Advertisement

Wireless Personal Communications

, Volume 101, Issue 2, pp 943–961 | Cite as

A novel attributes anonymity scheme in continuous query

  • Lei Zhang
  • Jing Li
  • Songtao Yang
  • Bin Wang
  • Xingchao Bian
Article
  • 35 Downloads

Abstract

In location-based service (LBS), the un-trusted LBS server can preserve lots of information about the user. Then the information can be used as background knowledge and initiated the inference attack to get user’s privacy. Among the background knowledge, the profile attribute of users is the especial one. The attribute can be used to correlate the real location in uncertain location set in both of the snapshot and continuous query, and then the location privacy of users will be revealed. In most of the existing scheme, the author usually assumes a trusted third party (TTP) to achieve the profile anonymity. However, as the TTP disposes all anonymous procedure for each user, it will become the center of attacks and the bottleneck of the query service. Furthermore, the TTP may be curious about user’s privacy just because of the commercial consideration. In order to deal with the inference attack and remedy the drawback of TTP scheme, we propose a similar attributes anonymous scheme which based on the CP-ABE, and with the help of center server and collaborative users, our scheme can resist the inference attack as well as the privacy detection of any entity in the service of query. At last, security analysis and experimental results further verify the effectiveness of our scheme in privacy protection as well as efficiency of the algorithm execution.

Keywords

Location-based service Privacy Inference attack Attribute anonymity 

Notes

Acknowledgements

This work was supported by Natural Science Foundation of Heilongjiang Province of China No. F2015022, University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province (Project Number: UNPYSCT-2017149, UNPYSCT-2017175).

References

  1. 1.
    Peng, T., Liu, Q., & Wang, G. J. (2017). Enhanced location privacy preserving scheme in location-based services. IEEE Systems Journal, 11(1), 219–230.CrossRefGoogle Scholar
  2. 2.
    Sun, Y. M., Chen, M., Hu, L., Qian, Y. F., & Hassan, M. M. (2017). ASA: Against statistical attacks for privacy-aware users in location based service. Future Generation Computer Systems-the International Journal of Escience, 2017(70), 48–58.CrossRefGoogle Scholar
  3. 3.
    Ryschka, S., Murawski, M., & Bick, M. (2016). Location-based services. Business & Information Systems Engineering, 58(3), 233–237.CrossRefGoogle Scholar
  4. 4.
    Wang, Y., Xia, Y., Hou, J., Gao, S. M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 2015(53), 57–73.Google Scholar
  5. 5.
    Lin, C., Wu, G. W., & Yu, C. W. (2015). Protecting location privacy and query privacy: A combined clustering approach. Concurrency and Computation-Practice & Experience, 27(12), 3021–3043.CrossRefGoogle Scholar
  6. 6.
    Zhou, C. L., Mai, C. G., & Yang, S. T. (2015). Research of LBS privacy preserving based on sensitive location diversity. Journal on Communications, 36, 129–140.Google Scholar
  7. 7.
    Niu, B., Gao, S., Li, F. H., Li, H., & Lu, Z. Q. (2016) Protection of location privacy in continuous LBSs against adversaries with background information. In: 2016 International conference on computing, networking and communications (ICNC), 2016Google Scholar
  8. 8.
    Gao, S., Ma, J. F., Shi, W. S., & Zhan, G. X. (2015). LTPPM: A location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications & Mobile Computing, 15(1), 155–169.CrossRefGoogle Scholar
  9. 9.
    Peng, T., Liu, Q., Meng, D. C., & Wang, G. J. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165–179.CrossRefGoogle Scholar
  10. 10.
    Gruteser, M., & Grunwald, D. (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In Book anonymous usage of location-based services through spatial and temporal cloaking. ACM, pp. 31–42Google Scholar
  11. 11.
    Montazeri, Z., Houmansadr, A., & Pishro-Nik, H. (2017). Achieving perfect location privacy in wireless devices using anonymization. IEEE Transactions on Information Forensics and Security, 12(11), 2683–2698.CrossRefGoogle Scholar
  12. 12.
    Fuyu, L., Hua, K. A., & Ying, C. (2009) Query l-diversity in location-based services. In Book query l-diversity in location-based services, pp. 436–442Google Scholar
  13. 13.
    Ye, A. Y., Li, Y., & Xu, L. (2017). A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 2017(98), 1–10.CrossRefGoogle Scholar
  14. 14.
    Chow, C.-Y., Mokbel, M. F., & Liu, X. (2006). A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of 14th annual ACM international symposium on advances in geographic information systems, Arlington, VirginiaGoogle Scholar
  15. 15.
    Ma, C., Zhang, L., Yang, S., Zheng, X., & Ke, P. (2016). Achieve personalized anonymity through query blocks exchanging. China Communications, 13(11), 106–118.CrossRefGoogle Scholar
  16. 16.
    Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7(2), 126–139.CrossRefGoogle Scholar
  17. 17.
    Palanisamy, B., Liu, L., Lee, K., Meng, S., Tang, Y., & Zhou, Y. (2014). Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distributed and Parallel Databases, 32(1), 91–118.CrossRefGoogle Scholar
  18. 18.
    Ni, W., Gu, M., & Chen, X. (2016). Location privacy-preserving k nearest neighbor query under user’s preference. Knowledge-Based Systems, 2016(103), 19–27.CrossRefGoogle Scholar
  19. 19.
    Zeberga, K., Jin, R., Cho, H. J., & Chung, T. S. (2017). A safe-region approach to a moving k-RNN Queries in a directed road network. Journal of Circuits Systems and Computers, 26(5), 1750071.CrossRefGoogle Scholar
  20. 20.
    Lei, Z., Chunguang, M., Songtao, Y., & Xiaodong, Z. (2016). Location privacy protection model and algorithm based on profiles generalization. Systems engineering and electronics, 38(12), 2894–2900.Google Scholar
  21. 21.
    Shokri, R., Theodorakopoulos, G., & Troncoso, C. (2017). Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security, 19(4), 11.Google Scholar
  22. 22.
    Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Policy attribute-based encryption, pp. 321–334Google Scholar
  23. 23.
    Xiao, Z., Xu, J., & Meng, X. (2008) p-Sensitivity: A semantic privacy-protection model for location-based services. In p-Sensitivity: A semantic privacy-protection model for location-based services, pp. 47–54Google Scholar
  24. 24.
    Chow, C. Y., Mokbel, M. F., & Liu, X. A. (2011). Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica, 15(2), 351–380.CrossRefGoogle Scholar
  25. 25.
    Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K.-L. (2008). Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, CanadaGoogle Scholar
  26. 26.
    Kato, R., Iwata, M., Hara, T., Suzuki, A., Xie, X., Arase, Y., & Nishio, S. (2012). A dummy-based anonymization method based on user trajectory with pauses. In A dummy-based anonymization method based on user trajectory with pauses. ACM, pp. 249–258Google Scholar
  27. 27.
    Ghasemzadeh, M., Fung, B. C. M., Chen, R., & Awasthi, A. (2014). Anonymizing trajectory data for passenger flow analysis. Transportation Research Part C-Emerging Technologies, 2014(39), 63–79.CrossRefGoogle Scholar
  28. 28.
    Chunguang, M., Lei, Z., Songtao, Y., & Xiaodong, Z. (2017). Hiding yourself behind collaborative users when using continuous location-based services. Journal of Circuits, Systems and Computers, 26(07), 1750119:1750111–1750119:1750125.Google Scholar
  29. 29.
    Zhang, L., Yang, S., Li, J., & Yu, L. (2018). A particle swarm optimization clustering-based attribute generalization privacy protection scheme. Journal of Circuits, Systems and Computers, 27(11), 1850179-1850171–1850179-1850121.CrossRefGoogle Scholar
  30. 30.
    Lei, Z., Chunguang, M., & Songtao, Y. (2016). Location association similar based anonymus algorithm. China Sciencepaper, 11(2), 197–201.Google Scholar
  31. 31.
    Ma, C. G., Zhou, C. L., Yang, S. T., & Zhao, Y. L. (2015). Location privacy-preserving method in LBS based on Voronoi division. Journal on Communications, 36, 5–16.Google Scholar
  32. 32.
    Rodriguez-Carrion, A., Rebollo-Monedero, D., Forne, J., Campo, C., Garcia-Rubio, C., Parra-Arnau, J., et al. (2015). Entropy-based privacy against profiling of user mobility. Entropy, 17(6), 3913–3946.MathSciNetCrossRefGoogle Scholar
  33. 33.
    Ghaffari, M., Ghadiri, N., Manshaei, M. H., & Lahijani, M. S. (2017). P(4)QS: A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Transactions on Vehicular Technology, 66(10), 9458–9469.CrossRefGoogle Scholar
  34. 34.
    Deng, Z., Wu, X., Wang, L., Chen, X., Ranjan, R., Zomaya, A., et al. (2015). Parallel processing of dynamic continuous queries over streaming data flows. IEEE Transactions on Parallel and Distributed Systems, 26, 834–846.CrossRefGoogle Scholar
  35. 35.
    Lin, W. H., Tan, X. J., Liu, F. J., Yu, Y., & Wang, W. M. (2015). A new directional query method for polygon dataset in spatial database. Earth Science Informatics, 8, 775–786.CrossRefGoogle Scholar
  36. 36.
    Zhang, L., Li, J., Yang, S., et al. (2017). Privacy preserving in cloud environment for obstructed shortest path query. Wireless Personal Communications, 96(2), 2305–2322.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of Information and Electronic TechnologyJiamusi UniversityJiamusiPeople’s Republic of China
  2. 2.College of Information EngineeringSuihua UniversitySuihuaPeople’s Republic of China

Personalised recommendations