Abstract
Vehicular Ad hoc Networks (VANETs) have higher requirements of continuous Location-Based Services (LBSs). However, the untrusted server could reveal the users’ location privacy in the meantime. Syntactic-based privacy models have been widely used in most of the existing location privacy protection schemes. Whereas, they are suffering from background knowledge attacks, neither do they take the continuous time stamps into account. Therefore we propose a new differential privacy definition in the context of location protection for the VANETs, and we designed an obfuscation mechanism so that fine-grained locations and trajectories will not exposed when vehicles request location-based services on continuous time stamps. Then, we apply the exponential mechanism in the pseudonym permutations to provide disparate pseudonyms for different vehicles when making requests on different time stamps, these pseudonyms can hide the position correlation of vehicles on consecutive time stamps besides releasing them in a coarse-grained form simultaneously. The experimental results on real-world datasets indicate that our scheme significantly outperforms the baseline approaches in data utility.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 901–914. ACM (2013)
Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_15
Cui, J., Wen, J., Han, S., Zhong, H.: Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network. IEEE Internet Things J. (2018)
Dewri, R.: Local differential perturbations: location privacy under approximate knowledge attackers. IEEE Trans. Mob. Comput. 12(12), 2360–2372 (2013)
Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79228-4_1
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 121–132. ACM (2008)
Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: 2015 IEEE 31st International Conference on Data Engineering (ICDE), pp. 1023–1034. IEEE (2015)
Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72037-9_8
Lim, J., Yu, H., Kim, K., Kim, M., Lee, S.B.: Preserving location privacy of connected vehicles with highly accurate location updates. IEEE Commun. Lett. 21(3), 540–543 (2017)
McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2007, pp. 94–103. IEEE (2007)
Mouratidis, K., Yiu, M.L.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. 22(1), 2–15 (2010)
Mouratidis, K., Yiu, M.L.: Shortest path computation with no information leakage. Proc. VLDB Endow. 5(8), 692–703 (2012)
Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans. Mob. Comput. 14(3), 495–508 (2015)
Pan, X., Meng, X., Xu, J.: Distortion-based anonymity for continuous queries in location-based mobile services. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 256–265. ACM (2009)
Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506–1519 (2012)
Shin, H., Vaidya, J., Atluri, V., Choi, S.: Ensuring privacy and security for LBS through trajectory partitioning. In: 2010 Eleventh International Conference on Mobile Data Management (MDM), pp. 224–226. IEEE (2010)
Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1298–1309. ACM (2015)
Yang, W.D., Gao, Z.M., Wang, K., Liu, H.Y.: A privacy-preserving data aggregation mechanism for vanets. J. High Speed Netw. 22(3), 223–230 (2016)
Yi, X., Kaosar, M.G., Paulet, R., Bertino, E.: Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 25(5), 1125–1134 (2013)
Ying, B., Makrakis, D., Mouftah, H.T.: Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 17(8), 1524–1527 (2013)
Yu, R., Kang, J., Huang, X., Xie, S., Zhang, Y., Gjessing, S.: MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans. Dependable Secur. Comput. 13(1), 93–105 (2016)
Zheng, Y.: T-drive trajectory data sample, August 2011. https://www.microsoft.com/en-us/research/publication/t-drive-trajectory-data-sample/
Acknowledgment
The work is supported by the Natural Science Foundation of China under Grant No. 61572031 & U1405255. We thank the anonymous reviewers for their valuable comments that helped improve the final version of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, Z., Bao, X., Ying, Z., Liu, X., Zhong, H. (2018). Differentially Private Location Protection with Continuous Time Stamps for VANETs. In: Vaidya, J., Li, J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11337. Springer, Cham. https://doi.org/10.1007/978-3-030-05063-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-05063-4_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05062-7
Online ISBN: 978-3-030-05063-4
eBook Packages: Computer ScienceComputer Science (R0)