CLPP: Context-aware location privacy protection for location-based social network

Location-based social network (LBSN) has grown exponentially over the past several years. Given its high utility value, LBSN, however, has raised serious concerns about users' location privacy. Although users may avoid releasing geo-content in sensitive locations, this, however, does not necessarily prevent the adversary from inferring users' privacy through spatial-temporal correlations and historical information. In this paper, we introduce a new location privacy problem: context-aware location privacy protection (CLPP) problem where the privacy requirements of users are not constant and isolated. We propose a novel metric to quantify the privacy risks. Then the CLPP is formalized as how to accurately and efficiently evaluate whether the users' published geo-content meet the user's privacy requirement. To achieve online evaluating, we design two novel algorithms to calculate the correlation between the locations. Eventually, our experimental results demonstrate the validity and practicality of the proposed strategy.

[1]  Dola Barua Location-Based Services for Mobile Telephony: a study of Users' privacy concerns , 2015 .

[2]  Ling Liu,et al.  Attack-Resilient Mix-zones over Road Networks: Architecture and Algorithms , 2015, IEEE Transactions on Mobile Computing.

[3]  Jianliang Xu,et al.  Nearby Friend Alert: Location Anonymity in Mobile Geosocial Networks , 2013, IEEE Pervasive Computing.

[4]  Yu Zhang,et al.  Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.

[5]  Huan Liu,et al.  Exploring Social-Historical Ties on Location-Based Social Networks , 2012, ICWSM.

[6]  Chao Zhang,et al.  L2P2: Location-aware location privacy protection for location-based services , 2012, 2012 Proceedings IEEE INFOCOM.

[7]  Taeho Jung,et al.  Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.

[8]  Jian Pei,et al.  Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).

[9]  Marco Gruteser,et al.  USENIX Association , 1992 .

[10]  Elisa Bertino,et al.  Preventing velocity-based linkage attacks in location-aware applications , 2009, GIS.

[11]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[12]  Guoliang Xue,et al.  Checking in without worries: Location privacy in location based social networks , 2013, 2013 Proceedings IEEE INFOCOM.

[13]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[14]  Cecilia Mascolo,et al.  An Empirical Study of Geographic User Activity Patterns in Foursquare , 2011, ICWSM.

[15]  George Danezis,et al.  Quantifying Location Privacy: The Case of Sporadic Location Exposure , 2011, PETS.

[16]  Qinghua Li,et al.  Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).