Time obfuscation-based privacy-preserving scheme for Location-Based Services

Privacy issues in Location-Based Services (LBSs) have gained tremendous attentions in literature over recent years. Existing approaches always fail to provide dual privacy protection on both user's location and point of interest (POI), incur endurable system overhead, and produce high quality of services, simultaneously. To address these problems, we propose a time obfuscation-based scheme, termed TOP-privacy, which carefully generates and sends some dummy queries at leisure time to confuse adversaries with some background information. TOP-privacy employs a dummy query generation algorithm, which includes a dummy location selection module and a classified POI pool construction module. It first selects some location candidates with similar location distribution with the real user's, and then determines the optimal POI to construct the dummy query based on the similarity to the user's real POI. Security analysis and evaluation results indicate its effectiveness and efficiency.

[1]  Gianluca Dini,et al.  Uniform Obfuscation for Location Privacy , 2012, DBSec.

[2]  Kang G. Shin,et al.  Anatomization and Protection of Mobile Apps' Location Privacy Threats , 2015, USENIX Security Symposium.

[3]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[4]  Injong Rhee,et al.  SLAW: A New Mobility Model for Human Walks , 2009, IEEE INFOCOM 2009.

[5]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[6]  Jian Lu,et al.  JointCache: Collaborative path confusion through lightweight P2P communication , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[7]  Varun Sharma,et al.  Evaluation of an entropy-based k-anonymity model for location based services , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[8]  Xinwen Fu,et al.  Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.

[9]  Guangzhong Sun,et al.  A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories , 2014, 2014 IEEE International Conference on Data Mining Workshop.

[10]  Kang G. Shin,et al.  Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.

[11]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[12]  Hui Li,et al.  A personalized two-tier cloaking scheme for privacy-aware location-based services , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[13]  Hui Li,et al.  EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[14]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[15]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[16]  Qinghua Li,et al.  Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[17]  Jean-Pierre Hubaux,et al.  Privacy in Mobile Computing for Location-Sharing-Based Services , 2011, PETS.

[18]  Urs Hengartner,et al.  VeriPlace: a privacy-aware location proof architecture , 2010, GIS '10.

[19]  Nitesh Saxena,et al.  Cover locations: availing location-based services without revealing the location , 2011, WPES '11.

[20]  Kyunghan Lee,et al.  On the Levy-Walk Nature of Human Mobility , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[21]  Panagiotis Papadimitratos,et al.  Ieee Transactions on Dependable and Secure Computing, Special Issue on " Security and Privacy in Mobile Platforms " , 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration , 2022 .

[22]  Kang G. Shin,et al.  Location Privacy Protection for Smartphone Users , 2014, CCS.

[23]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[24]  Hua Lu,et al.  PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.