Advertisement

A geographic map-based middleware framework to obfuscate smart vehicles’ locations

  • Jia-Ning LuoEmail author
  • Ming-Hour YangEmail author
  • Kuo-Yu Tsai
Article
  • 11 Downloads

Abstract

In the 5G applications, smart vehicles typically use built-in positioning functions to query geographic map information or to access location-based multimedia or service, such as traffic image, 3D graphics or surrounding points of interest (POI) from a location-based service (LBS) provider. However, when a query is submitted, vehicles’ information such as their real locations or moving routes may be collected by the service provider. To protect vehicles’ privacy, we developed a geographic map-based middleware framework to prevent the service providers from predicting vehicles’ location or moving routes by using background information derived from the geographic maps. In addition, the middleware framework uses a caching approach to generate obfuscation areas on the maps to improve performance. The proposed method also considers popular tourist POIs on the maps to enhance the cache data hit ratio and query performance.

Keywords

Location-based service Privacy protection Obfuscation area Smart vehicle 

Notes

Acknowledgements

The authors gratefully acknowledge the support from Taiwan Information Security Center (TWISC) and Ministry of Science and Technology under the grants MOST 107-2218-E-011- 012-, MOST 107-2221-E-033-010-, and MOST 107-2221- E-130-001-.

References

  1. 1.
    Ardagna C, Cremonini M, De Capitani di Vimercati S, Samarati P (2011) An obfuscation-based approach for protecting location privacy, dependable and secure computing. IEEE Transactions on 8(1):13–27Google Scholar
  2. 2.
    Ardagna CA, Livraga G, Samarati P (2012) Protecting Privacy of User Information in Continuous Location-Based Services, in Proceeding of CSE, December 5–7Google Scholar
  3. 3.
    Chow CY, Mokbel M (2007) Enabling private continuous queries for revealed user locations, in proceeding of SSTD 2007Google Scholar
  4. 4.
    Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. SIGKDD Explorations Newsletter 13(1):19–29CrossRefGoogle Scholar
  5. 5.
    Damiani ML, Bertino E, Silvestri C (2009) Protecting location privacy against spatial inferences: the PROBE approach, in Proceedings of SPRINGL, pp.32–41Google Scholar
  6. 6.
    Domingo-Ferrer J, Bras-Amoro’s M, Wu Q, Manjo’n J (2009) User- private information retrieval based on a peer-to-peer community. Data Knowledge Engineering 68(11):1237–1252CrossRefGoogle Scholar
  7. 7.
    Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy,” in Proceedings of PERVASIVEGoogle Scholar
  8. 8.
    Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: Anonymizers are not necessary,” in Proceedings of SIGMODGoogle Scholar
  9. 9.
    Gruteser M, Grunwald D (2003) Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, in Proceedings of MobiSysGoogle Scholar
  10. 10.
    Hoh B, Gruteser M, Xiong H, Alrabady A (2007) Preserving privacy in GPS traces via uncertainty-aware path cloaking, in Proceeding of CCSGoogle Scholar
  11. 11.
    Howe DC, Nissenbaum H (2009) TrackMeNot, “Resisting surveillance in web search,” in I. Kerr, V. Steeves, and C. Lucock, editors, Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, chapter 23Google Scholar
  12. 12.
    Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location based identity inference in anonymous spatial queries. Knowledge and Data Engineering, IEEE Transactions on 19(12):1719–1733CrossRefGoogle Scholar
  13. 13.
    Kaplan E, Pedersen TB, Savas E, Saygın Y (2010) Discovering private trajectories using background information. Journal of Data and Knowledge Engineering 69(7):723–736CrossRefGoogle Scholar
  14. 14.
    Lu H, Jensen CS, Yiu ML (2008) PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services,” in Proc. MobiD, pp.16–23Google Scholar
  15. 15.
    Mokbel MF, Chow CY, Aref WG The new Casper: query processing for location services without compromising privacy, in Proceedings of the 32nd international conference on Very large data bases, pp 763–774Google Scholar
  16. 16.
    Mouratidis K, Yiu M (2010) Anonymous query processing in road networks. Knowledge and Data Engineering, IEEE Transactions on 22(1):2–15CrossRefGoogle Scholar
  17. 17.
    Narayanan A, Thiagarajan N, Lakhani M, Hamburg M, Boneh D (2011) Location privacy via private proximity testing,” NDSSGoogle Scholar
  18. 18.
  19. 19.
    Pan X, Meng X, Xu J (2009) Distortion-based anonymity for continuous queries in location-based mobile services, in Proceedings of ACM GISGoogle Scholar
  20. 20.
    Papadias D, Zhang J, Mamoulis N, Tao Y (2003) Query Processing in Spatial Network Databases, in Proceedings of the 29th International Conference on Very Large Data BasesGoogle Scholar
  21. 21.
    Pfitzmann A, Köhntopp M (2001) Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology, in Designing privacy enhancing technologies, Lecture Notes in Computer Science, pp. 1–9Google Scholar
  22. 22.
    Phan TN, Dang TK, Küng J (2011) User privacy protection from trajectory perspective in location-based applications,” in Proceedings of the 19th interdisciplinary information management talks, Jindřichův Hradec, Czech Republic, pp. 281–288Google Scholar
  23. 23.
    Pingley A, Zhang N, Fu X, Choi HA, Subramaniam S, Zhao W (2011) Protection of Query Privacy for Continuous Location Based Services, in Proceedings IEEE INFOCOM, pp. 1710–1718Google Scholar
  24. 24.
    Rodden T, Friday A, Muller H, Dix A (2002) A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham, Lancaster University, University of BristolGoogle Scholar
  25. 25.
    Um JH, Kim HD, Chang JW (2010) An Advanced Cloaking Algorithm Using Hilbert Curves for Anonymous Location Based Service, Social Computing (SocialCom), 2010 IEEE Second International Conference on, pp1093–1098Google Scholar
  26. 26.
    Wang T, Liu L (2009) Privacy-aware Mobile Services over Road Networks, in Proceedings of the VLDB EndowmentGoogle Scholar
  27. 27.
    Wu C, Huang C, Huang J, Hu C (2011) On preserving location privacy in mobile environments”, in Proc. PerCom Workshops, pp.490–495Google Scholar
  28. 28.
    Xu T, Cai Y (2007) Location anonymity in continuous location-based services, in Proceedings of ACM GISGoogle Scholar
  29. 29.
    Yang KT, Chiu GM, Lyu HJ, Huang DJ, Teng WC (2012) Path Privacy Protection in Continuous Location-Based Services over Road Networks, in 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 435–442Google Scholar
  30. 30.
    Yao L, Lin C, Liu G, Deng F, Wu G (2012) Location Anonymity Based on Fake Queries in Continuous Location-Based Services,” in Proceedings of 2012 Seventh International Conference on Availability, Reliability and Security (ARES), pp. 375–382Google Scholar
  31. 31.
    Zhang C, Huang Y (2008) Cloaking locations for anonymous location based services: a hybrid approach,” GEOINFORMATICA Volume.13, Number.2, pp159–182Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information and Telecommunication EngineeringsMing Chuan UniversityTaoyuanTaiwan
  2. 2.Department of Information and Computer EngineeringChung Yuan Christian UniversityTaoyuanTaiwan
  3. 3.Department of Applied MathematicsChinese Culture UniversityTaipeiTaiwan

Personalised recommendations