Abstract
With the development of trajectory data mining, personal privacy information is facing a great threaten. To address the problems, some trajectory privacy-preserving methods are proposed. The trajectory k-anonymous is the mainstream of the current trajectory privacy protection, which trys to anonymize k location together in a cloaked region at every sample location. However, the user’s trajectory can be easily disclosed by tracking all the cloaked regions. In this paper, we propose a deviation-based location switching (DLS) protocol to break the correlation between user’s real trajectory identity and the LBS server in order to achieve user’s trajectory privacy. When a service user needs LBS, he first will build a mobile social network (MSN) and select a best matching user (BMU) to switch query, then send the query to LBS server. By virtue of the efficient weight-based private matching technique, the DLS protocol allows the user to enjoy LBS while preserving privacy from the BMU and LBS server. The analysis results prove that our proposal can protect trajectories privacy effectively and can get the results of the query without redundancy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)
Shin, K.G., Ju, X., Chen, Z., Hu, X.: Privacy protection for users of location-based services. IEEE Wirel. Commun. 19(1), 30–39 (2012)
Peng, T., Liu, Q., Wang, G.: Privacy preserving for location-based services using location transformation. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 14–28. Springer, Heidelberg (2013)
Lei, P.R., Peng, W.C., Su, I.J., Chang, C.P.: Dummy-based schemes for protecting movement trajectories. J. Inf. Sci. Eng. 28(2), 335–350 (2012)
You, T.H., Peng, W.C., Lee, W.C.: Protecting moving trajectories with dummies. In: 2007 International Conference on Mobile Data Management, pp. 278–282. IEEE (2007)
Terrovitis, M., Mamoulis, N.: Privacy preservation in the publication of trajectories. In: The 9th International Conference on Mobile Data Management (MDM08), pp. 65–72. IEEE (2008)
Gruteser, M., Bredin, J., Grunwald, D.: Path privacy in location-aware computing (2004)
Nergiz, M.E., Atzori, M., Saygin, Y.: Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 52–61. ACM (2008)
Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: The 27th Conference on Computer Communications (INFOCOM 2008). IEEE (2008)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)
Hwang, R.H., Hsueh, Y.L., Chung, H.W.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)
Lu, R., Lin, X., Shi, Z., Shao, J.: Plam: a privacy-preserving framework for localarea mobile social networks. In: 2014 IEEE INFOCOM, pp. 763–771. IEEE (2014)
Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279–290 (2013)
Wang, G., Du, Q., Zhou, W., Liu, Q.: A scalable encryption scheme for multiprivileged group communications. J. Supercomput. 64(3), 1075–1091 (2013)
Zhu, X., Chi, H., Jiang, S., Lei, X., Li, H.: Using dynamic pseudo-IDs to protect privacy in location-based services. In: 2014 IEEE International Conference on Communications (ICC), pp. 2307–2312. IEEE (2014)
Zhu, X., Liu, J., Jiang, S., Chen, Z., Li, H.: Efficient weight-based private matching for proximity-based mobile social networks. In: 2014 IEEE International Conference on Communications (ICC), pp. 4114–4119. IEEE (2014)
Lu, R., Lin, X., Shen, X.: SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3), 614–624 (2013)
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61272151, 61472451 and 61402161, the International Science & Technology Cooperation Program of China under Grant Number 2013DFB10070, the China Hunan Provincial Science & Technology Program under Grant Number 2012GK4106 and 2013FJ4046, and the “Mobile Health” Ministry of Education - China Mobile Joint Laboratory (MOE-DST No. [2012]311).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, S., Liu, Q., Wang, G. (2015). Deviation-Based Location Switching Protocol for Trajectory Privacy Protection. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-27137-8_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27136-1
Online ISBN: 978-3-319-27137-8
eBook Packages: Computer ScienceComputer Science (R0)