Abstract
The widespread use of location-based services (LBS), in which any informative service is provided simply based on the user's present location, has generated serious concerns about the user's location privacy. For example, if a customer wants to know “where is the nearest ATM machine?”, she must provide her exact geographical coordinates in order to receive the location-based informative services she requested. Although location-based services open up a wide range of markets and give remarkable convenience to the end user, they also bring minor privacy threats to the user's location data. The requirement that the user informs the LBS provider of their current location in order to get connected services exposes the system to a risk of privacy invasion. Because the volume of data collected from moving or stationary mobile users utilizing LBS may be large, it is critical to design safe frameworks and systems that keep location information private. The two most common techniques to preserving location privacy in LBS are cloaking and obfuscation. These solutions leverage a trusted third party (TTP) and the K-anonymity principle to make the query issuer indistinguishable from other K 1 additional users. The thesis's initial goal is to investigate the user privacy concerns raised by location-based services, and it presents the VIC-PRO scheme, a TTP-based technique to avoid location-based proximity inference of the user who submits a query. The proposed VIC-PRO technique enhances the privacy of query initiating proximity information and helps to close the holes in the present system's K-anonymity approach. In TTP-based methods, all data (namely location coordinates and query) is available at the central server; hence, the central node has complete awareness of the query (including user ID). This is a fundamental flaw in TTP-based design, and it renders these frameworks vulnerable to various privacy assaults. We observe the need for collaboration-based communication between peer users who belong to the population of mobile users in a decentralized or TTP-free architecture and propose CAST (acronym for CAching with truST), a collaborative P2P communication model employing a cascading series of trust between peers, where peers use cached data to collaborate with one another and the results can be obtained. The method operates effectively and gives results locally with little latency when the peers have similar interests (or data value). Under a pull-based sporadic query situation, the suggested algorithm prioritizes user privacy and performs well. We utilize the benefits and mitigate the flaws of both traditional current techniques since measuring and evaluating peer trust have always been a vital aspect. We offer HYB, a hybrid approach, for achieving location privacy for mobile users that regularly utilize location services. The proposed HYB method is based on collaborative location data preprocessing and makes use of homomorphic encryption techniques. Location privacy may be accomplished on two levels: close proximity and far distance. Under a particular, pull-based, occasional query situation, the suggested privacy algorithms successfully safeguard user location privacy. The privacy issue becomes critical when location-tagged data publications, such as public healthcare data and regional criminal history data, are constructed in reverse order by a challenger to locate the authentic consumer against the location specified in the specific record tuple. In most circumstances, address information is regarded as one of the most sensitive aspects of the public record. Any association of such data with a publicly released identifier that has quasi-property has the potential to reveal a great regarding a user (that would normally remain concealed) or, in the worst-case scenario, ruin the user's social reputation. We determine the current situation in geospatial masking, undertake a thorough study of current masking approaches, as well as design three-layer iterative RDV masking, a viable technique that gives location secrecy without rendering publicly available data useless. The recommended approach is excellent for geo-referenced, consistent, granular point published data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Ruchika Gupta, Udai Pratap Rao, “An Exploration to Location Based Service and its Privacy Preserving Techniques: A Survey”, Wireless Personal Communications, Springer, https://doi.org/10.1007/s11277-017-4284-2, Vol. 96, No. 2, pp. 1973–2007.
- 2.
Ruchika Gupta, Udai Pratap Rao, “VIC-PRO: VICinity PROtection by concealing Location Co- ordinates using Geometrical Transformations in Location Based Services”, Wireless Personal Communications, Springer, ISSN: 0929–6 212.
- 3.
Ruchika Gupta, Udai Pratap Rao, “Achieving Location Privacy through CAST in Location Based Services”, Journal of Communications and Networks, IEEE Com. Soc., Vol. 19, No. 3, pp. 239–249.
- 4.
Ruchika Gupta, Udai Pratap Rao, “A Hybrid Location Privacy Solution for Mobile LBS”, Mobile Information Systems, https://doi.org/10.1155/2017/2189646, Vol. 2017, pp. 1–11.
