Wireless Personal Communications

, Volume 96, Issue 2, pp 1973–2007 | Cite as

An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey

Article

Abstract

Mobile gadgets today are swaggering computing potential and memory at par or at times even higher to that found in desktop personal computers. A wireless interconnection has turned out to be considerably more readily accessible these days. As individuals are growing mobile with regard to the fast lifestyle and working pattern, a new, smarter system came into existence that is termed as ‘Location Based Service’ (LBS). Such a system amalgamates the location data of a user with smart applications to deliver demanded services. Although LBS provide major openings for a large variety of markets and remarkable convenience to the end user, it also presents subtle privacy attack to user’s location information. Threat to the privacy sneaks into the system due to the prerequisite of sending user’s current location to the LBS provider to attain related services. Since the volume of data gathered from dynamic or stationary mobile users using LBS can be high, it is vital to outline the frameworks and systems in a manner that is secure and keep the location information private. In this paper, we perform an exploratory survey about the various techniques that have been suggested by many researchers based on centralized and distributed approaches, to preserve location privacy of the user. A large portion of these techniques has a trade-off between privacy, efficiency, applicability and quality of service. This paper details and analyses the various existing techniques for preserving location privacy of the participating user in LBS.

Keywords

Location based services Location privacy GPS Mobile communication 

References

  1. 1.
    Mokbel, M. F. (2007). Privacy in location-based services: State-of-the-art and research directions. In Mobile data management, 2007 international conference on, pp. 228–228. IEEE.Google Scholar
  2. 2.
    Acker, L., Curran, W., Susi, S., & Velazquez, M. (2006). The impact of the FCCs position on wireless E911.Google Scholar
  3. 3.
  4. 4.
  5. 5.
    Wi-Fi zones e-Nagar project News. (2014). http://yourstory.com/2014/02/narendra-modi-e-nagar
  6. 6.
    Location Based Technologies Global Market Forecast. (2013). http://marketinfogroup.com/location-based-technologies-market/
  7. 7.
    Kalnis, P., Ghinita, G., Mouratidis, K., & Papadias, D. (2007). Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12), 1719–1733.CrossRefGoogle Scholar
  8. 8.
    Hofmann-Wellenhof, B., Lichtenegger, H., & Wasle, E. (2007). GNSS global navigation satellite systems: GPS, GLONASS, Galileo, and more. London: Springer.Google Scholar
  9. 9.
    Foxs News: Man Accused of Stalking Ex-Girlfriend With GPS. (2004). http://www.foxnews.com/story/0,2933,131487,00.htmlGoogle Scholar
  10. 10.
    Cop stalked ex-wife before killing her, GPS data show (2015). http://www.usatoday.com/story/news/nation/2015/07/29/cop-stalked-ex-wife/30826881/
  11. 11.
    Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., & Tang, J.-M. (2002). Framework for security and privacy in automotive telematics. In Proceedings of the 2nd international workshop on mobile commerce, pp. 25–32. ACM.Google Scholar
  12. 12.
    Beresford, A. R., & Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive Computing, 1, 46–55.CrossRefGoogle Scholar
  13. 13.
    Damania, F. (2001). The internet: Equalizer of freedom of speech-A discussion on freedom of speech on the internet in the United States and India. Indiana International and Comparative Law Review, 12, 243.Google Scholar
  14. 14.
    Tsai, J. Y., Kelley, P. G., Cranor, L. F., & Sadeh, N. (2010). Location-sharing technologies: Privacy risks and controls. ISJLP, 6, 119.Google Scholar
  15. 15.
    Bettini, C., Wang, X. S., Jajodia, S. (2005). Protecting privacy against location-based personal identification. In Secure data management, pp. 185-199. Berlin, Heidelberg: Springer.Google Scholar
  16. 16.
    Freni, D., Ruiz Vicente, C., Mascetti, S., Bettini, C., & Jensen, C. S. (2010). Preserving location and absence privacy in geo-social networks. In Proceedings of the 19th ACM international conference on information and knowledge management, pp. 309–318. ACM.Google Scholar
  17. 17.
    Krumm, J. (2009). A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6), 391–399.CrossRefGoogle Scholar
  18. 18.
    Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Privacy Enhancing Technologies (pp. 393–412). Berlin, Heidelberg: Springer.Google Scholar
  19. 19.
    Snekkenes, E. (2001). Concepts for personal location privacy policies. In Proceedings of the 3rd ACM conference on electronic commerce, pp. 48–57. ACM.Google Scholar
  20. 20.
    Chow, C.-Y., Mokbel, M. F., & Liu, X. (2006). A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, pp. 171–178. ACM.Google Scholar
  21. 21.
    Grlach, A., Heinemann, A., & Terpstra, W. W. (2005). Survey on location privacy in pervasive computing. In Privacy, security and trust within the context of pervasive computing (pp. 23–34). US: Springer.Google Scholar
  22. 22.
    Bettini, C., Mascetti, S., Wang, X. S., Freni, D., & Jajodia, S. (2009). Anonymity and historical-anonymity in location-based services. In Privacy in location-based applications (pp. 1–30). Berlin, Heidelberg: Springer.Google Scholar
  23. 23.
    Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). MOBIHIDE: A mobilea peer-to-peer system for anonymous location-based queries. In Advances in spatial and temporal databases (pp. 221–238). Berlin, Heidelberg: Springer.Google Scholar
  24. 24.
    Mokbel, M. F., Chow, C.-Y., & Aref, W. G.(2006). The new Casper: Query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pp. 763–774. VLDB Endowment.Google Scholar
  25. 25.
    Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacygrid. In Proceedings of the 17th international conference on world wide web, pp. 237–246. ACM.Google Scholar
  26. 26.
    Gedik, B., & Liu, L. (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 7(1), 1–18.CrossRefGoogle Scholar
  27. 27.
    Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pp. 31–42. ACM.Google Scholar
  28. 28.
    Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE.Google Scholar
  29. 29.
    Zhangwei, H., & Mingjun, X. (2010). A distributed spatial cloaking protocol for location privacy. In Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 second international conference on, vol. 2, pp. 468–471. IEEE.Google Scholar
  30. 30.
    Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). PRIVE: Anonymous location-based queries in distributed mobile systems. In Proceedings of the 16th international conference on world wide web, pp. 371–380. ACM.Google Scholar
  31. 31.
    Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.MathSciNetCrossRefMATHGoogle Scholar
  32. 32.
    Samarati, P. (2001). Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), 1010–1027.CrossRefGoogle Scholar
  33. 33.
    Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.MathSciNetCrossRefMATHGoogle Scholar
  34. 34.
    Pfitzmann, A., & Khntopp, M. (2001). Anonymity, unobservability, and pseudonymitya proposal for terminology. In Designing privacy enhancing technologies, pp. 1–9. Berlin, Heidelberg: Springer.Google Scholar
  35. 35.
    Gruteser, M., & Hoh, B. (2005). On the anonymity of periodic location samples. In Security in pervasive computing (pp. 179–192). Berlin, Heidelberg: Springer.Google Scholar
  36. 36.
    Zhang, W., Cui, X., Li, D., Yuan, D., & Wang, M. (2010). The location privacy protection research in location-based service. In Geoinformatics, 2010 18th international conference on, pp. 1–4. IEEE.Google Scholar
  37. 37.
    Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In Distributed computing systems, 2005. ICDCS 2005. Proceedings. 25th IEEE international conference on, pp. 620–629. IEEE.Google Scholar
  38. 38.
    Meyerowitz, J., & Choudhury, R. R. (2009). Hiding stars with fireworks: location privacy through camouflage. In Proceedings of the 15th annual international conference on mobile computing and networking, pp. 345–356. ACM.Google Scholar
  39. 39.
    Dewri, R., & Thurimella, R. (2014). Exploiting service similarity for privacy in location-based search queries. IEEE Transactions on Parallel and Distributed Systems, 25(2), 374–383.CrossRefGoogle Scholar
  40. 40.
    Xiao, C., Chen, Z., Wang, X., Zhao, J., & Chen, C. (2014). DeCache: A decentralized two-level cache for mobile location privacy protection. In Ubiquitous and Future Networks (ICUFN), 2014 sixth international conference on, pp. 81–86. IEEE.Google Scholar
  41. 41.
    Beresford, A. R., & Stajano, F. (2004). Mix zones: User privacy in location-aware services. p. 127.Google Scholar
  42. 42.
    Freudiger, J., Raya, M., Flegyhzi, M., & Papadimitratos, P. (2007). Mix-zones for location privacy in vehicular networks.Google Scholar
  43. 43.
    Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., & Fang, Y. (2012). Traffic-aware multiple mix zone placement for protecting location privacy. In INFOCOM, 2012 proceedings IEEE, pp. 972–980. IEEE.Google Scholar
  44. 44.
    Kido, H., Yanagisawa, Y., & Satoh, T. (2005). An anonymous communication technique using dummies for location-based services. In Pervasive services, 2005. ICPS’05. Proceedings international conference on, pp. 88–97. IEEE.Google Scholar
  45. 45.
    Yu, Y., Tang, S., & Zimmermann, R. (2013). Edge-based locality sensitive hashing for efficient geo-fencing application. In Proceedings of the 21st ACM SIGSPATIAL international conference on advances in geographic information systems, pp. 576–579. ACM.Google Scholar
  46. 46.
    Hengartner, U., & Steenkiste, P. (2003). Access control to information in pervasive computing environments. In HotOS, pp. 157–162.Google Scholar
  47. 47.
    Hengartner, U., & Steenkiste, P. (2004). Protecting access to people location information. In Security in pervasive computing (pp. 25–38). Berlin, Heidelberg: Springer.Google Scholar
  48. 48.
    Langheinrich, M. (2001). Privacy by designprinciples of privacy-aware ubiquitous systems. In Ubicomp 2001: Ubiquitous computing (pp. 273–291). Berlin, Heidelberg: Springer.Google Scholar
  49. 49.
    Solanas, A., & Martnez-Ballest, A. (2008). A TTP-free protocol for location privacy in location-based services. Computer Communications, 31(6), 1181–1191.CrossRefGoogle Scholar
  50. 50.
    Domingo-Ferrer, J. (2006). Microaggregation for database and location privacy. In Next generation information technologies and systems (pp. 106–116). Berlin, Heidelberg: Springer.Google Scholar
  51. 51.
    Ardagna, C., Cremonini, M., De Capitani di Vimercati, S., & Samarati, P. (2011). An obfuscation-based approach for protecting location privacy. IEEE Transactions on Dependable and Secure Computing, 8(1), 13–27.CrossRefGoogle Scholar
  52. 52.
    Xu, J., Tang, X., Haibo, H., & Jing, D. (2010). Privacy-conscious location-based queries in mobile environments. IEEE Transactions on Parallel and Distributed Systems, 21(3), 313–326.CrossRefGoogle Scholar
  53. 53.
    Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L. (2008). Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on management of data, pp. 121–132. ACM.Google Scholar
  54. 54.
    Khoshgozaran, A., & Shahabi, C. (2009). Private information retrieval techniques for enabling location privacy in location-based services. In Privacy in location-based applications (pp. 59–83). Berlin, Heidelberg: Springer.Google Scholar
  55. 55.
    Miura, K., & Sato, F. (2013). Evaluation of a hybrid method of user location anonymization. In Broadband and wireless computing, communication and applications (BWCCA), 2013 eighth international conference on, pp. 191–198. IEEE.Google Scholar
  56. 56.
    Bayardo, R. J., & Agrawal, R. (2005). Data privacy through optimal k-anonymization. In Proceedings of the 2005 IEEE ICDE 21st international conference on data engineering, pp. 217–228. IEEE.Google Scholar
  57. 57.
    LeFevre, K., DeWitt, D. J., & Ramakrishnan, R. (2006). Mondrian multidimensional k-anonymity. In Data engineering, 2006. ICDE’06. Proceedings of the 22nd international conference on, pp. 25–25. IEEE.Google Scholar
  58. 58.
    LeFevre, K., DeWitt, D. J., & Ramakrishnan, R. (2005). Incognito: Efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on management of data, pp. 49–60. ACM.Google Scholar
  59. 59.
    Okamoto, T., & Uchiyama, S. (1998). A new public-key cryptosystem as secure as factoring. In International conference on the theory and applications of cryptographic techniques, pp. 308–318. Berlin: Springer.Google Scholar
  60. 60.
    Rothblum, R. (2011). Homomorphic encryption: From private-key to public-key. In Theory of cryptography conference, pp. 219–234. Berlin: Springer.Google Scholar
  61. 61.
    Solanas, A., & Martnez-Balleste, A. (2008). A TTP-free protocol for location privacy in location-based services. Computer Communications, 31(6), 1181–1191.CrossRefGoogle Scholar
  62. 62.
    Puttaswamy, K. P. N., Wang, S., Steinbauer, T., Agrawal, D., El Abbadi, A., Kruegel, C., et al. (2014). Preserving location privacy in geosocial applications. IEEE Transactions on Mobile Computing, 13(1), 159–173.CrossRefGoogle Scholar
  63. 63.
    Andrs, M. E., Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2013). Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on computer and communications security, pp. 901–914. ACM.Google Scholar
  64. 64.

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Computer Engineering DepartmentNational Institute of TechnologySuratIndia

Personalised recommendations