Advertisement

GeoInformatica

, Volume 15, Issue 2, pp 351–380 | Cite as

Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments

  • Chi-Yin Chow
  • Mohamed F. MokbelEmail author
  • Xuan Liu
Article

Abstract

This paper tackles a privacy breach in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. For example, a user who wants to issue a query asking about her nearest gas station has to report her exact location to an LBS provider. However, many recent research efforts have indicated that revealing private location information to potentially untrusted LBS providers may lead to major privacy breaches. To preserve user location privacy, spatial cloaking is the most commonly used privacy-enhancing technique in LBS. The basic idea of the spatial cloaking technique is to blur a user’s exact location into a cloaked area that satisfies the user specified privacy requirements. Unfortunately, existing spatial cloaking algorithms designed for LBS rely on fixed communication infrastructure, e.g., base stations, and centralized/distributed servers. Thus, these algorithms cannot be applied to a mobile peer-to-peer (P2P) environment where mobile users can only communicate with other peers through P2P multi-hop routing without any support of fixed communication infrastructure or servers. In this paper, we propose a spatial cloaking algorithm for mobile P2P environments. As mobile P2P environments have many unique limitations, e.g., user mobility, limited transmission range, multi-hop communication, scarce communication resources, and network partitions, we propose three key features to enhance our algorithm: (1) An information sharing scheme enables mobile users to share their gathered peer location information to reduce communication overhead; (2) A historical location scheme allows mobile users to utilize stale peer location information to overcome the network partition problem; and (3) A cloaked area adjustment scheme guarantees that our spatial cloaking algorithm is free from a “center-of-cloaked-area” privacy attack. Experimental results show that our P2P spatial cloaking algorithm is scalable while guaranteeing the user’s location privacy protection.

Keywords

Spatial cloaking Location anonymization Location-based services Mobile peer-to-peer computing 

References

  1. 1.
    Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the international world wide web conference. WWWGoogle Scholar
  2. 2.
    Chow CY, Leong HV, Chan ATS (2007) Grococa: group-based peer-to-peer cooperative caching in mobile environment. IEEE J Sel Areas Commun: Special Issue on Peer-to-Peer Communications and Applications, J-SAC 25(1):179–191Google Scholar
  3. 3.
    Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of the international symposium on advances in spatial and temporal databases. SSTDGoogle Scholar
  4. 4.
    Chow CY, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems. GISGoogle Scholar
  5. 5.
    Chow CY, Mokbel MF, Nap J, Nath S (2009) Evaluation of range nearest-neighbor queries with quality guarantee. In: Proceedings of the international symposium on advances in spatial and temporal databases. SSTDGoogle Scholar
  6. 6.
    Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proceedings of the international conference on pervasive computing. PerComGoogle Scholar
  7. 7.
    Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput, TMC 7(1):1–18CrossRefGoogle Scholar
  8. 8.
    Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM international conference on management of data. SIGMODGoogle Scholar
  9. 9.
    Ghinita G, Kalnis P, Skiadopoulos S (2007) PrivÉ: anonymous location-based queries in distributed mobile systems. In: Proceedings of the international world wide web conference. WWWGoogle Scholar
  10. 10.
    Ghinita1 G, Kalnis P, Skiadopoulos S (2007) Mobihide: A mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of the international symposium on advances in spatial and temporal databases. SSTDGoogle Scholar
  11. 11.
    Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the international conference on mobile systems, applications, and services. MobiSysGoogle Scholar
  12. 12.
    Gruteser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-aware location sensor networks. In: Proceedings of the workshop on hot topics in operating systems. HotOSGoogle Scholar
  13. 13.
    Hashem T, Kulik L (2007) Safeguarding location privacy in wireless ad-hoc networks. In: Proceedings of the international conference on ubiquitous computing. UBICOMPGoogle Scholar
  14. 14.
    Hu H, Lee DL (2006) Range nearest-neighbor query. IEEE Trans Knowl Data Eng, TKDE 18(1):78–91CrossRefGoogle Scholar
  15. 15.
    Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng, TKDE 19(12):1719–1733CrossRefGoogle Scholar
  16. 16.
    Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the international symposium on advances in spatial and temporal databases. SSTDGoogle Scholar
  17. 17.
    Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of IEEE international conference on pervasive services. ICPS, pp 88–97Google Scholar
  18. 18.
    Ku WS, Zimmermann R, Wang H (2008) Location-based spatial query processing with data sharing in wireless broadcast environments. IEEE Trans Mob Comput, TMC 7(6):778–791CrossRefGoogle Scholar
  19. 19.
    Mokbel MF, Chow CY, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the international conference on very large data bases. VLDBGoogle Scholar
  20. 20.
    Pfitzmann A, Kohntopp M (2000) Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Proceedings of the workshop on design issues in anonymity and unobservability. pp. 1–9Google Scholar
  21. 21.
    Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557–570CrossRefGoogle Scholar
  22. 22.
    Wu W, Tan KL (2006) Global cache management in nonuniform mobile broadcast. In: Proceedings of the international conference on mobile data management. MDMGoogle Scholar
  23. 23.
    Xu T, Cai Y (2007) Location anonymity in continuous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems. GISGoogle Scholar
  24. 24.
    Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of the international conference of the computer and communications societies. INFOCOMGoogle Scholar
  25. 25.
    Yiu ML, Ghinita G, Jensen CS, Kalnis P (2009) Outsourcing search services on private spatial data. In: Proceedings of the international conference on data engineering. ICDEGoogle Scholar
  26. 26.
    Yiu ML, Jensen C, Huang X, Lu H (2008) Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of the international conference on data engineering. ICDEGoogle Scholar
  27. 27.
    Zhang C, Huang Y (2009) Cloaking locations for anonymous location based services: a hybrid approach. GeoInformatica 13(2):159–182CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of Minnesota - Twin CitiesMinneapolisUSA
  2. 2.IBM Thomas J. Watson Research CenterHawthorneUSA

Personalised recommendations