Abstract
In location-based service (LBS), the un-trusted LBS server can preserve lots of information about the user. Then the information can be used as background knowledge and initiated the inference attack to get user’s privacy. Among the background knowledge, the profile attribute of users is the especial one. The attribute can be used to correlate the real location in uncertain location set in both of the snapshot and continuous query, and then the location privacy of users will be revealed. In most of the existing scheme, the author usually assumes a trusted third party (TTP) to achieve the profile anonymity. However, as the TTP disposes all anonymous procedure for each user, it will become the center of attacks and the bottleneck of the query service. Furthermore, the TTP may be curious about user’s privacy just because of the commercial consideration. In order to deal with the inference attack and remedy the drawback of TTP scheme, we propose a similar attributes anonymous scheme which based on the CP-ABE, and with the help of center server and collaborative users, our scheme can resist the inference attack as well as the privacy detection of any entity in the service of query. At last, security analysis and experimental results further verify the effectiveness of our scheme in privacy protection as well as efficiency of the algorithm execution.
Similar content being viewed by others
References
Peng, T., Liu, Q., & Wang, G. J. (2017). Enhanced location privacy preserving scheme in location-based services. IEEE Systems Journal, 11(1), 219–230.
Sun, Y. M., Chen, M., Hu, L., Qian, Y. F., & Hassan, M. M. (2017). ASA: Against statistical attacks for privacy-aware users in location based service. Future Generation Computer Systems-the International Journal of Escience, 2017(70), 48–58.
Ryschka, S., Murawski, M., & Bick, M. (2016). Location-based services. Business & Information Systems Engineering, 58(3), 233–237.
Wang, Y., Xia, Y., Hou, J., Gao, S. M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 2015(53), 57–73.
Lin, C., Wu, G. W., & Yu, C. W. (2015). Protecting location privacy and query privacy: A combined clustering approach. Concurrency and Computation-Practice & Experience, 27(12), 3021–3043.
Zhou, C. L., Mai, C. G., & Yang, S. T. (2015). Research of LBS privacy preserving based on sensitive location diversity. Journal on Communications, 36, 129–140.
Niu, B., Gao, S., Li, F. H., Li, H., & Lu, Z. Q. (2016) Protection of location privacy in continuous LBSs against adversaries with background information. In: 2016 International conference on computing, networking and communications (ICNC), 2016
Gao, S., Ma, J. F., Shi, W. S., & Zhan, G. X. (2015). LTPPM: A location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications & Mobile Computing, 15(1), 155–169.
Peng, T., Liu, Q., Meng, D. C., & Wang, G. J. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165–179.
Gruteser, M., & Grunwald, D. (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In Book anonymous usage of location-based services through spatial and temporal cloaking. ACM, pp. 31–42
Montazeri, Z., Houmansadr, A., & Pishro-Nik, H. (2017). Achieving perfect location privacy in wireless devices using anonymization. IEEE Transactions on Information Forensics and Security, 12(11), 2683–2698.
Fuyu, L., Hua, K. A., & Ying, C. (2009) Query l-diversity in location-based services. In Book query l-diversity in location-based services, pp. 436–442
Ye, A. Y., Li, Y., & Xu, L. (2017). A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 2017(98), 1–10.
Chow, C.-Y., Mokbel, M. F., & Liu, X. (2006). A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of 14th annual ACM international symposium on advances in geographic information systems, Arlington, Virginia
Ma, C., Zhang, L., Yang, S., Zheng, X., & Ke, P. (2016). Achieve personalized anonymity through query blocks exchanging. China Communications, 13(11), 106–118.
Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7(2), 126–139.
Palanisamy, B., Liu, L., Lee, K., Meng, S., Tang, Y., & Zhou, Y. (2014). Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distributed and Parallel Databases, 32(1), 91–118.
Ni, W., Gu, M., & Chen, X. (2016). Location privacy-preserving k nearest neighbor query under user’s preference. Knowledge-Based Systems, 2016(103), 19–27.
