Peer-to-Peer Networking and Applications

, Volume 11, Issue 3, pp 473–485 | Cite as

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service

  • Xindi Ma
  • Jianfeng Ma
  • Hui Li
  • Qi Jiang
  • Sheng Gao


With the widespread use of Location-base Services(LBSs), the problem of location privacy has drawn significant attention from the research community. To protect the user’s exact location, a new notion of privacy, named geo-indistinguishability, that adapts differential privacy has been proposed for LBSs, recently. However, the obfuscation mechanism satisfying this privacy notion only works well in the case of snapshot LBS, which would not apply to the case of continuous LBSs due to the quick loss of privacy caused by the correlation between locations in the trace. In this paper, we propose a novel mechanism, namely AGENT, to protect the user’s location privacy in continuous LBSs. In AGENT, a R-tree is introduced to realize the reusable of generated sanitized locations, which achieves the notion of geo-indistinguishability with less consumption of privacy budget. Finally, empirical results over real-world dataset demonstrate that with the same utility, our mechanism consumes less privacy budget to obfuscate the same trace.


Location-based service Privacy preservation Differential privacy Geo-indistinguishability 



This work was supported by the National Natural Science Foundation of China (Grant Nos. U1405255, 61672413, 61672408, 61502368, 61602537, 61602357, 61303221, U1509214), National High Technology Research and Development Program (863 Program) (Grant Nos. 2015AA016007, 2015AA017203), China Postdoctoral Science Foundation Funded Project (Grant No.2016M592762), Shaanxi Science & Technology Coordination & Innovation Project (Grant No.2016TZC-G-6-3), Shaanxi Provincial Natural Science Foundation (Grant Nos. 2015JQ6227, 2016JM6005), China 111 Project (Grant No. B16037), Beijing Municipal Social Science Foundation(Grant No. 16XCC023), Fundamental Research Funds for the Central Universities (Grant Nos. JB150308, JB150309, JB161501, JBG161511).


  1. 1.
    Xiao Y, Xiong L (2015) Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, p 1298–1309Google Scholar
  2. 2.
    Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2 (1):46–55CrossRefGoogle Scholar
  3. 3.
    Dwork C Differential privacy Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, p 1–12, vol 2006Google Scholar
  4. 4.
    Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: Differential privacy for locationbased systems. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p 901–914Google Scholar
  5. 5.
    Ghinita G (2013) Privacy for location-based services. Synthesis Lectures on Information Security Privacy, & Trust 4(1):1–85CrossRefGoogle Scholar
  6. 6.
    Guo M, Jin X, Pissinou N, Zanlongo S, Carbunar B, Iyengar SS (2015) In-network trajectory privacy preservation. ACM Comput Surv 48(2):23CrossRefGoogle Scholar
  7. 7.
    Terrovitis M (2011) Privacy preservation in the dissemination of location data. ACM SIGKDD Explorations Newsletter 13(1):6–18CrossRefGoogle Scholar
  8. 8.
    Gao S, Ma J, Shi W, Zhan G, Sun C (2013) Trpf: A trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887CrossRefGoogle Scholar
  9. 9.
    Niu B, Li Q, Zhu X, Cao G, Li H (2015) Enhancing privacy through caching in location-based services. In: 2015 IEEE Conference on Computer Communications (INFOCOM), p 1017–1025Google Scholar
  10. 10.
    Fawaz K, Feng H, Shin KG (2015) Anatomization and protection of mobile apps’ location privacy threats. In: 24th USENIX Security Symposium, Washington, D.C., USA., p 753–s768Google Scholar
  11. 11.
    Ying B, Makrakis D, Hou Z (2015) Motivation for protecting selfish vehicles’ location privacy in vehicular networks. IEEE Trans Veh Technol 64(12):5631–5641CrossRefGoogle Scholar
  12. 12.
    Rios R, Cuėllar J, Lopez J (2015) Probabilistic receiver-location privacy protection in wireless sensor networks. Inf Sci 321:205–223CrossRefGoogle Scholar
  13. 13.
    Ercument Cicek A, Nergiz ME, Saygin Y (2014) Ensuring location diversity in privacy-preserving spatio-temporal data publishing. The VLDB J 23(4):609–625CrossRefGoogle Scholar
  14. 14.
    Ma T, Zhou J, Tang M, Tian Y, Al-Dhelaan A, Al-Rodhaan M, Lee S (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans 98-D(4):902–910CrossRefGoogle Scholar
  15. 15.
    Gao S, Ma J, Shi W, Zhan G (2015) LTPPM: a location and trajectory privacy protection mechanism in participatory sensing. Wirel Commun Mob Comput 15(1):155–169CrossRefGoogle Scholar
  16. 16.
    Gong X, Chen X, Xing K, Shin D-H, Zhang M, Zhang J (2015) Personalized location privacy in mobile networks: A social group utility approach. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp 1008–1016Google Scholar
  17. 17.
    Qi J, Wei F, Shuai F, Ma J, Li G, Alelaiwi A (2015) Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn 83(4):2085–2101MathSciNetzbMATHGoogle Scholar
  18. 18.
    Qi J, Khan MK, Xiang L, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. The Journal of Supercomputing, p 1–24Google Scholar
  19. 19.
    Qi J, Ma J, Wei F (2016) On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems JournalGoogle Scholar
  20. 20.
    Zhangjie F, Fengxiao H, Xingming S, Vasilakos A, Yang C-N (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Transactions on Services ComputingGoogle Scholar
  21. 21.
    Fu Z, Sun X, Ji S, Xie G (2016) Towards efficient contentaware search over encrypted outsourced data in cloud. In: IEEE Conference on Computer Communications, pp 1–9Google Scholar
  22. 22.
    Zhangjie F, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9): 2546–2559CrossRefGoogle Scholar
  23. 23.
    Zhangjie F, Xinle W, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716CrossRefGoogle Scholar
  24. 24.
    Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRefGoogle Scholar
  25. 25.
    Wang X, Yi M, Chen R (2016) One-round privacy-preserving meeting location determination for smartphone applications. IEEE Trans Inf Forensics Secur 11(8):1712–1721CrossRefGoogle Scholar
  26. 26.
    Bilogrevic I, Jadliwala M, Joneja V, Kalkan K, Hubaux J-P, Aad I (2014) Privacy-preserving optimal meeting location determination on mobile devices. IEEE Trans Inf Forensics Secur 9(7):1141–1156CrossRefGoogle Scholar
  27. 27.
    Puttaswamy KPN, Wang S, Steinbauer T, Agrawal D, Abbadi AE, Kruegel C, Zhao BY (2014) Preserving location privacy in geosocial applications. IEEE Trans Mob Comput 13(1):159–173CrossRefGoogle Scholar
  28. 28.
    Shen Y, Huang L, Li L, Xiaorong L, Wang S, Yang W (2015) Towards preserving worker location privacy in spatial crowdsourcing. In: 2015 IEEE Global Communications Conference, San Diego, CA, USA, p 1–6Google Scholar
  29. 29.
    Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559CrossRefGoogle Scholar
  30. 30.
    Schlegel R, Chow C-Y, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172CrossRefGoogle Scholar
  31. 31.
    Shao J, Lu R, Lin X (2014) Fine: A fine-grained privacypreserving location-based service framework for mobile devices. In: IEEE Conference on Computer Communications, p 244–252Google Scholar
  32. 32.
    To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment 7(10):919–930CrossRefGoogle Scholar
  33. 33.
    Chatzikokolakis K, Palamidessi C, StronatiM(2014) A predictive differentially-private mechanism for mobility traces. International Symposium on Privacy Enhancing Technologies Symposium, pp 21–41Google Scholar
  34. 34.
    Xi H, Cormode G, Machanavajjhala A, Procopiuc CM, Srivastava D (2015) DPT: differentially private trajectory synthesis using hierarchical reference systems. PVLDB 8(11):1154–1165Google Scholar
  35. 35.
    Reed J, Pierce BC (2010) Distance makes the types grow stronger: a calculus for differential privacy. In: ACM Sigplan Notices, volume 45, p 157–168Google Scholar
  36. 36.
    Roth A, Roughgarden T (2010) Interactive privacy via the median mechanism. In: Proceedings of the forty-second ACM symposium on Theory of computing, pp 765–774. ACMGoogle Scholar
  37. 37.
    Zheng Y, Xie X, Geolife W-YM (2010) A collaborative social networking service among user, location and trajectory. IEEE Data Eng Bull 33(2):32–39Google Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  • Xindi Ma
    • 1
    • 2
  • Jianfeng Ma
    • 1
    • 2
  • Hui Li
    • 1
  • Qi Jiang
    • 1
    • 3
  • Sheng Gao
    • 4
  1. 1.School of Cyber EngineeringXidian UniversityXi’anChina
  2. 2.School of Computer Science and TechnologyXidian UniversityXi’anChina
  3. 3.School of Computer & SoftwareNanjing University of Information Science & TechnologyNanjingChina
  4. 4.School of InformationCentral University of Finance and EconomicsBeijingChina

Personalised recommendations