Advertisement

A Location Privacy Preserving Method Based on Sensitive Diversity for LBS

  • Changli Zhou
  • Chunguang Ma
  • Songtao Yang
  • Peng Wu
  • Linlin Liu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8707)

Abstract

A user’s staying points in her trajectory have semantic association with privacy, such as she stays at a hospital. Staying at a sensitive place, a user may have privacy exposure risks when she gets location based service (LBS). Constructing cloaking regions and using fake locations are common methods. But if regions and fake positions are still in the sensitive area, it is vulnerable to lead location privacy exposure. We propose an anchor generating method based on sensitive places diversity. According to the visiting number and peak time of users, sensitive places are chosen to form a diversity zone, its centroid is taken as the anchor location which increases a user’s location diversity. Based on the anchor, a query algorithm for places of interest (POIs) is proposed, and precise results can be deduced with the anchor instead of sending users’ actual location to LBS server. The experiments show that our method achieves a tradeoff between QoS and privacy preserving, and it has a good working performance.

Keywords

Center Server Location Base Service Location Privacy Privacy Preserve Semantic Association 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)Google Scholar
  2. 2.
    Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 620–629. IEEE (2005)Google Scholar
  3. 3.
    Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter 13(1), 19–29 (2011)CrossRefGoogle Scholar
  4. 4.
    Bamba, B., Liu, L., Pesti, P., et al.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th International Conference on World Wide Web, pp. 237–246. ACM (2008)Google Scholar
  5. 5.
    Xu, J., Xu, M., Lin, X., et al.: Location privacy protection through anonymous cells in road network. Journal of Zhejiang University (Engineering Science) 3, 006 (2011)Google Scholar
  6. 6.
    Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of the International Conference on Pervasive Services, ICPS 2005, pp. 88–97. IEEE (2005)Google Scholar
  7. 7.
    Lu, H., Jensen, C.S., Yiu, M.L.: Pad: Privacy-area aware, dummy-based location privacy in mobile services. In: Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, pp. 16–23. ACM (2008)Google Scholar
  8. 8.
    Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM (2004)Google Scholar
  9. 9.
    Yiu, M.L., Jensen, C.S., Huang, X., et al.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 366–375. IEEE (2008)Google Scholar
  10. 10.
    Pellegrini, S., Ess, A., Schindler, K., et al.: You’ll never walk alone: Modeling social behavior for multi-target tracking. In: 2009 IEEE 12th International Conference on Computer Vision, pp. 261–268. IEEE (2009)Google Scholar
  11. 11.
    Huo, Z., Meng, X., Hu, H., Huang, Y.: you can walk alone: Trajectory privacy-preserving through significant stays protection. In: Lee, S.-g., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012, Part I. LNCS, vol. 7238, pp. 351–366. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  12. 12.
    Mokbel, M.F.: Towards privacy-aware location-based database servers. In: Proceedings of the 22nd International Conference on Data Engineering Workshops, pp. 93–93. IEEE (2006)Google Scholar
  13. 13.
    Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pp. 171–178. ACM (2006)Google Scholar
  14. 14.
    Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351–380 (2011)CrossRefGoogle Scholar
  15. 15.
    Huang, Y., Huo, Z., Meng, X.F.: Coprivacy: A collaborative location privacy-preserving method without cloaking region. Jisuanji Xuebao(Chinese Journal of Computers) 34(10), 1976–(1985)Google Scholar
  16. 16.
    Gong, Z., Sun, G.Z., Xie, X.: Protecting privacy in location-based services using k-anonymity without cloaked region. In: Mobile 2010 Eleventh International Conference on Data Management (MDM), pp. 366–371. IEEE (2010)Google Scholar
  17. 17.
    Xue, M., Kalnis, P., Pung, H.K.: Location diversity: Enhanced privacy protection in location based services. In: Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. LNCS, vol. 5561, pp. 70–87. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  18. 18.
    Xue, J., Liu, X.Y., Yang, X.C., et al.: A location privacy preserving approach on road network. Jisuanji Xuebao(Chinese Journal of Computers) 34(5), 865–878 (2011)Google Scholar
  19. 19.
    Liu, F., Hua, K.A., Cai, Y.: Query l-diversity in location-based services. In: Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009, pp. 436–442. IEEE (2009)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2014

Authors and Affiliations

  • Changli Zhou
    • 1
  • Chunguang Ma
    • 1
  • Songtao Yang
    • 1
    • 2
  • Peng Wu
    • 1
  • Linlin Liu
    • 3
  1. 1.Harbin Engineering UniversityHarbin CityChina
  2. 2.Jia Mu Si UniversityJiamusi CityChina
  3. 3.Harbin Crystal Commercial Photography Co. LtdHarbin CityChina

Personalised recommendations