Abstract
Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition, the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems, this paper proposes an improved privacy protection method—NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method, NCC, which is incorporated with a redundancy optimization processing strategy, realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users’ anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode. (3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhao, D.P., Liang, L., Tian, X.X., et al.: Privacy protection in location based services: model and development (2015)
Zhang, X.J., Gui, X.L., Wu, Z.D.: Privacy preservation for location-based services: a survey. J. Softw. 26(9), 2373–2395 (2015)
Chen, X., Pang, J.: Protecting query privacy in location-based services. GeoInformatica 18(1), 95–133 (2014)
199IT: 08/09/2015. http://www.199it.com/archives/381843.html
Sythoff, J., Morrison, J.: Location-based services: market forecast, 2011–2015. Pyramid Research (2011)
Dewri, R., Thurimella, R.: Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 25(2), 374–383 (2014)
Chow, C.Y., Mokbel, M.F., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Trans. Mob. Comput. 10(1), 94–107 (2011)
Kaliyamurthie, K.P., Parameswari, D., Udayakumar, R.: k-anonymity based privacy preserving for data collection in wireless sensor networks. Indian J. Sci. Technol. 6, 4604–4614 (2013)
Zuberi, R.S., Ahmad, S.N., Lall, B.: Privacy protection through k-anonymity in location-based services. Iete Tech. Rev. 29(3), 196 (2012)
Xue, M., Liu, Y., Ross, K.W., et al.: Thwarting location privacy protection in location-based social discovery services. Secur. Commun. Netw. 9(11), 1496–1508 (2016)
Dewri, R., Thurimella, R.: Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 25(2), 374–383 (2014)
Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper: query processing for location services without compromising privacy. ACM Trans. Data base Syst. (TODS) 34(4), 24 (2009)
Mokbel, M.F., Chow, C.Y., Aref, W.G: The new casper: query processing for location services without compromising privacy. In: International Conference on Very Large Data Bases, DBLP, Seoul, Korea, pp. 763–774, September 2006
Niu, B., Zu, X.Y., Chi, T.H.: Pseudo-location updating system for privacy-preserving location-based services. China Commun. 10(9), 1–12 (2013)
Si, C., Xu, H.Y.: Location privacy protection method based on V-grid model. Comput. Eng. 38(12), 276–278 (2012)
Jin, S.F., Ye, Z.S., Song, H.: A similar quadtree based on location K-Anonymity algorithm. Trans. Beijing Inst. Technol. 1, 68–71 (2014)
Brink, H.T.: A framework for generating network based moving objects. GeoInformatica 6(2), 153–180 (2002)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys (2003)
Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS (2005)
Jefferies, N., Mitchell, C., Walker, M.: A proposed architecture for trusted third party services. In: Dawson, E., Golić, J. (eds.) CPA 1995. LNCS, vol. 1029, pp. 98–104. Springer, Heidelberg (1996). doi:10.1007/BFb0032349
Aggarwal, G., et al.: Vision paper: enabling privacy for the paranoids. In: VLDB (2004)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International Conference on World Wide Web, pp. 371–380 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, W., Fan, M., Feng, J., Wang, G. (2017). The NCC: An Improved Anonymous Method for Location-Based Services Based on Casper. In: Zou, B., Han, Q., Sun, G., Jing, W., Peng, X., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 728. Springer, Singapore. https://doi.org/10.1007/978-981-10-6388-6_47
Download citation
DOI: https://doi.org/10.1007/978-981-10-6388-6_47
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6387-9
Online ISBN: 978-981-10-6388-6
eBook Packages: Computer ScienceComputer Science (R0)