Skip to main content
Erschienen in: GeoInformatica 3/2011

01.07.2011

Query-aware location anonymization for road networks

verfasst von: Chi-Yin Chow, Mohamed F. Mokbel, Jie Bao, Xuan Liu

Erschienen in: GeoInformatica | Ausgabe 3/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, several techniques have been proposed to protect the user location privacy for location-based services in the Euclidean space. Applying these techniques directly to the road network environment would lead to privacy leakage and inefficient query processing. In this paper, we propose a new location anonymization algorithm that is designed specifically for the road network environment. Our algorithm relies on the commonly used concept of spatial cloaking, where a user location is cloaked into a set of connected road segments of a minimum total length \({\cal L}\) including at least \({\cal K}\) users. Our algorithm is “query-aware” as it takes into account the query execution cost at a database server and the query quality, i.e., the number of objects returned to users by the database server, during the location anonymization process. In particular, we develop a new cost function that balances between the query execution cost and the query quality. Then, we introduce two versions of our algorithm, namely, pure greedy and randomized greedy, that aim to minimize the developed cost function and satisfy the user specified privacy requirements. To accommodate intervals with a high workload, we introduce a shared execution paradigm that boosts the scalability of our location anonymization algorithm and the database server to support large numbers of queries received in a short time period. Extensive experimental results show that our algorithms are more efficient and scalable than the state-of-the-art technique, in terms of both query execution cost and query quality. The results also show that our algorithms have very strong resilience to two privacy attacks, namely, the replay attack and the center-of-cloaked-area attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the international world wide web conference, WWW Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the international world wide web conference, WWW
2.
Zurück zum Zitat Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Proceedings of international privacy enhancing technologies symposium, PET Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Proceedings of international privacy enhancing technologies symposium, PET
3.
Zurück zum Zitat Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of the international symposium on spatial and temporal databases, SSTD Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of the international symposium on spatial and temporal databases, SSTD
4.
Zurück zum Zitat Chow CY, Mokbel MF, Aref WG (2009) Casper*: query processing for location services without compromising privacy. ACM Trans Database Syst 34(4) Chow CY, Mokbel MF, Aref WG (2009) Casper*: query processing for location services without compromising privacy. ACM Trans Database Syst 34(4)
5.
6.
Zurück zum Zitat Chow CY, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems, ACM GIS Chow CY, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems, ACM GIS
7.
8.
Zurück zum Zitat Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proceedings of international conference on pervasive computing Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proceedings of international conference on pervasive computing
9.
Zurück zum Zitat Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18CrossRef Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18CrossRef
10.
Zurück zum Zitat Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM international conference on management of data, SIGMOD Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM international conference on management of data, SIGMOD
11.
Zurück zum Zitat Ghinita G, Kalnis P, Skiadopoulos S (2007) MobiHide: a mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of the international symposium on spatial and temporal databases, SSTD Ghinita G, Kalnis P, Skiadopoulos S (2007) MobiHide: a mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of the international symposium on spatial and temporal databases, SSTD
12.
Zurück zum Zitat Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVÉ: anonymous location-based queries in distributed mobile systems. In: Proceedings of the international world wide web conference, WWW Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVÉ: anonymous location-based queries in distributed mobile systems. In: Proceedings of the international world wide web conference, WWW
13.
Zurück zum Zitat Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of international conference on mobile systems, applications, and services, MobiSys Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of international conference on mobile systems, applications, and services, MobiSys
14.
Zurück zum Zitat Gruteser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-aware location sensor networks. In: USENIX workshop on hot topics in operating systems, HotOS Gruteser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-aware location sensor networks. In: USENIX workshop on hot topics in operating systems, HotOS
15.
Zurück zum Zitat Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of international conference on mobile systems, applications, and services, MobiSys Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of international conference on mobile systems, applications, and services, MobiSys
16.
Zurück zum Zitat Hu H, Lee DL, Xu J (2006) Fast nearest neighbor search on road networks. In: Proceedings of the international conference on extending database technology, EDBT Hu H, Lee DL, Xu J (2006) Fast nearest neighbor search on road networks. In: Proceedings of the international conference on extending database technology, EDBT
17.
