Wireless Personal Communications

, Volume 51, Issue 1, pp 53–65 | Cite as

Privacy Protected Spatial Query Processing for Advanced Location Based Services



Due to the popularity of mobile devices (e.g., cell phones, PDAs, etc.), location-based services have become more and more prevalent in recent years. However, users have to reveal their location information to access location-based services with existing service infrastructures. It is possible that adversaries could collect the location information, which in turn invades user’s privacy. There are existing solutions for query processing on spatial networks and mobile user privacy protection in Euclidean space. However there is no solution for solving queries on spatial networks with privacy protection. Therefore, we aim to provide network distance spatial query solutions which can preserve user privacy by utilizing K-anonymity mechanisms. In this paper, we propose an effective location cloaking mechanism based on spatial networks and two novel query algorithms, PSNN and PSRQ, for answering nearest neighbor queries and range queries on spatial networks without revealing private information of the query initiator. We demonstrate the appeal of our technique using extensive simulation results.


Privacy protection Mobile data management Location-based services 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aref, W. G., & Samet, H. (1990). Efficient processing of window queries in the pyramid data structure. In PODS (pp. 265–272).Google Scholar
  2. 2.
    Brinkhoff T. (2002) A framework for generating network-based moving objects. GeoInformatica 6(2): 153–180MATHCrossRefGoogle Scholar
  3. 3.
    Brinkhoff, T., Kriegel, H.-P., & Seeger, B. (1993). Efficient processing of spatial joins using R-trees. In SIGMOD Conference (pp. 237–246).Google Scholar
  4. 4.
    Cheng, R., Kalashnikov, D. V., & Prabhakar, S. (2003). Evaluating probabilistic queries over imprecise data. In SIGMOD Conference (pp. 551–562).Google Scholar
  5. 5.
    Dijkstra E.W. (1959) A note on two problems in connexion with graphs. Numerische Mathematik 1: 269–271MATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In 25th International Conference on Distributed Computing Systems (pp. 620–629).Google Scholar
  7. 7.
    Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys.Google Scholar
  8. 8.
    Gruteser M., Liu X. (2004) Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy 2(2): 28–34CrossRefGoogle Scholar
  9. 9.
    Guttman, A. (1984). R-trees: A dynamic index structure for spatial searching. In SIGMOD Conference (pp. 47–57).Google Scholar
  10. 10.
    Hjaltason G.R., Samet H. (1999) Distance browsing in spatial databases. ACM Transactions on Database Systems 24(2): 265–318CrossRefGoogle Scholar
  11. 11.
    Kolahdouzan, M. R., Shahabi, C. (2004). Voronoi-based K nearest neighbor search for spatial network databases. In VLDB (pp. 840–851).Google Scholar
  12. 12.
    Ku, W.-S., Zimmermann, R., Peng, W.-C., & Shroff, S. (2007). Privacy protected query processing on spatial networks. In ICDE Workshops (pp. 215–220).Google Scholar
  13. 13.
    Mokbel, M. F. (2006). Towards privacy-aware location-based database servers. In ICDE Workshops (p. 93).Google Scholar
  14. 14.
    Mokbel, M. F., Chow, C.-Y., & Aref, W. G. (2006). The new casper: Query processing for location services without compromising privacy. In VLDB (pp. 763–774).Google Scholar
  15. 15.
    Papadias, D., Zhang, J., Mamoulis, N., & Tao, Y. (2003). Query processing in spatial network databases. In VLDB (pp. 802–813).Google Scholar
  16. 16.
    Roussopoulos, N., Kelley, S., & Vincent, F. (1995). Nearest neighbor queries. In SIGMOD Conference (pp. 71–79).Google Scholar
  17. 17.
    Schilit B.N., Hong J.I., Gruteser M. (2003) Wireless location privacy protection. IEEE Computer 36(12): 135–137Google Scholar
  18. 18.
    Sweene L. (2002) k-Anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5): 557–570CrossRefMathSciNetGoogle Scholar
  19. 19.
    Tanimoto S.L., Pavlidis T. (1975) A hierarchical data structure for picture processing. Computer Graphics and Image Processing 4(2): 104–113CrossRefGoogle Scholar
  20. 20.
    Voelcker J. (2006) Stalked by satellite: An alarming rise in GPS-enabled harassment. IEEE Spectrum 47(7): 15–16CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC. 2008

Authors and Affiliations

  1. 1.Department of Computer Science and Software EngineeringAuburn UniversityAuburnUSA
  2. 2.Department of Electrical & Computer EngineeringBinghamton UniversityBinghamtonUSA
  3. 3.Department of Computer ScienceNational University of SingaporeSingaporeSingapore

Personalised recommendations