Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services

Privacy preservation has recently received considerable attention for location-based mobile services. A lot of location cloaking approaches focus on identity and location protection, but few algorithms pay attention to prevent sensitive information disclosure using query semantics. In terms of personalized privacy requirements, all queries in a cloaking set, from some user’s point of view, are sensitive. These users regard the privacy is breached. This attack is called as the sensitivity homogeneity attack. We show that none of the existing location cloaking approaches can effectively resolve this problem over road networks. We propose a (K, L, P)-anonymity model and a personalized privacy protection cloaking algorithm over road networks, aiming at protecting the identity, location and sensitive information for each user. The main idea of our method is first to partition users into different groups as anonymity requirements. Then, unsafe groups are adjusted by inserting relaxed conservative users considering sensitivity requirements. Finally, segments covered by each group are published to protect location information. The efficiency and effectiveness of the method are validated by a series of carefully designed experiments. The experimental results also show that the price paid for defending against sensitivity homogeneity attacks is small.

[1]  Xiao Pan,et al.  Preserving location privacy without exact locations in mobile services , 2013, Frontiers of Computer Science.

[2]  Kyriakos Mouratidis,et al.  Anonymous Query Processing in Road Networks , 2010, IEEE Transactions on Knowledge and Data Engineering.

[3]  Jong Kim,et al.  Protecting location privacy using location semantics , 2011, KDD.

[4]  Jianliang Xu,et al.  A Cloaking Algorithm Based on Spatial Networks for Location Privacy , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[5]  Kyriakos Mouratidis,et al.  Shortest Path Computation with No Information Leakage , 2012, Proc. VLDB Endow..

[6]  Xue Jiao,et al.  A Location Privacy Preserving Approach on Road Network , 2011 .

[7]  Joseph Kee-Yin Ng,et al.  Privacy-aware location data publishing , 2010, TODS.

[8]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[9]  Elisa Bertino,et al.  Preventing velocity-based linkage attacks in location-aware applications , 2009, GIS.

[10]  Tetsuji Satoh,et al.  Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[11]  Cyrus Shahabi,et al.  Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.

[12]  Jianliang Xu,et al.  p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.

[13]  Xiaofeng Meng,et al.  Discovering top-k patterns with differential privacy-an accurate approach , 2014, Frontiers of Computer Science.

[14]  Feifei Li,et al.  On Trip Planning Queries in Spatial Databases , 2005, SSTD.

[15]  Jianliang Xu,et al.  Distortion-based anonymity for continuous queries in location-based mobile services , 2009, GIS.

[16]  Bin Wang,et al.  A Location Privacy Preserving Approach on Road Network: A Location Privacy Preserving Approach on Road Network , 2011 .

[17]  Manolis Terrovitis,et al.  Privacy preservation in the dissemination of location data , 2011, SKDD.

[18]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[19]  Jianliang Xu,et al.  Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2008, IEEE Transactions on Knowledge and Data Engineering.

[20]  Martin Halvey,et al.  WWW '07: Proceedings of the 16th international conference on World Wide Web , 2007, WWW 2007.

[21]  Jianliang Xu,et al.  Private search on key-value stores with hierarchical indexes , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[22]  Shicong Meng,et al.  Anonymizing continuous queries with delay-tolerant mix-zones over road networks , 2014, Distributed and Parallel Databases.

[23]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[24]  Calton Pu,et al.  Road network mix-zones for anonymous location based services , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).

[25]  Panos Kalnis,et al.  Location Diversity: Enhanced Privacy Protection in Location Based Services , 2009, LoCA.

[26]  Yuzhe Tang,et al.  Location Privacy with Road Network Mix-Zones , 2012, 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[27]  Ling Liu,et al.  Privacy-Aware Mobile Services over Road Networks , 2009, Proc. VLDB Endow..

[28]  Chi-Yin Chow,et al.  Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.

[29]  Chi-Yin Chow,et al.  Query-aware location anonymization for road networks , 2011, GeoInformatica.

[30]  Panos Kalnis,et al.  Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites , 2008, SSDBM.

[31]  Kien A. Hua,et al.  Protecting User Privacy Better with Query l-Diversity , 2010, Int. J. Inf. Secur. Priv..

[32]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[33]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[34]  Marco Gruteser,et al.  USENIX Association , 1992 .

[35]  Ling Liu,et al.  Effective mix-zone anonymization techniques for mobile travelers , 2013, GeoInformatica.

[36]  Elisa Bertino,et al.  The PROBE Framework for the Personalized Cloaking of Private Locations , 2010, Trans. Data Priv..

[37]  Maria Luisa Damiani,et al.  Privacy-Preserving Sharing of Sensitive Semantic Locations under Road-Network Constraints , 2012, 2012 IEEE 13th International Conference on Mobile Data Management.

[38]  Jianliang Xu,et al.  Private proximity detection and monitoring with vicinity regions , 2013, MobiDE.

[39]  Xiao Pan,et al.  Voronoi-Based Spatial Cloaking Algorithm over Road Network , 2014, DEXA.

[40]  Tanzima Hashem,et al.  Group Trip Planning Queries in Spatial Databases , 2013, SSTD.