Zurück zum Zitat Jensen CS, Kolář J, Pedersen TB, Timko I (2003) Nearest neighbor queries in road networks. In: Proceedings of the ACM symposium on advances in geographic information systems, ACM GIS Jensen CS, Kolář J, Pedersen TB, Timko I (2003) Nearest neighbor queries in road networks. In: Proceedings of the ACM symposium on advances in geographic information systems, ACM GIS
18.
Zurück zum Zitat Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733CrossRef Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733CrossRef
19.
Zurück zum Zitat Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the international symposium on spatial and temporal databases, SSTD Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the international symposium on spatial and temporal databases, SSTD
20.
Zurück zum Zitat Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of IEEE international conference on pervasive services, ICPS Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of IEEE international conference on pervasive services, ICPS
21.
Zurück zum Zitat Kolahdouzan M, Shahabi C (2004) Voronoi-based K nearest neighbor search for spatial network databases. In: Proceedings of the international conference on very large data BAses, VLDB Kolahdouzan M, Shahabi C (2004) Voronoi-based K nearest neighbor search for spatial network databases. In: Proceedings of the international conference on very large data BAses, VLDB
22.
Zurück zum Zitat Ku WS, Zimmermann R, Peng WC, Shroff S (2007) Privacy protected query processing on spatial networks. In: Proceedings of international workshop on privacy data management, PDM Ku WS, Zimmermann R, Peng WC, Shroff S (2007) Privacy protected query processing on spatial networks. In: Proceedings of international workshop on privacy data management, PDM
23.
Zurück zum Zitat Li PY, Peng WC, Wang TW, Ku WS, Xu J, Hamilton JA Jr (2008) A cloaking algorithm based on spatial networks for location privacy. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, SUTC Li PY, Peng WC, Wang TW, Ku WS, Xu J, Hamilton JA Jr (2008) A cloaking algorithm based on spatial networks for location privacy. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, SUTC
24.
Zurück zum Zitat Mokbel MF, Chow CY, Aref WG (2006) The new Casper: query procesing for location services without compromising privacy. In: Proceedings of the international conference on very large data bases, VLDB Mokbel MF, Chow CY, Aref WG (2006) The new Casper: query procesing for location services without compromising privacy. In: Proceedings of the international conference on very large data bases, VLDB
25.
Zurück zum Zitat Mouratidis K, Yiu ML (2010) Anonymous query processing in road networks. IEEE Trans Knowl Data Eng 22(1):2–15 (2010)CrossRef Mouratidis K, Yiu ML (2010) Anonymous query processing in road networks. IEEE Trans Knowl Data Eng 22(1):2–15 (2010)CrossRef
26.
Zurück zum Zitat Mouratidis K, Yiu ML, Papadias D, Mamoulis N (2006) Continuous nearest neighbor monitoring in road networks. In: Proceedings of the international conference on very large data bases, VLDB Mouratidis K, Yiu ML, Papadias D, Mamoulis N (2006) Continuous nearest neighbor monitoring in road networks. In: Proceedings of the international conference on very large data bases, VLDB
27.
Zurück zum Zitat Papadias D, Zhang J, Mamoulis N, Tao Y (2003) Query processing in spatial network databases. In: Proceedings of the international conference on very large data bases, VLDB Papadias D, Zhang J, Mamoulis N, Tao Y (2003) Query processing in spatial network databases. In: Proceedings of the international conference on very large data bases, VLDB
28.
Zurück zum Zitat Pfitzmann A, Kohntopp M (2000) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Proceedings of international privacy enhancing technologies symposium, PET Pfitzmann A, Kohntopp M (2000) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Proceedings of international privacy enhancing technologies symposium, PET
29.
Zurück zum Zitat Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-based Syst 10(5):557–570CrossRef Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-based Syst 10(5):557–570CrossRef
31.
Zurück zum Zitat Wang T, Liu L (2009) Privacy-aware mobile services over road networks. In: Proceedings of the international conference on very large data bases, VLDB Wang T, Liu L (2009) Privacy-aware mobile services over road networks. In: Proceedings of the international conference on very large data bases, VLDB
32.
Zurück zum Zitat Xu T, Cai Y (2007) Location anonymity in continuous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems, ACM GIS Xu T, Cai Y (2007) Location anonymity in continuous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems, ACM GIS
33.
Zurück zum Zitat Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of the IEEE international conference on computer communications, INFOCOM Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of the IEEE international conference on computer communications, INFOCOM
34.
Zurück zum Zitat Yiu ML, Jensen C, Huang X, Lu H (2008) SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of the international conference on data engineering, ICDE Yiu ML, Jensen C, Huang X, Lu H (2008) SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of the international conference on data engineering, ICDE
35.
Zurück zum Zitat Zhang C, Huang Y (2009) Cloaking locations for anonymous location based services: a hybrid approach. GeoInformatica 13:159–182CrossRef Zhang C, Huang Y (2009) Cloaking locations for anonymous location based services: a hybrid approach. GeoInformatica 13:159–182CrossRef
Metadaten
Titel
Query-aware location anonymization for road networks
verfasst von
Chi-Yin Chow
Mohamed F. Mokbel
Jie Bao
Xuan Liu
Publikationsdatum
01.07.2011
Verlag
Springer US
Erschienen in
GeoInformatica / Ausgabe 3/2011
Print ISSN: 1384-6175
Elektronische ISSN: 1573-7624
DOI
https://doi.org/10.1007/s10707-010-0117-0

Weitere Artikel der Ausgabe 3/2011

GeoInformatica 3/2011 Zur Ausgabe