Skip to main content

Privacy in Location Based Services: Protection Strategies, Attack Models and Open Challenges

  • Conference paper
  • First Online:
Information Science and Applications 2017 (ICISA 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 424))

Included in the following conference series:

Abstract

The increasing capabilities of position determination technologies (e.g., GPS) in mobile and hand held device facilitates the widespread use of Location Based Services (LBS). Although LBSs are providing enhanced functionalities and convenience of ubiquitous computing, they open up new vulnerabilities that can be exploited to target violation of security and privacy of users. For these applications to perform, location of the individual/user is required. Consequently they may pose a major privacy threat on its users. So for LBS applications to succeed, privacy and confidentiality are key issues. “Privacy protection” has become the buzz word now days for the users of location based services. This problem has gained a considerable attention among the researcher community also. A state-of-art survey of privacy in location based services containing details of all privacy protection schemes is presented. Further, attack models and their handling mechanism are discussed in comprehensive manner. Finally, some open challenges in the area of location privacy are also demonstrated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. The Location Privacy Protection Act of 2011 (S. 1223). https://www.franken.senate.gov/files/documents/121011_LocationPrivacyProtection.pdf

  2. Bettini, C., Mascetti, S., Wang, X.S., Freni, D., Jajodia, S.: Anonymity and historical-anonymity in location-based services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 1–30. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03511-1_1

    Chapter  Google Scholar 

  3. Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Proceedings of Privacy Enhancing Technology Workshop (2006)

    Google Scholar 

  4. Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73540-3_15

    Chapter  Google Scholar 

  5. Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: PERVASIVE 2005 (2005)

    Google Scholar 

  6. Duckham, M., Kulik, L.: Simulation of obfuscation and negotiation for location privacy. In: Cohn, A.G., Mark, D.M. (eds.) COSIT 2005. LNCS, vol. 3693, pp. 31–48. Springer, Heidelberg (2005). doi:10.1007/11556114_3

    Chapter  Google Scholar 

  7. Ghinita, G., Kalnis, P., Skiadopoulos, S.: Prive: anonymous location-based queries in distributed mobile systems. In: Proceedings of WWW 2007 (2007)

    Google Scholar 

  8. Gidofalvi, G., Huang, X., Pedersen, T.B.: Privacy-preserving data mining on moving objects trajectories. In: Proceedings of MDM 2007 (2007)

    Google Scholar 

  9. Gkoulalas-Divanis, A., Verykios, V.S.: A privacy-aware trajectory tracking query engine. SIGKDD Explor. Newsl. 10(1), 40–49 (2008)

    Article  Google Scholar 

  10. Gkoulalas-Divanis, A., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of SDM 2009 (2009)

    Google Scholar 

  11. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys 03, pp. 31–42 (2003)

    Google Scholar 

  12. Hoh, B., et al.: Enhancing security and privacy in transaction monitoring systems. IEEE Pervasive Comput. 5(4), 3846 (2006)

    Google Scholar 

  13. Jagwani, P., Kaushik, S.: Defending location privacy using zero knowledge proof concept in location based services. In: Proceedings of MDM 2012, Bangluru, India (2012)

    Google Scholar 

  14. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE 19(12), 1719–1733 (2007)

    Google Scholar 

  15. Kaushik, S., Tiwari, S., Goplani, P.: Reducing dependency on middleware for pull based active services in LBS systems. In: Sénac, P., Ott, M., Seneviratne, A. (eds.) ICWCA 2011. LNICSSITE, vol. 72, pp. 90–106. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29157-9_9

    Chapter  Google Scholar 

  16. Khoshgozaran, A., Shahabi, C.: Private information retrieval techniques for enabling location privacy in location-based services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications, October 2009. ISBN: 978-3-642-03510-4

    Google Scholar 

  17. Khoshgozaran, A., Shahabi, C.: A taxonomy of approaches to preserve location privacy in location-based services. Int. J. Comput. Sci. Eng. 5(2), 86–96 (2010)

    Article  Google Scholar 

  18. Khuong, V., Zheng, R.: Efficient algorithms for K-anonymous location privacy in participatory sensing. In: IEEE Infocom Proceedings 2012 (2012)

    Google Scholar 

  19. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005 (2005)

    Google Scholar 

  20. Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, Khai, N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72037-9_8

    Chapter  Google Scholar 

  21. Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally private information retrieval. In: FOCS (1997)

    Google Scholar 

  22. Lee, B., Oh, J., Yu, H., Kim, J.: Protecting location privacy using location semnatics. In: KDD 2011, August 21–24, San Diego, California, USA (2011)

    Google Scholar 

  23. Lee, K., Lee, W.C., Leong, H.V., Zheng, B.: Navigational path privacy protection: navigational path privacy protection. In: Proceedings of CIKM 2009 (2009)

    Google Scholar 

  24. Liu, L.: Privacy and location anonymization in location-based services. SIGSPATIAL Spec. 1(2), 15–22 (2009)

    Article  Google Scholar 

  25. Liu, L.: From data privacy to location privacy. In: VLDB 2007, pp. 1429–1430 (2007)

    Google Scholar 

  26. Mokbel Mohammad, F.: Privacy-preserving location services. In: ICDM 2008 (2008)

    Google Scholar 

  27. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The newcasper: query processing for location services without compromising privacy. In: Proceedings of VLDB 2006 (2006)

    Google Scholar 

  28. Nergiz, M.E., Atzori, M., Sayggn, Y., Gu, B.: Towards trajectory anonymization a generalization based approach. Trans. Data Priv. 2(1), 47–75 (2009)

    MathSciNet  Google Scholar 

  29. Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.-P.: A distortion-based metric for location privacy. In: WPES 2009: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, pp. 21–30, New York, NY, USA. ACM (2009)

    Google Scholar 

  30. Shokri, R., et al.: Quantifying location privacy. In: 2011 IEEE Symposium on Security and Privacy. IEEE (2011)

    Google Scholar 

  31. Talukder, N., Ahamed, S.I.: Preventing multi-query attack in location-based services. In: Proceedings of the Third ACM Conference on Wireless Network Security. ACM (2010)

    Google Scholar 

  32. Wang, S., Ding, X., Deng, R.H., Bao, F.: Private information retrieval using trusted hardware. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 49–64. Springer, Heidelberg (2006). doi:10.1007/11863908_4

    Chapter  Google Scholar 

  33. Wernke, M., et al.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2014)

    Article  Google Scholar 

  34. Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  35. Williams, P., Sion, R.: Usable PIR. In: NDSS (2008)

    Google Scholar 

  36. Xu, T., Cai, Y.: Exploring historical location data for anonymity preserving in location-based services. In: Proceedings of INFO-COM 2008 (2008)

    Google Scholar 

  37. You, T.H., Peng, W.-C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of PALMS 2007 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priti Jagwani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Jagwani, P., Kaushik, S. (2017). Privacy in Location Based Services: Protection Strategies, Attack Models and Open Challenges. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4154-9_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4153-2

  • Online ISBN: 978-981-10-4154-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics