An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey
- 528 Downloads
- 1 Citations
Abstract
Mobile gadgets today are swaggering computing potential and memory at par or at times even higher to that found in desktop personal computers. A wireless interconnection has turned out to be considerably more readily accessible these days. As individuals are growing mobile with regard to the fast lifestyle and working pattern, a new, smarter system came into existence that is termed as ‘Location Based Service’ (LBS). Such a system amalgamates the location data of a user with smart applications to deliver demanded services. Although LBS provide major openings for a large variety of markets and remarkable convenience to the end user, it also presents subtle privacy attack to user’s location information. Threat to the privacy sneaks into the system due to the prerequisite of sending user’s current location to the LBS provider to attain related services. Since the volume of data gathered from dynamic or stationary mobile users using LBS can be high, it is vital to outline the frameworks and systems in a manner that is secure and keep the location information private. In this paper, we perform an exploratory survey about the various techniques that have been suggested by many researchers based on centralized and distributed approaches, to preserve location privacy of the user. A large portion of these techniques has a trade-off between privacy, efficiency, applicability and quality of service. This paper details and analyses the various existing techniques for preserving location privacy of the participating user in LBS.
Keywords
Location based services Location privacy GPS Mobile communicationReferences
- 1.Mokbel, M. F. (2007). Privacy in location-based services: State-of-the-art and research directions. In Mobile data management, 2007 international conference on, pp. 228–228. IEEE.Google Scholar
- 2.Acker, L., Curran, W., Susi, S., & Velazquez, M. (2006). The impact of the FCCs position on wireless E911.Google Scholar
- 3.Stalking Your Friends with Facebook Messenger. (2015). https://medium.com/faith-and-future/stalking-your-friends-with-facebook-messenger-9da8820bd27d
- 4.Popular Science News. (2014). http://www.popsci.com/nycs-payphones-will-become-gigabit-wi-fi-access/-points
- 5.Wi-Fi zones e-Nagar project News. (2014). http://yourstory.com/2014/02/narendra-modi-e-nagar
- 6.Location Based Technologies Global Market Forecast. (2013). http://marketinfogroup.com/location-based-technologies-market/
- 7.Kalnis, P., Ghinita, G., Mouratidis, K., & Papadias, D. (2007). Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12), 1719–1733.CrossRefGoogle Scholar
- 8.Hofmann-Wellenhof, B., Lichtenegger, H., & Wasle, E. (2007). GNSS global navigation satellite systems: GPS, GLONASS, Galileo, and more. London: Springer.Google Scholar
- 9.Foxs News: Man Accused of Stalking Ex-Girlfriend With GPS. (2004). http://www.foxnews.com/story/0,2933,131487,00.htmlGoogle Scholar
- 10.Cop stalked ex-wife before killing her, GPS data show (2015). http://www.usatoday.com/story/news/nation/2015/07/29/cop-stalked-ex-wife/30826881/
- 11.Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., & Tang, J.-M. (2002). Framework for security and privacy in automotive telematics. In Proceedings of the 2nd international workshop on mobile commerce, pp. 25–32. ACM.Google Scholar
- 12.Beresford, A. R., & Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive Computing, 1, 46–55.CrossRefGoogle Scholar
- 13.Damania, F. (2001). The internet: Equalizer of freedom of speech-A discussion on freedom of speech on the internet in the United States and India. Indiana International and Comparative Law Review, 12, 243.Google Scholar
- 14.Tsai, J. Y., Kelley, P. G., Cranor, L. F., & Sadeh, N. (2010). Location-sharing technologies: Privacy risks and controls. ISJLP, 6, 119.Google Scholar
- 15.Bettini, C., Wang, X. S., Jajodia, S. (2005). Protecting privacy against location-based personal identification. In Secure data management, pp. 185-199. Berlin, Heidelberg: Springer.Google Scholar
- 16.Freni, D., Ruiz Vicente, C., Mascetti, S., Bettini, C., & Jensen, C. S. (2010). Preserving location and absence privacy in geo-social networks. In Proceedings of the 19th ACM international conference on information and knowledge management, pp. 309–318. ACM.Google Scholar
