Skip to main content

Deviation-Based Location Switching Protocol for Trajectory Privacy Protection

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9530))

Abstract

With the development of trajectory data mining, personal privacy information is facing a great threaten. To address the problems, some trajectory privacy-preserving methods are proposed. The trajectory k-anonymous is the mainstream of the current trajectory privacy protection, which trys to anonymize k location together in a cloaked region at every sample location. However, the user’s trajectory can be easily disclosed by tracking all the cloaked regions. In this paper, we propose a deviation-based location switching (DLS) protocol to break the correlation between user’s real trajectory identity and the LBS server in order to achieve user’s trajectory privacy. When a service user needs LBS, he first will build a mobile social network (MSN) and select a best matching user (BMU) to switch query, then send the query to LBS server. By virtue of the efficient weight-based private matching technique, the DLS protocol allows the user to enjoy LBS while preserving privacy from the BMU and LBS server. The analysis results prove that our proposal can protect trajectories privacy effectively and can get the results of the query without redundancy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)

    Article  Google Scholar 

  2. Shin, K.G., Ju, X., Chen, Z., Hu, X.: Privacy protection for users of location-based services. IEEE Wirel. Commun. 19(1), 30–39 (2012)

    Article  Google Scholar 

  3. Peng, T., Liu, Q., Wang, G.: Privacy preserving for location-based services using location transformation. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 14–28. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Lei, P.R., Peng, W.C., Su, I.J., Chang, C.P.: Dummy-based schemes for protecting movement trajectories. J. Inf. Sci. Eng. 28(2), 335–350 (2012)

    MathSciNet  Google Scholar 

  5. You, T.H., Peng, W.C., Lee, W.C.: Protecting moving trajectories with dummies. In: 2007 International Conference on Mobile Data Management, pp. 278–282. IEEE (2007)

    Google Scholar 

  6. Terrovitis, M., Mamoulis, N.: Privacy preservation in the publication of trajectories. In: The 9th International Conference on Mobile Data Management (MDM08), pp. 65–72. IEEE (2008)

    Google Scholar 

  7. Gruteser, M., Bredin, J., Grunwald, D.: Path privacy in location-aware computing (2004)

    Google Scholar 

  8. Nergiz, M.E., Atzori, M., Saygin, Y.: Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 52–61. ACM (2008)

    Google Scholar 

  9. Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: The 27th Conference on Computer Communications (INFOCOM 2008). IEEE (2008)

    Google Scholar 

  10. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)

    Google Scholar 

  11. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  12. Hwang, R.H., Hsueh, Y.L., Chung, H.W.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)

    Article  Google Scholar 

  13. Lu, R., Lin, X., Shi, Z., Shao, J.: Plam: a privacy-preserving framework for localarea mobile social networks. In: 2014 IEEE INFOCOM, pp. 763–771. IEEE (2014)

    Google Scholar 

  14. Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279–290 (2013)

    Article  MathSciNet  Google Scholar 

  15. Wang, G., Du, Q., Zhou, W., Liu, Q.: A scalable encryption scheme for multiprivileged group communications. J. Supercomput. 64(3), 1075–1091 (2013)

    Article  Google Scholar 

  16. Zhu, X., Chi, H., Jiang, S., Lei, X., Li, H.: Using dynamic pseudo-IDs to protect privacy in location-based services. In: 2014 IEEE International Conference on Communications (ICC), pp. 2307–2312. IEEE (2014)

    Google Scholar 

  17. Zhu, X., Liu, J., Jiang, S., Chen, Z., Li, H.: Efficient weight-based private matching for proximity-based mobile social networks. In: 2014 IEEE International Conference on Communications (ICC), pp. 4114–4119. IEEE (2014)

    Google Scholar 

  18. Lu, R., Lin, X., Shen, X.: SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3), 614–624 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61272151, 61472451 and 61402161, the International Science & Technology Cooperation Program of China under Grant Number 2013DFB10070, the China Hunan Provincial Science & Technology Program under Grant Number 2012GK4106 and 2013FJ4046, and the “Mobile Health” Ministry of Education - China Mobile Joint Laboratory (MOE-DST No. [2012]311).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, S., Liu, Q., Wang, G. (2015). Deviation-Based Location Switching Protocol for Trajectory Privacy Protection. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27137-8_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27136-1

  • Online ISBN: 978-3-319-27137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics