Skip to main content
Log in

Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments

  • Published:
GeoInformatica Aims and scope Submit manuscript

Abstract

This paper tackles a privacy breach in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. For example, a user who wants to issue a query asking about her nearest gas station has to report her exact location to an LBS provider. However, many recent research efforts have indicated that revealing private location information to potentially untrusted LBS providers may lead to major privacy breaches. To preserve user location privacy, spatial cloaking is the most commonly used privacy-enhancing technique in LBS. The basic idea of the spatial cloaking technique is to blur a user’s exact location into a cloaked area that satisfies the user specified privacy requirements. Unfortunately, existing spatial cloaking algorithms designed for LBS rely on fixed communication infrastructure, e.g., base stations, and centralized/distributed servers. Thus, these algorithms cannot be applied to a mobile peer-to-peer (P2P) environment where mobile users can only communicate with other peers through P2P multi-hop routing without any support of fixed communication infrastructure or servers. In this paper, we propose a spatial cloaking algorithm for mobile P2P environments. As mobile P2P environments have many unique limitations, e.g., user mobility, limited transmission range, multi-hop communication, scarce communication resources, and network partitions, we propose three key features to enhance our algorithm: (1) An information sharing scheme enables mobile users to share their gathered peer location information to reduce communication overhead; (2) A historical location scheme allows mobile users to utilize stale peer location information to overcome the network partition problem; and (3) A cloaked area adjustment scheme guarantees that our spatial cloaking algorithm is free from a “center-of-cloaked-area” privacy attack. Experimental results show that our P2P spatial cloaking algorithm is scalable while guaranteeing the user’s location privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. In a partitioned network, mobile users are partitioned into disjoint networks, in which a mobile user is only able to communicate with other peers residing in her network partition.

References

  1. Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the international world wide web conference. WWW

  2. Chow CY, Leong HV, Chan ATS (2007) Grococa: group-based peer-to-peer cooperative caching in mobile environment. IEEE J Sel Areas Commun: Special Issue on Peer-to-Peer Communications and Applications, J-SAC 25(1):179–191

    Google Scholar 

  3. Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of the international symposium on advances in spatial and temporal databases. SSTD

  4. Chow CY, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems. GIS

  5. Chow CY, Mokbel MF, Nap J, Nath S (2009) Evaluation of range nearest-neighbor queries with quality guarantee. In: Proceedings of the international symposium on advances in spatial and temporal databases. SSTD

  6. Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proceedings of the international conference on pervasive computing. PerCom

  7. Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput, TMC 7(1):1–18

    Article  Google Scholar 

  8. Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM international conference on management of data. SIGMOD

  9. Ghinita G, Kalnis P, Skiadopoulos S (2007) PrivÉ: anonymous location-based queries in distributed mobile systems. In: Proceedings of the international world wide web conference. WWW

  10. Ghinita1 G, Kalnis P, Skiadopoulos S (2007) Mobihide: A mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of the international symposium on advances in spatial and temporal databases. SSTD

  11. Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the international conference on mobile systems, applications, and services. MobiSys

  12. Gruteser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-aware location sensor networks. In: Proceedings of the workshop on hot topics in operating systems. HotOS

  13. Hashem T, Kulik L (2007) Safeguarding location privacy in wireless ad-hoc networks. In: Proceedings of the international conference on ubiquitous computing. UBICOMP

  14. Hu H, Lee DL (2006) Range nearest-neighbor query. IEEE Trans Knowl Data Eng, TKDE 18(1):78–91

    Article  Google Scholar 

  15. Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng, TKDE 19(12):1719–1733

    Article  Google Scholar 

  16. Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the international symposium on advances in spatial and temporal databases. SSTD

  17. Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of IEEE international conference on pervasive services. ICPS, pp 88–97

  18. Ku WS, Zimmermann R, Wang H (2008) Location-based spatial query processing with data sharing in wireless broadcast environments. IEEE Trans Mob Comput, TMC 7(6):778–791

    Article  Google Scholar 

  19. Mokbel MF, Chow CY, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the international conference on very large data bases. VLDB

  20. Pfitzmann A, Kohntopp M (2000) Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Proceedings of the workshop on design issues in anonymity and unobservability. pp. 1–9

  21. Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557–570

    Article  Google Scholar 

  22. Wu W, Tan KL (2006) Global cache management in nonuniform mobile broadcast. In: Proceedings of the international conference on mobile data management. MDM

  23. Xu T, Cai Y (2007) Location anonymity in continuous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems. GIS

  24. Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of the international conference of the computer and communications societies. INFOCOM

  25. Yiu ML, Ghinita G, Jensen CS, Kalnis P (2009) Outsourcing search services on private spatial data. In: Proceedings of the international conference on data engineering. ICDE

  26. Yiu ML, Jensen C, Huang X, Lu H (2008) Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of the international conference on data engineering. ICDE

  27. Zhang C, Huang Y (2009) Cloaking locations for anonymous location based services: a hybrid approach. GeoInformatica 13(2):159–182

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed F. Mokbel.

Additional information

This work is supported in part by the National Science Foundation under Grant Numbers IIS-0811998, IIS-0811935, and CNS-0708604, and by Microsoft Research Gift.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chow, CY., Mokbel, M.F. & Liu, X. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 15, 351–380 (2011). https://doi.org/10.1007/s10707-009-0099-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10707-009-0099-y

Keywords

Navigation