References
Mokbel MF (2007) Privacy in location-based services: state-of-the-art and research directions. In: International conference on mobile data management. IEEE, pp 228–228
“Wi-fi zones e-nagar project news (2014). [Online]. Available http://yourstory.com/2014/02/narendra-modi-e-nagar,2014
“Location based technologies—global market forecast. (2013). [Online]. Available http://marketinfogroup.com/location-based-technologies-market/
Bettini C, Mascetti S, Wang XS, Freni D, Jajodia S (2009) Anonymity and historical-anonymity in location-based services. In: Privacy in location-based applications. Springer, pp 1–30
Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th international conference on World Wide Web. ACM, pp 237–246
Bettini C, Wang XS, Jajodia S (2005) Protecting privacy against location-based personal identification. In: Secure data management. Springer, pp 185–199
Freni D, Ruiz Vicente C, Mascetti S, Bettini C, Jensen CS (2010) Preserving location and absence privacy in geo-social networks. In: Proceedings of the 19th international conference on Information and knowledge management. ACM, pp 309–318
Tsai JY, Kelley PG, Cranor LF, Sadeh N (2010) Location-sharing technologies: privacy risks and controls. ISJLP 6:119
Chow C-Y, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th annual international symposium on Advances in geographic information systems. ACM, pp 171–178
“Popular science news.” [Online]. Available http://www.popsci.com/nycs-payphones-will-become-gigabit-wi-fi-access/-points
Beresford AR, Stajano F (2003) Location privacy in pervasive computing. Pervasive computing 2(1):46–55
Gruteser M, Hoh B (2005) On the anonymity of periodic location samples. In: Security in pervasive computing. Springer, 179–192
Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymiza- tion model. In: Proceedings of the 25th international conference on distributed computing systems, ICDCS. IEEE, pp 620–629
Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Privacy enhancing technologies. Springer, pp 393–412
Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733
Ghinita G, Kalnis P, Skiadopoulos S (2007) Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: Advances in spatial and temporal databases. Springer, pp 221–238
Mokbel MF, Chow C-Y, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment, pp 763–774.
Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18
Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services. ACM, pp 31–42
Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: The 27th conference on computer communications, INFOCOM. IEEE
Meyerowitz J, Roy Choudhury R (2009) Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, pp 345–356
Dewri R, Thurimella R (2014) Exploiting service similarity for privacy in location-based search queries. IEEE Trans Parallel Distrib Syst 25(2):374–383
Beresford AR, Stajano F (2004) Mix zones: user privacy in location-aware services. In: International conference on pervasive computing and communications workshops. IEEE Computer Society, pp 127–127
Freudiger J, Raya M, Félegyházi M, Papadimitratos P et al. (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS)
Liu X, Zhao H, Pan M, Yue H, Li X, Fang Y (2012) Traffic-aware multiple mix zone placement for protecting location privacy. In: INFOCOM proceedings. IEEE, pp 972–980
Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of the international conference on pervasive services, ICPS. IEEE, pp 88–97
Miura K, Sato F (2013) Evaluation of a hybrid method of user location anonymization. In: 8th international conference on broadband and wireless computing, communication and applications, BWCCA. IEEE, pp 191–198
Zhangwei H, Mingjun X (2010) A distributed spatial cloaking protocol for location privacy. In: Proceedings of the 2nd international conference on networks security wireless communications and trusted computing, NSWCTC, vol 2. IEEE, pp 468–471
Ghinita G, Kalnis P, Skiadopoulos S (2007) Prive: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th international conference on World Wide Web, ACM, pp 371–380
Domingo-Ferrer J (2006) Microaggregation for database and location privacy. In: Next generation information technologies and systems. Springer, pp 106–116
Khoshgozaran A, Shahabi C (2009) Private information retrieval techniques for en- abling location privacy in location-based services. In: Privacy in location-based applications. Springer, pp 59–83
Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the SIGSAC conference on computer and communications security. ACM, pp 901–914
Solanas A, Martínez-Ballesté A (2008) A ttp-free protocol for location privacy in location-based services. Comput Commun 31(6):1181–1191
Ardagna C, Cremonini M, De Capitani S, di Vimercati P, Samarati, et al (2011) An obfuscation-based approach for protecting location privacy. IEEE Trans Dependable Secure Comput 8(1):13–27
Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K-L (2008) Private queries in location-based services: anonymizers are not necessary. In: Proceedings of the SIGMOD international conference on Management of data, ACM, pp 121–132
Khoshgozaran A, Shirani-Mehr H, Shahabi C (2008) Spiral: a scalable private information retrieval approach to location privacy. In: Mobile data management workshops,2008. MDMW 2008. ninth international conference on IEEE, pp 55–62
Khoshgozaran A, Shahabi C, Shirani-Mehr H (2011) Location privacy: going be-yond k-anonymity, cloaking and anonymizers. Knowl Inf Syst 26(3):435–465
Biswal S, Paul G, Raizada S (2014) Preserving privacy in location-based services using sudoku structures. In: Information systems security. Springer, pp 448–463
Rothblum R (2011) Homomorphic encryption: From private-key to public-key. In: TCC, vol 6597. Springer, pp 219–234
Puttaswamy KP, Wang S, Steinbauer T, Agrawal D, El Abbadi A, Kruegel C, Zhao BY (2014) Preserving location privacy in geosocial applications. IEEE Trans Mobile Comput 13(1):159–173
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Gupta, R., Rao, U.P. (2022). Investigating and Devising Privacy Preserving Approaches for Location-Based Services. In: Dash, S.R., Lenka, M.R., Li, KC., Villatoro-Tello, E. (eds) Intelligent Technologies: Concepts, Applications, and Future Directions. Studies in Computational Intelligence, vol 1028. Springer, Singapore. https://doi.org/10.1007/978-981-19-1021-0_6
Download citation
DOI: https://doi.org/10.1007/978-981-19-1021-0_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1020-3
Online ISBN: 978-981-19-1021-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)