Skip to main content
Log in

A novel attributes anonymity scheme in continuous query

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In location-based service (LBS), the un-trusted LBS server can preserve lots of information about the user. Then the information can be used as background knowledge and initiated the inference attack to get user’s privacy. Among the background knowledge, the profile attribute of users is the especial one. The attribute can be used to correlate the real location in uncertain location set in both of the snapshot and continuous query, and then the location privacy of users will be revealed. In most of the existing scheme, the author usually assumes a trusted third party (TTP) to achieve the profile anonymity. However, as the TTP disposes all anonymous procedure for each user, it will become the center of attacks and the bottleneck of the query service. Furthermore, the TTP may be curious about user’s privacy just because of the commercial consideration. In order to deal with the inference attack and remedy the drawback of TTP scheme, we propose a similar attributes anonymous scheme which based on the CP-ABE, and with the help of center server and collaborative users, our scheme can resist the inference attack as well as the privacy detection of any entity in the service of query. At last, security analysis and experimental results further verify the effectiveness of our scheme in privacy protection as well as efficiency of the algorithm execution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Peng, T., Liu, Q., & Wang, G. J. (2017). Enhanced location privacy preserving scheme in location-based services. IEEE Systems Journal, 11(1), 219–230.

    Article  Google Scholar 

  2. Sun, Y. M., Chen, M., Hu, L., Qian, Y. F., & Hassan, M. M. (2017). ASA: Against statistical attacks for privacy-aware users in location based service. Future Generation Computer Systems-the International Journal of Escience, 2017(70), 48–58.

    Article  Google Scholar 

  3. Ryschka, S., Murawski, M., & Bick, M. (2016). Location-based services. Business & Information Systems Engineering, 58(3), 233–237.

    Article  Google Scholar 

  4. Wang, Y., Xia, Y., Hou, J., Gao, S. M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 2015(53), 57–73.

    Google Scholar 

  5. Lin, C., Wu, G. W., & Yu, C. W. (2015). Protecting location privacy and query privacy: A combined clustering approach. Concurrency and Computation-Practice & Experience, 27(12), 3021–3043.

    Article  Google Scholar 

  6. Zhou, C. L., Mai, C. G., & Yang, S. T. (2015). Research of LBS privacy preserving based on sensitive location diversity. Journal on Communications, 36, 129–140.

    Google Scholar 

  7. Niu, B., Gao, S., Li, F. H., Li, H., & Lu, Z. Q. (2016) Protection of location privacy in continuous LBSs against adversaries with background information. In: 2016 International conference on computing, networking and communications (ICNC), 2016

  8. Gao, S., Ma, J. F., Shi, W. S., & Zhan, G. X. (2015). LTPPM: A location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications & Mobile Computing, 15(1), 155–169.

    Article  Google Scholar 

  9. Peng, T., Liu, Q., Meng, D. C., & Wang, G. J. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165–179.

    Article  Google Scholar 

  10. Gruteser, M., & Grunwald, D. (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In Book anonymous usage of location-based services through spatial and temporal cloaking. ACM, pp. 31–42

  11. Montazeri, Z., Houmansadr, A., & Pishro-Nik, H. (2017). Achieving perfect location privacy in wireless devices using anonymization. IEEE Transactions on Information Forensics and Security, 12(11), 2683–2698.

    Article  Google Scholar 

  12. Fuyu, L., Hua, K. A., & Ying, C. (2009) Query l-diversity in location-based services. In Book query l-diversity in location-based services, pp. 436–442

  13. Ye, A. Y., Li, Y., & Xu, L. (2017). A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 2017(98), 1–10.

    Article  Google Scholar 

  14. Chow, C.-Y., Mokbel, M. F., & Liu, X. (2006). A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of 14th annual ACM international symposium on advances in geographic information systems, Arlington, Virginia

  15. Ma, C., Zhang, L., Yang, S., Zheng, X., & Ke, P. (2016). Achieve personalized anonymity through query blocks exchanging. China Communications, 13(11), 106–118.

    Article  Google Scholar 

  16. Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7(2), 126–139.

    Article  Google Scholar 

  17. Palanisamy, B., Liu, L., Lee, K., Meng, S., Tang, Y., & Zhou, Y. (2014). Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distributed and Parallel Databases, 32(1), 91–118.

    Article  Google Scholar 

  18. Ni, W., Gu, M., & Chen, X. (2016). Location privacy-preserving k nearest neighbor query under user’s preference. Knowledge-Based Systems, 2016(103), 19–27.

    Article  Google Scholar 

  19. Zeberga, K., Jin, R., Cho, H. J., & Chung, T. S. (2017). A safe-region approach to a moving k-RNN Queries in a directed road network. Journal of Circuits Systems and Computers, 26(5), 1750071.

    Article  Google Scholar 

  20. Lei, Z., Chunguang, M., Songtao, Y., & Xiaodong, Z. (2016). Location privacy protection model and algorithm based on profiles generalization. Systems engineering and electronics, 38(12), 2894–2900.

    Google Scholar 

  21. Shokri, R., Theodorakopoulos, G., & Troncoso, C. (2017). Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security, 19(4), 11.

    Google Scholar 

  22. Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Policy attribute-based encryption, pp. 321–334

  23. Xiao, Z., Xu, J., & Meng, X. (2008) p-Sensitivity: A semantic privacy-protection model for location-based services. In p-Sensitivity: A semantic privacy-protection model for location-based services, pp. 47–54

  24. Chow, C. Y., Mokbel, M. F., & Liu, X. A. (2011). Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica, 15(2), 351–380.

    Article  Google Scholar 

  25. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K.-L. (2008). Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada

  26. Kato, R., Iwata, M., Hara, T., Suzuki, A., Xie, X., Arase, Y., & Nishio, S. (2012). A dummy-based anonymization method based on user trajectory with pauses. In A dummy-based anonymization method based on user trajectory with pauses. ACM, pp. 249–258

  27. Ghasemzadeh, M., Fung, B. C. M., Chen, R., & Awasthi, A. (2014). Anonymizing trajectory data for passenger flow analysis. Transportation Research Part C-Emerging Technologies, 2014(39), 63–79.

    Article  Google Scholar 

  28. Chunguang, M., Lei, Z., Songtao, Y., & Xiaodong, Z. (2017). Hiding yourself behind collaborative users when using continuous location-based services. Journal of Circuits, Systems and Computers, 26(07), 1750119:1750111–1750119:1750125.

    Google Scholar 

  29. Zhang, L., Yang, S., Li, J., & Yu, L. (2018). A particle swarm optimization clustering-based attribute generalization privacy protection scheme. Journal of Circuits, Systems and Computers, 27(11), 1850179-1850171–1850179-1850121.

    Article  Google Scholar 

  30. Lei, Z., Chunguang, M., & Songtao, Y. (2016). Location association similar based anonymus algorithm. China Sciencepaper, 11(2), 197–201.

    Google Scholar 

  31. Ma, C. G., Zhou, C. L., Yang, S. T., & Zhao, Y. L. (2015). Location privacy-preserving method in LBS based on Voronoi division. Journal on Communications, 36, 5–16.

    Google Scholar 

  32. Rodriguez-Carrion, A., Rebollo-Monedero, D., Forne, J., Campo, C., Garcia-Rubio, C., Parra-Arnau, J., et al. (2015). Entropy-based privacy against profiling of user mobility. Entropy, 17(6), 3913–3946.

    Article  MathSciNet  Google Scholar 

  33. Ghaffari, M., Ghadiri, N., Manshaei, M. H., & Lahijani, M. S. (2017). P(4)QS: A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Transactions on Vehicular Technology, 66(10), 9458–9469.

    Article  Google Scholar 

  34. Deng, Z., Wu, X., Wang, L., Chen, X., Ranjan, R., Zomaya, A., et al. (2015). Parallel processing of dynamic continuous queries over streaming data flows. IEEE Transactions on Parallel and Distributed Systems, 26, 834–846.

    Article  Google Scholar 

  35. Lin, W. H., Tan, X. J., Liu, F. J., Yu, Y., & Wang, W. M. (2015). A new directional query method for polygon dataset in spatial database. Earth Science Informatics, 8, 775–786.

    Article  Google Scholar 

  36. Zhang, L., Li, J., Yang, S., et al. (2017). Privacy preserving in cloud environment for obstructed shortest path query. Wireless Personal Communications, 96(2), 2305–2322.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Natural Science Foundation of Heilongjiang Province of China No. F2015022, University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province (Project Number: UNPYSCT-2017149, UNPYSCT-2017175).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jing Li, Songtao Yang or Bin Wang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, L., Li, J., Yang, S. et al. A novel attributes anonymity scheme in continuous query. Wireless Pers Commun 101, 943–961 (2018). https://doi.org/10.1007/s11277-018-5735-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5735-0

Keywords

Navigation