- 17.Krumm, J. (2009). A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6), 391–399.CrossRefGoogle Scholar
- 18.Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Privacy Enhancing Technologies (pp. 393–412). Berlin, Heidelberg: Springer.Google Scholar
- 19.Snekkenes, E. (2001). Concepts for personal location privacy policies. In Proceedings of the 3rd ACM conference on electronic commerce, pp. 48–57. ACM.Google Scholar
- 20.Chow, C.-Y., Mokbel, M. F., & Liu, X. (2006). A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, pp. 171–178. ACM.Google Scholar
- 21.Grlach, A., Heinemann, A., & Terpstra, W. W. (2005). Survey on location privacy in pervasive computing. In Privacy, security and trust within the context of pervasive computing (pp. 23–34). US: Springer.Google Scholar
- 22.Bettini, C., Mascetti, S., Wang, X. S., Freni, D., & Jajodia, S. (2009). Anonymity and historical-anonymity in location-based services. In Privacy in location-based applications (pp. 1–30). Berlin, Heidelberg: Springer.Google Scholar
- 23.Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). MOBIHIDE: A mobilea peer-to-peer system for anonymous location-based queries. In Advances in spatial and temporal databases (pp. 221–238). Berlin, Heidelberg: Springer.Google Scholar
- 24.Mokbel, M. F., Chow, C.-Y., & Aref, W. G.(2006). The new Casper: Query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pp. 763–774. VLDB Endowment.Google Scholar
- 25.Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacygrid. In Proceedings of the 17th international conference on world wide web, pp. 237–246. ACM.Google Scholar
- 26.Gedik, B., & Liu, L. (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 7(1), 1–18.CrossRefGoogle Scholar
- 27.Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pp. 31–42. ACM.Google Scholar
- 28.Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE.Google Scholar
- 29.Zhangwei, H., & Mingjun, X. (2010). A distributed spatial cloaking protocol for location privacy. In Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 second international conference on, vol. 2, pp. 468–471. IEEE.Google Scholar
- 30.Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). PRIVE: Anonymous location-based queries in distributed mobile systems. In Proceedings of the 16th international conference on world wide web, pp. 371–380. ACM.Google Scholar
- 31.Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.MathSciNetCrossRefMATHGoogle Scholar
- 32.Samarati, P. (2001). Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), 1010–1027.CrossRefGoogle Scholar
- 33.Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.MathSciNetCrossRefMATHGoogle Scholar
- 34.Pfitzmann, A., & Khntopp, M. (2001). Anonymity, unobservability, and pseudonymitya proposal for terminology. In Designing privacy enhancing technologies, pp. 1–9. Berlin, Heidelberg: Springer.Google Scholar
- 35.Gruteser, M., & Hoh, B. (2005). On the anonymity of periodic location samples. In Security in pervasive computing (pp. 179–192). Berlin, Heidelberg: Springer.Google Scholar
- 36.Zhang, W., Cui, X., Li, D., Yuan, D., & Wang, M. (2010). The location privacy protection research in location-based service. In Geoinformatics, 2010 18th international conference on, pp. 1–4. IEEE.Google Scholar
- 37.Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In Distributed computing systems, 2005. ICDCS 2005. Proceedings. 25th IEEE international conference on, pp. 620–629. IEEE.Google Scholar
- 38.Meyerowitz, J., & Choudhury, R. R. (2009). Hiding stars with fireworks: location privacy through camouflage. In Proceedings of the 15th annual international conference on mobile computing and networking, pp. 345–356. ACM.Google Scholar
- 39.Dewri, R., & Thurimella, R. (2014). Exploiting service similarity for privacy in location-based search queries. IEEE Transactions on Parallel and Distributed Systems, 25(2), 374–383.CrossRefGoogle Scholar
- 40.Xiao, C., Chen, Z., Wang, X., Zhao, J., & Chen, C. (2014). DeCache: A decentralized two-level cache for mobile location privacy protection. In Ubiquitous and Future Networks (ICUFN), 2014 sixth international conference on, pp. 81–86. IEEE.Google Scholar
- 41.Beresford, A. R., & Stajano, F. (2004). Mix zones: User privacy in location-aware services. p. 127.Google Scholar
- 42.Freudiger, J., Raya, M., Flegyhzi, M., & Papadimitratos, P. (2007). Mix-zones for location privacy in vehicular networks.Google Scholar
- 43.Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., & Fang, Y. (2012). Traffic-aware multiple mix zone placement for protecting location privacy. In INFOCOM, 2012 proceedings IEEE, pp. 972–980. IEEE.Google Scholar
- 44.Kido, H., Yanagisawa, Y., & Satoh, T. (2005). An anonymous communication technique using dummies for location-based services. In Pervasive services, 2005. ICPS’05. Proceedings international conference on, pp. 88–97. IEEE.Google Scholar
- 45.Yu, Y., Tang, S., & Zimmermann, R. (2013). Edge-based locality sensitive hashing for efficient geo-fencing application. In Proceedings of the 21st ACM SIGSPATIAL international conference on advances in geographic information systems, pp. 576–579. ACM.Google Scholar
- 46.Hengartner, U., & Steenkiste, P. (2003). Access control to information in pervasive computing environments. In HotOS, pp. 157–162.Google Scholar
- 47.Hengartner, U., & Steenkiste, P. (2004). Protecting access to people location information. In Security in pervasive computing (pp. 25–38). Berlin, Heidelberg: Springer.Google Scholar
- 48.Langheinrich, M. (2001). Privacy by designprinciples of privacy-aware ubiquitous systems. In Ubicomp 2001: Ubiquitous computing (pp. 273–291). Berlin, Heidelberg: Springer.Google Scholar
- 49.Solanas, A., & Martnez-Ballest, A. (2008). A TTP-free protocol for location privacy in location-based services. Computer Communications, 31(6), 1181–1191.CrossRefGoogle Scholar
- 50.Domingo-Ferrer, J. (2006). Microaggregation for database and location privacy. In Next generation information technologies and systems (pp. 106–116). Berlin, Heidelberg: Springer.Google Scholar
- 51.Ardagna, C., Cremonini, M., De Capitani di Vimercati, S., & Samarati, P. (2011). An obfuscation-based approach for protecting location privacy. IEEE Transactions on Dependable and Secure Computing, 8(1), 13–27.CrossRefGoogle Scholar
- 52.Xu, J., Tang, X., Haibo, H., & Jing, D. (2010). Privacy-conscious location-based queries in mobile environments. IEEE Transactions on Parallel and Distributed Systems, 21(3), 313–326.CrossRefGoogle Scholar
- 53.Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L. (2008). Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on management of data, pp. 121–132. ACM.Google Scholar
- 54.Khoshgozaran, A., & Shahabi, C. (2009). Private information retrieval techniques for enabling location privacy in location-based services. In Privacy in location-based applications (pp. 59–83). Berlin, Heidelberg: Springer.Google Scholar
- 55.Miura, K., & Sato, F. (2013). Evaluation of a hybrid method of user location anonymization. In Broadband and wireless computing, communication and applications (BWCCA), 2013 eighth international conference on, pp. 191–198. IEEE.Google Scholar
- 56.Bayardo, R. J., & Agrawal, R. (2005). Data privacy through optimal k-anonymization. In Proceedings of the 2005 IEEE ICDE 21st international conference on data engineering, pp. 217–228. IEEE.Google Scholar
- 57.LeFevre, K., DeWitt, D. J., & Ramakrishnan, R. (2006). Mondrian multidimensional k-anonymity. In Data engineering, 2006. ICDE’06. Proceedings of the 22nd international conference on, pp. 25–25. IEEE.Google Scholar
- 58.LeFevre, K., DeWitt, D. J., & Ramakrishnan, R. (2005). Incognito: Efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on management of data, pp. 49–60. ACM.Google Scholar
- 59.Okamoto, T., & Uchiyama, S. (1998). A new public-key cryptosystem as secure as factoring. In International conference on the theory and applications of cryptographic techniques, pp. 308–318. Berlin: Springer.Google Scholar
- 60.Rothblum, R. (2011). Homomorphic encryption: From private-key to public-key. In Theory of cryptography conference, pp. 219–234. Berlin: Springer.Google Scholar
- 61.Solanas, A., & Martnez-Balleste, A. (2008). A TTP-free protocol for location privacy in location-based services. Computer Communications, 31(6), 1181–1191.CrossRefGoogle Scholar
- 62.Puttaswamy, K. P. N., Wang, S., Steinbauer, T., Agrawal, D., El Abbadi, A., Kruegel, C., et al. (2014). Preserving location privacy in geosocial applications. IEEE Transactions on Mobile Computing, 13(1), 159–173.CrossRefGoogle Scholar
- 63.Andrs, M. E., Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2013). Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on computer and communications security, pp. 901–914. ACM.Google Scholar
- 64.