Zeberga, K., Jin, R., Cho, H. J., & Chung, T. S. (2017). A safe-region approach to a moving k-RNN Queries in a directed road network. Journal of Circuits Systems and Computers, 26(5), 1750071.
Lei, Z., Chunguang, M., Songtao, Y., & Xiaodong, Z. (2016). Location privacy protection model and algorithm based on profiles generalization. Systems engineering and electronics, 38(12), 2894–2900.
Shokri, R., Theodorakopoulos, G., & Troncoso, C. (2017). Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security, 19(4), 11.
Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Policy attribute-based encryption, pp. 321–334
Xiao, Z., Xu, J., & Meng, X. (2008) p-Sensitivity: A semantic privacy-protection model for location-based services. In p-Sensitivity: A semantic privacy-protection model for location-based services, pp. 47–54
Chow, C. Y., Mokbel, M. F., & Liu, X. A. (2011). Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica, 15(2), 351–380.
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K.-L. (2008). Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada
Kato, R., Iwata, M., Hara, T., Suzuki, A., Xie, X., Arase, Y., & Nishio, S. (2012). A dummy-based anonymization method based on user trajectory with pauses. In A dummy-based anonymization method based on user trajectory with pauses. ACM, pp. 249–258
Ghasemzadeh, M., Fung, B. C. M., Chen, R., & Awasthi, A. (2014). Anonymizing trajectory data for passenger flow analysis. Transportation Research Part C-Emerging Technologies, 2014(39), 63–79.
Chunguang, M., Lei, Z., Songtao, Y., & Xiaodong, Z. (2017). Hiding yourself behind collaborative users when using continuous location-based services. Journal of Circuits, Systems and Computers, 26(07), 1750119:1750111–1750119:1750125.
Zhang, L., Yang, S., Li, J., & Yu, L. (2018). A particle swarm optimization clustering-based attribute generalization privacy protection scheme. Journal of Circuits, Systems and Computers, 27(11), 1850179-1850171–1850179-1850121.
Lei, Z., Chunguang, M., & Songtao, Y. (2016). Location association similar based anonymus algorithm. China Sciencepaper, 11(2), 197–201.
Ma, C. G., Zhou, C. L., Yang, S. T., & Zhao, Y. L. (2015). Location privacy-preserving method in LBS based on Voronoi division. Journal on Communications, 36, 5–16.
Rodriguez-Carrion, A., Rebollo-Monedero, D., Forne, J., Campo, C., Garcia-Rubio, C., Parra-Arnau, J., et al. (2015). Entropy-based privacy against profiling of user mobility. Entropy, 17(6), 3913–3946.
Ghaffari, M., Ghadiri, N., Manshaei, M. H., & Lahijani, M. S. (2017). P(4)QS: A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Transactions on Vehicular Technology, 66(10), 9458–9469.
Deng, Z., Wu, X., Wang, L., Chen, X., Ranjan, R., Zomaya, A., et al. (2015). Parallel processing of dynamic continuous queries over streaming data flows. IEEE Transactions on Parallel and Distributed Systems, 26, 834–846.
Lin, W. H., Tan, X. J., Liu, F. J., Yu, Y., & Wang, W. M. (2015). A new directional query method for polygon dataset in spatial database. Earth Science Informatics, 8, 775–786.
Zhang, L., Li, J., Yang, S., et al. (2017). Privacy preserving in cloud environment for obstructed shortest path query. Wireless Personal Communications, 96(2), 2305–2322.
Acknowledgements
This work was supported by Natural Science Foundation of Heilongjiang Province of China No. F2015022, University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province (Project Number: UNPYSCT-2017149, UNPYSCT-2017175).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, L., Li, J., Yang, S. et al. A novel attributes anonymity scheme in continuous query. Wireless Pers Commun 101, 943–961 (2018). https://doi.org/10.1007/s11277-018-5735-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5735-0