, Y., Xie, X., Huang, J., Xu, Z. et al. (2013). Destination prediction by sub-trajectory synthesis and privacy protection against such prediction. In 29th IEEE international conference on data engineering (ICDE), Brisbane, Australia, 2013, pp. 254–265. Xue, A. Y., Zhang, R., Zheng, Y., Xie, X., Huang, J., Xu, Z. et al. (2013). Destination prediction by sub-trajectory synthesis and privacy protection against such prediction. In 29th IEEE international conference on data engineering (ICDE), Brisbane, Australia, 2013, pp. 254–265.
21.
Zurück zum Zitat Su, H., Zheng, K., Wang, H., Huang, J., & Zhou, X. (2013). Calibrating trajectory data for similarity-based analysis. In Proceedings of the 2013 ACM SIGMOD international conference on management of data, pp. 833–844. Su, H., Zheng, K., Wang, H., Huang, J., & Zhou, X. (2013). Calibrating trajectory data for similarity-based analysis. In Proceedings of the 2013 ACM SIGMOD international conference on management of data, pp. 833–844.
22.
Zurück zum Zitat Chen, X. H., Pang, J., & Xue, R. (2014). Constructing and comparing user mobility profiles. ACM Transactions on the Web, 8(21), 1–21. Chen, X. H., Pang, J., & Xue, R. (2014). Constructing and comparing user mobility profiles. ACM Transactions on the Web, 8(21), 1–21.
23.
Zurück zum Zitat Lei, Z., Chunguang, M., & Songtao, Y. (2016). Location association similar based anonymus algorithm. China Science Paper, 11, 197–201. Lei, Z., Chunguang, M., & Songtao, Y. (2016). Location association similar based anonymus algorithm. China Science Paper, 11, 197–201.
24.
Zurück zum Zitat Niu, B., Qinghua, L., Xiaoyan, Z., Guohong, C., & Hui, L. (2014). Achieving k-anonymity in privacy-aware location-based services. In INFOCOM, 2014 proceedings IEEE, pp. 754–762. Niu, B., Qinghua, L., Xiaoyan, Z., Guohong, C., & Hui, L. (2014). Achieving k-anonymity in privacy-aware location-based services. In INFOCOM, 2014 proceedings IEEE, pp. 754–762.
25.
Zurück zum Zitat Dwork, C. (2006). Differential privacy. In Lecture notes in computer science, pp. 1–12. Dwork, C. (2006). Differential privacy. In Lecture notes in computer science, pp. 1–12.
26.
Zurück zum Zitat Xiong, L. (2013). Adaptive differentially private data release for data sharing and data mining. In 2013 IEEE 13th international conference on data mining workshops (Icdmw), pp. 891–891. Xiong, L. (2013). Adaptive differentially private data release for data sharing and data mining. In 2013 IEEE 13th international conference on data mining workshops (Icdmw), pp. 891–891.
27.
Zurück zum Zitat Cheng, X., Su, S., Xu, S. Z., & Li, Z. Y. (2015). DP-apriori: A differentially private frequent itemset mining algorithm based on transaction splitting. Computers & Security, 50, 74–90.CrossRef Cheng, X., Su, S., Xu, S. Z., & Li, Z. Y. (2015). DP-apriori: A differentially private frequent itemset mining algorithm based on transaction splitting. Computers & Security, 50, 74–90.CrossRef
28.
Zurück zum Zitat Xu, J., Zhang, Z. J., Xiao, X. K., Yang, Y., Yu, G., & Winslett, M. (2013). Differentially private histogram publication. VLDB Journal, 22, 797–822.CrossRef Xu, J., Zhang, Z. J., Xiao, X. K., Yang, Y., Yu, G., & Winslett, M. (2013). Differentially private histogram publication. VLDB Journal, 22, 797–822.CrossRef
29.
Zurück zum Zitat Riboni, D., & Bettini, C. (2015). Incremental release of differentially-private check-in data. Pervasive and Mobile Computing, 16, 220–238.CrossRef Riboni, D., & Bettini, C. (2015). Incremental release of differentially-private check-in data. Pervasive and Mobile Computing, 16, 220–238.CrossRef
30.
Zurück zum Zitat Dewri, R. (2013). Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Transactions on Mobile Computing, 12, 2360–2372.CrossRef Dewri, R. (2013). Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Transactions on Mobile Computing, 12, 2360–2372.CrossRef
31.
Zurück zum Zitat Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2013). Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp. 901–914. Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2013). Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp. 901–914.
32.
Zurück zum Zitat Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2014). Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp. 251–262. Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2014). Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp. 251–262.
33.
Zurück zum Zitat Primault, V., Mokhtar, S. B., Lauradoux, C., & Brunie, L. (2014). Differentially private location privacy in practice. Eprint Arxiv. Primault, V., Mokhtar, S. B., Lauradoux, C., & Brunie, L. (2014). Differentially private location privacy in practice. Eprint Arxiv.
34.
Zurück zum Zitat Chatzikokolakis, K., Palamidessi, C., & Stronati, M. (2015). Geo-indistinguishability: A principled approach to location privacy. In R. Natarajan, G. Barua, & M. R. Patra (Eds.), Distributed computing and internet technology, ICDCIT 2015, Vol. 89562015, pp. 49–72. Chatzikokolakis, K., Palamidessi, C., & Stronati, M. (2015). Geo-indistinguishability: A principled approach to location privacy. In R. Natarajan, G. Barua, & M. R. Patra (Eds.), Distributed computing and internet technology, ICDCIT 2015, Vol. 89562015, pp. 49–72.
35.
Zurück zum Zitat Perazzo, P., & Dini, G. (2015). A uniformity-based approach to location privacy. Computer Communications, 64, 21–32.CrossRef Perazzo, P., & Dini, G. (2015). A uniformity-based approach to location privacy. Computer Communications, 64, 21–32.CrossRef
Metadaten
Titel
Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme
verfasst von
Zhang Lei
Ma Chunguang
Yang Songtao
Zheng Xiaodong
Publikationsdatum
17.08.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4833-8

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt