Skip to main content

Investigating and Devising Privacy Preserving Approaches for Location-Based Services

  • Chapter
  • First Online:
Intelligent Technologies: Concepts, Applications, and Future Directions

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1028))

Abstract

The widespread use of location-based services (LBS), in which any informative service is provided simply based on the user's present location, has generated serious concerns about the user's location privacy. For example, if a customer wants to know “where is the nearest ATM machine?”, she must provide her exact geographical coordinates in order to receive the location-based informative services she requested. Although location-based services open up a wide range of markets and give remarkable convenience to the end user, they also bring minor privacy threats to the user's location data. The requirement that the user informs the LBS provider of their current location in order to get connected services exposes the system to a risk of privacy invasion. Because the volume of data collected from moving or stationary mobile users utilizing LBS may be large, it is critical to design safe frameworks and systems that keep location information private. The two most common techniques to preserving location privacy in LBS are cloaking and obfuscation. These solutions leverage a trusted third party (TTP) and the K-anonymity principle to make the query issuer indistinguishable from other K 1 additional users. The thesis's initial goal is to investigate the user privacy concerns raised by location-based services, and it presents the VIC-PRO scheme, a TTP-based technique to avoid location-based proximity inference of the user who submits a query. The proposed VIC-PRO technique enhances the privacy of query initiating proximity information and helps to close the holes in the present system's K-anonymity approach. In TTP-based methods, all data (namely location coordinates and query) is available at the central server; hence, the central node has complete awareness of the query (including user ID). This is a fundamental flaw in TTP-based design, and it renders these frameworks vulnerable to various privacy assaults. We observe the need for collaboration-based communication between peer users who belong to the population of mobile users in a decentralized or TTP-free architecture and propose CAST (acronym for CAching with truST), a collaborative P2P communication model employing a cascading series of trust between peers, where peers use cached data to collaborate with one another and the results can be obtained. The method operates effectively and gives results locally with little latency when the peers have similar interests (or data value). Under a pull-based sporadic query situation, the suggested algorithm prioritizes user privacy and performs well. We utilize the benefits and mitigate the flaws of both traditional current techniques since measuring and evaluating peer trust have always been a vital aspect. We offer HYB, a hybrid approach, for achieving location privacy for mobile users that regularly utilize location services. The proposed HYB method is based on collaborative location data preprocessing and makes use of homomorphic encryption techniques. Location privacy may be accomplished on two levels: close proximity and far distance. Under a particular, pull-based, occasional query situation, the suggested privacy algorithms successfully safeguard user location privacy. The privacy issue becomes critical when location-tagged data publications, such as public healthcare data and regional criminal history data, are constructed in reverse order by a challenger to locate the authentic consumer against the location specified in the specific record tuple. In most circumstances, address information is regarded as one of the most sensitive aspects of the public record. Any association of such data with a publicly released identifier that has quasi-property has the potential to reveal a great regarding a user (that would normally remain concealed) or, in the worst-case scenario, ruin the user's social reputation. We determine the current situation in geospatial masking, undertake a thorough study of current masking approaches, as well as design three-layer iterative RDV masking, a viable technique that gives location secrecy without rendering publicly available data useless. The recommended approach is excellent for geo-referenced, consistent, granular point published data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Ruchika Gupta, Udai Pratap Rao, “An Exploration to Location Based Service and its Privacy Preserving Techniques: A Survey”, Wireless Personal Communications, Springer, https://doi.org/10.1007/s11277-017-4284-2, Vol. 96, No. 2, pp. 1973–2007.

  2. 2.

    Ruchika Gupta, Udai Pratap Rao, “VIC-PRO: VICinity PROtection by concealing Location Co- ordinates using Geometrical Transformations in Location Based Services”, Wireless Personal Communications, Springer, ISSN: 0929–6 212.

  3. 3.

    Ruchika Gupta, Udai Pratap Rao, “Achieving Location Privacy through CAST in Location Based Services”, Journal of Communications and Networks, IEEE Com. Soc., Vol. 19, No. 3, pp. 239–249.

  4. 4.

    Ruchika Gupta, Udai Pratap Rao, “A Hybrid Location Privacy Solution for Mobile LBS”, Mobile Information Systems, https://doi.org/10.1155/2017/2189646, Vol. 2017, pp. 1–11.

References

  1. Mokbel MF (2007) Privacy in location-based services: state-of-the-art and research directions. In: International conference on mobile data management. IEEE, pp 228–228

    Google Scholar 

  2. “Wi-fi zones e-nagar project news (2014). [Online]. Available http://yourstory.com/2014/02/narendra-modi-e-nagar,2014

  3. “Location based technologies—global market forecast. (2013). [Online]. Available http://marketinfogroup.com/location-based-technologies-market/

  4. Bettini C, Mascetti S, Wang XS, Freni D, Jajodia S (2009) Anonymity and historical-anonymity in location-based services. In: Privacy in location-based applications. Springer, pp 1–30

    Google Scholar 

  5. Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th international conference on World Wide Web. ACM, pp 237–246

    Google Scholar 

  6. Bettini C, Wang XS, Jajodia S (2005) Protecting privacy against location-based personal identification. In: Secure data management. Springer, pp 185–199

    Google Scholar 

  7. Freni D, Ruiz Vicente C, Mascetti S, Bettini C, Jensen CS (2010) Preserving location and absence privacy in geo-social networks. In: Proceedings of the 19th international conference on Information and knowledge management. ACM, pp 309–318

    Google Scholar 

  8. Tsai JY, Kelley PG, Cranor LF, Sadeh N (2010) Location-sharing technologies: privacy risks and controls. ISJLP 6:119

    Google Scholar 

  9. Chow C-Y, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th annual international symposium on Advances in geographic information systems. ACM, pp 171–178

    Google Scholar 

  10. “Popular science news.” [Online]. Available http://www.popsci.com/nycs-payphones-will-become-gigabit-wi-fi-access/-points

  11. Beresford AR, Stajano F (2003) Location privacy in pervasive computing. Pervasive computing 2(1):46–55

    Article  Google Scholar 

  12. Gruteser M, Hoh B (2005) On the anonymity of periodic location samples. In: Security in pervasive computing. Springer, 179–192

    Google Scholar 

  13. Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymiza- tion model. In: Proceedings of the 25th international conference on distributed computing systems, ICDCS. IEEE, pp 620–629

    Google Scholar 

  14. Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Privacy enhancing technologies. Springer, pp 393–412

    Google Scholar 

  15. Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733

    Article  Google Scholar 

  16. Ghinita G, Kalnis P, Skiadopoulos S (2007) Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: Advances in spatial and temporal databases. Springer, pp 221–238

    Google Scholar 

  17. Mokbel MF, Chow C-Y, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment, pp 763–774.

    Google Scholar 

  18. Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18

    Article  Google Scholar 

  19. Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services. ACM, pp 31–42

    Google Scholar 

  20. Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: The 27th conference on computer communications, INFOCOM. IEEE

    Google Scholar 

  21. Meyerowitz J, Roy Choudhury R (2009) Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, pp 345–356

    Google Scholar 

  22. Dewri R, Thurimella R (2014) Exploiting service similarity for privacy in location-based search queries. IEEE Trans Parallel Distrib Syst 25(2):374–383

    Article  Google Scholar 

  23. Beresford AR, Stajano F (2004) Mix zones: user privacy in location-aware services. In: International conference on pervasive computing and communications workshops. IEEE Computer Society, pp 127–127

    Google Scholar 

  24. Freudiger J, Raya M, Félegyházi M, Papadimitratos P et al. (2007) Mix-zones for location privacy in vehicular networks. In: Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS)

    Google Scholar 

  25. Liu X, Zhao H, Pan M, Yue H, Li X, Fang Y (2012) Traffic-aware multiple mix zone placement for protecting location privacy. In: INFOCOM proceedings. IEEE, pp 972–980

    Google Scholar 

  26. Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of the international conference on pervasive services, ICPS. IEEE, pp 88–97

    Google Scholar 

  27. Miura K, Sato F (2013) Evaluation of a hybrid method of user location anonymization. In: 8th international conference on broadband and wireless computing, communication and applications, BWCCA. IEEE, pp 191–198

    Google Scholar 

  28. Zhangwei H, Mingjun X (2010) A distributed spatial cloaking protocol for location privacy. In: Proceedings of the 2nd international conference on networks security wireless communications and trusted computing, NSWCTC, vol 2. IEEE, pp 468–471

    Google Scholar 

  29. Ghinita G, Kalnis P, Skiadopoulos S (2007) Prive: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th international conference on World Wide Web, ACM, pp 371–380

    Google Scholar 

  30. Domingo-Ferrer J (2006) Microaggregation for database and location privacy. In: Next generation information technologies and systems. Springer, pp 106–116

    Google Scholar 

  31. Khoshgozaran A, Shahabi C (2009) Private information retrieval techniques for en- abling location privacy in location-based services. In: Privacy in location-based applications. Springer, pp 59–83

    Google Scholar 

  32. Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the SIGSAC conference on computer and communications security. ACM, pp 901–914

    Google Scholar 

  33. Solanas A, Martínez-Ballesté A (2008) A ttp-free protocol for location privacy in location-based services. Comput Commun 31(6):1181–1191

    Google Scholar 

  34. Ardagna C, Cremonini M, De Capitani S, di Vimercati P, Samarati, et al (2011) An obfuscation-based approach for protecting location privacy. IEEE Trans Dependable Secure Comput 8(1):13–27

    Article  Google Scholar 

  35. Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K-L (2008) Private queries in location-based services: anonymizers are not necessary. In: Proceedings of the SIGMOD international conference on Management of data, ACM, pp 121–132

    Google Scholar 

  36. Khoshgozaran A, Shirani-Mehr H, Shahabi C (2008) Spiral: a scalable private information retrieval approach to location privacy. In: Mobile data management workshops,2008. MDMW 2008. ninth international conference on IEEE, pp 55–62

    Google Scholar 

  37. Khoshgozaran A, Shahabi C, Shirani-Mehr H (2011) Location privacy: going be-yond k-anonymity, cloaking and anonymizers. Knowl Inf Syst 26(3):435–465

    Article  Google Scholar 

  38. Biswal S, Paul G, Raizada S (2014) Preserving privacy in location-based services using sudoku structures. In: Information systems security. Springer, pp 448–463

    Google Scholar 

  39. Rothblum R (2011) Homomorphic encryption: From private-key to public-key. In: TCC, vol 6597. Springer, pp 219–234

    Google Scholar 

  40. Puttaswamy KP, Wang S, Steinbauer T, Agrawal D, El Abbadi A, Kruegel C, Zhao BY (2014) Preserving location privacy in geosocial applications. IEEE Trans Mobile Comput 13(1):159–173

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruchika Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gupta, R., Rao, U.P. (2022). Investigating and Devising Privacy Preserving Approaches for Location-Based Services. In: Dash, S.R., Lenka, M.R., Li, KC., Villatoro-Tello, E. (eds) Intelligent Technologies: Concepts, Applications, and Future Directions. Studies in Computational Intelligence, vol 1028. Springer, Singapore. https://doi.org/10.1007/978-981-19-1021-0_6

Download citation

Publish with us

Policies and ethics