Skip to main content

The NCC: An Improved Anonymous Method for Location-Based Services Based on Casper

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 728))

  • 1647 Accesses

Abstract

Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition, the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems, this paper proposes an improved privacy protection method—NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method, NCC, which is incorporated with a redundancy optimization processing strategy, realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users’ anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode. (3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhao, D.P., Liang, L., Tian, X.X., et al.: Privacy protection in location based services: model and development (2015)

    Google Scholar 

  2. Zhang, X.J., Gui, X.L., Wu, Z.D.: Privacy preservation for location-based services: a survey. J. Softw. 26(9), 2373–2395 (2015)

    MathSciNet  Google Scholar 

  3. Chen, X., Pang, J.: Protecting query privacy in location-based services. GeoInformatica 18(1), 95–133 (2014)

    Article  Google Scholar 

  4. 199IT: 08/09/2015. http://www.199it.com/archives/381843.html

  5. Sythoff, J., Morrison, J.: Location-based services: market forecast, 2011–2015. Pyramid Research (2011)

    Google Scholar 

  6. Dewri, R., Thurimella, R.: Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 25(2), 374–383 (2014)

    Article  Google Scholar 

  7. Chow, C.Y., Mokbel, M.F., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Trans. Mob. Comput. 10(1), 94–107 (2011)

    Article  Google Scholar 

  8. Kaliyamurthie, K.P., Parameswari, D., Udayakumar, R.: k-anonymity based privacy preserving for data collection in wireless sensor networks. Indian J. Sci. Technol. 6, 4604–4614 (2013)

    Google Scholar 

  9. Zuberi, R.S., Ahmad, S.N., Lall, B.: Privacy protection through k-anonymity in location-based services. Iete Tech. Rev. 29(3), 196 (2012)

    Article  Google Scholar 

  10. Xue, M., Liu, Y., Ross, K.W., et al.: Thwarting location privacy protection in location-based social discovery services. Secur. Commun. Netw. 9(11), 1496–1508 (2016)

    Article  Google Scholar 

  11. Dewri, R., Thurimella, R.: Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 25(2), 374–383 (2014)

    Article  Google Scholar 

  12. Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper: query processing for location services without compromising privacy. ACM Trans. Data base Syst. (TODS) 34(4), 24 (2009)

    Google Scholar 

  13. Mokbel, M.F., Chow, C.Y., Aref, W.G: The new casper: query processing for location services without compromising privacy. In: International Conference on Very Large Data Bases, DBLP, Seoul, Korea, pp. 763–774, September 2006

    Google Scholar 

  14. Niu, B., Zu, X.Y., Chi, T.H.: Pseudo-location updating system for privacy-preserving location-based services. China Commun. 10(9), 1–12 (2013)

    Article  Google Scholar 

  15. Si, C., Xu, H.Y.: Location privacy protection method based on V-grid model. Comput. Eng. 38(12), 276–278 (2012)

    MathSciNet  Google Scholar 

  16. Jin, S.F., Ye, Z.S., Song, H.: A similar quadtree based on location K-Anonymity algorithm. Trans. Beijing Inst. Technol. 1, 68–71 (2014)

    Google Scholar 

  17. Brink, H.T.: A framework for generating network based moving objects. GeoInformatica 6(2), 153–180 (2002)

    Article  Google Scholar 

  18. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys (2003)

    Google Scholar 

  19. Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS (2005)

    Google Scholar 

  20. Jefferies, N., Mitchell, C., Walker, M.: A proposed architecture for trusted third party services. In: Dawson, E., Golić, J. (eds.) CPA 1995. LNCS, vol. 1029, pp. 98–104. Springer, Heidelberg (1996). doi:10.1007/BFb0032349

    Chapter  Google Scholar 

  21. Aggarwal, G., et al.: Vision paper: enabling privacy for the paranoids. In: VLDB (2004)

    Google Scholar 

  22. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)

    Google Scholar 

  23. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  24. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  25. Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International Conference on World Wide Web, pp. 371–380 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenqi Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Liu, W., Fan, M., Feng, J., Wang, G. (2017). The NCC: An Improved Anonymous Method for Location-Based Services Based on Casper. In: Zou, B., Han, Q., Sun, G., Jing, W., Peng, X., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 728. Springer, Singapore. https://doi.org/10.1007/978-981-10-6388-6_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6388-6_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6387-9

  • Online ISBN: 978-981-10-6388-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics