Advertisement

VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services

  • Ruchika GuptaEmail author
  • Udai Pratap Rao
Article
  • 32 Downloads

Abstract

Portable devices today are striding computation potential and memory at par and sometimes even significantly higher than those found in desktop machines. Today’s lifestyle is more mobile than earlier, offices are open cafe houses and people prefer to work from plug and play office spaces. With the exponential growth of mobile technology and its users, a more astute system is in place called ‘location based services’ (LBSs). Since client uses these services out of their dynamic or static working behavior and is required to submit the real location (with query) to get the absolute benefits, it is crucial to layout the systems and frameworks which can protect users from the security and privacy threats by keeping the location information private. Existing defense mechanisms based on trusted third party possesses the significant vulnerability to vicinity identification, which in turn end up identifying the real world identity of the query issuer. In this paper, we present a scheme to preserve location privacy, called VIC-PRO, that fortifies the location privacy of the client alongside vicinity protection using geometrical transformations. We experimentally compare the scheme with other existing mechanisms to demonstrate that VIC-PRO is more efficient, safe against vicinity identification attack, and guarantees better user privacy in an LBS setup.

Keywords

Location based services \({\mathcal {K}}\) anonymity Mobility Location privacy Geometric transformation Vicinity protection 

Notes

References

  1. 1.
    Hofmann-Wellenhof, B., Lichtenegger, H., & Wasle, E. (2007). GNSS global navigation satellite systems: GPS, GLONASS, Galileo, and more. Berlin: Springer.Google Scholar
  2. 2.
    Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Samarati, P. (2001). Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), 1010–1027.CrossRefGoogle Scholar
  4. 4.
    Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Gupta, R. (2017). An exploration to location based service and its privacy preserving techniques: A survey. Wireles Personal Communications, 96(04), 1973–2007.CrossRefGoogle Scholar
  6. 6.
    Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on mobile systems, applications and services (pp. 31–42). ACM.Google Scholar
  7. 7.
    Mokbel, M. F., Chow, C.-Y., & Aref W. G. (2006). The new Casper: Query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on very large data bases (pp. 763–774). VLDB Endowment.Google Scholar
  8. 8.
    Mokbel, M. F. (2007). Privacy in location-based services: State-of-the-art and research directions. In International conference on mobile data management, 2007 (pp. 228–228). IEEE.Google Scholar
  9. 9.
    Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). MOBIHIDE: A mobilea peer-to-peer system for anonymous location-based queries. In Advances in spatial and temporal databases (pp. 221–238). Berlin: Springer.Google Scholar
  10. 10.
    Kalnis, P., Ghinita, G., Mouratidis, K., & Papadias, D. (2007). Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12), 1719–1733.CrossRefGoogle Scholar
  11. 11.
    Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacygrid. In Proceedings of the 17th international conference on World Wide Web (pp. 237–246). ACM.Google Scholar
  12. 12.
    Gedik, B., & Liu, L. (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 7(1), 1–18.CrossRefGoogle Scholar
  13. 13.
    Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. In The 27th Conference on Computer Communications. INFOCOM 2008. IEEE.Google Scholar
  14. 14.
    Bettini, C., Mascetti, S., Wang, X. S., Freni, D., & Jajodia, S. (2009). Anonymity and historical-anonymity in location-based services. In Privacy in location-based applications (pp. 1–30). Berlin: Springer.Google Scholar
  15. 15.
    Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In Proceedings of the 25th IEEE international conference on distributed computing systems, 2005. ICDCS 2005 (pp. 620–629). IEEE.Google Scholar
  16. 16.
    Meyerowitz, J., & Choudhury, R. R. (2009). Hiding stars with fireworks: Location privacy through camouflage. In Proceedings of the 15th annual international conference on mobile computing and networking (pp. 345–356). ACM.Google Scholar
  17. 17.
    Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.-P., & Le Boudec, J.-Y. (2012). Protecting location privacy: Optimal strategy against localization attacks. In Proceedings of the 2012 ACM conference on computer and communications security (pp. 617–627) ACM.Google Scholar
  18. 18.
    Dewri, R., & Thurimella, R. (2014). Exploiting service similarity for privacy in location-based search queries. IEEE Transactions on Parallel and Distributed Systems, 25(2), 374–383.CrossRefGoogle Scholar
  19. 19.
    Xiao, C., Chen, Z., Wang, X., Zhao, J., & Chen, C. (2014). DeCache: A decentralized two-level cache for mobile location privacy protection. In Sixth international conference on ubiquitous and future networks (ICUFN), 2014 (pp. 81–86). IEEE.Google Scholar
  20. 20.
    Damiani, M. L., Bertino, E., Silvestri, C., et al. (2010). The PROBE framework for the personalized cloaking of private locations. Transactions on Data Privacy, 3(2), 123–148.MathSciNetGoogle Scholar
  21. 21.
    Buchanan, W. J., Kwecka, Z., & Ekonomou, E. (2013). A privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications, 18(5), 728–737. Springer.CrossRefGoogle Scholar
  22. 22.
    Hearn, D. D., Baker, M. P., & Carithers, W. (2010). Computer graphics with open GL. Upper Saddle River: Prentice Hall Press.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentUIE, Chandigarh UniversityMohaliIndia
  2. 2.Computer Engineering DepartmentS.V. National Institute of TechnologySuratIndia

Personalised recommendations