A context-aware scheme for privacy-preserving location-based services

We address issues related to privacy protection in location-based services (LBSs). Most existing privacy-preserving LBS techniques either require a trusted third-party (anonymizer) or use cryptographic protocols that are computationally and communicationally expensive. Our design of privacy-preserving techniques is principled on not requiring a trusted third-party while being highly efficient in terms of time and space complexities. The problem has two interesting and challenging characteristics: First, the degree of privacy protection and LBS accuracy depends on the context, such as population and road density, around a user's location. Second, an adversary may violate a user's location privacy in two ways: (i) based on the user's location information contained in the LBS query payload and (ii) by inferring a user's geographical location based on the device's IP address. To address these challenges, we introduce CAP, a context-aware privacy-preserving LBS system with integrated protection for both data privacy and communication anonymity. We have implemented CAP and integrated it with Google Maps, a popular LBS system. Theoretical analysis and experimental results validate CAP's effectiveness on privacy protection, LBS accuracy, and communication QoS (Quality-of-Service).

[1]  Marco Gruteser,et al.  USENIX Association , 1992 .

[2]  Marco Gruteser,et al.  Location Privacy in Wireless Networks , 2011, Encyclopedia of Cryptography and Security.

[3]  Xinwen Fu,et al.  On performance bottleneck of anonymous communication networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[4]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[5]  Radu Sion,et al.  On the Computational Practicality of Private Information Retrieval , 2006 .

[6]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[7]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[9]  Panos Kalnis,et al.  Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[10]  Dimitrios Gunopulos,et al.  Anytime Measures for Top-k Algorithms , 2007, VLDB.

[11]  Walid G. Aref,et al.  Analysis of Multi-Dimensional Space-Filling Curves , 2003, GeoInformatica.

[12]  Per Enge,et al.  Special Issue on Global Positioning System , 1999, Proc. IEEE.

[13]  Torben Bach Pedersen,et al.  Privacy-Preserving Data Mining on Moving Object Trajectories , 2007, 2007 International Conference on Mobile Data Management.

[14]  Mohamed Mokbel,et al.  Challenges in Preserving Location Privacy in Peer-to-Peer Environments , 2006, 2006 Seventh International Conference on Web-Age Information Management Workshops.

[15]  Heinz-Otto Peitgen,et al.  The science of fractal images , 2011 .

[16]  Nikita Borisov,et al.  A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.

[17]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[18]  Christos Faloutsos,et al.  Analysis of the Clustering Properties of the Hilbert Space-Filling Curve , 2001, IEEE Trans. Knowl. Data Eng..

[19]  Desh Ranjan,et al.  Space-Filling Curves and Their Use in the Design of Geometric Data Structures , 1997, Theor. Comput. Sci..

[20]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[21]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[22]  Jon Louis Bentley,et al.  K-d trees for semidynamic point sets , 1990, SCG '90.

[23]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[24]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[25]  Einar Snekkenes,et al.  Concepts for personal location privacy policies , 2001, EC '01.

[26]  Ling Liu,et al.  A Customizable k-Anonymity Model for Protecting Location Privacy , 2004 .

[27]  Beng Chin Ooi,et al.  iDistance: An adaptive B+-tree based indexing method for nearest neighbor search , 2005, TODS.

[28]  Andy Hopper,et al.  The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.

[29]  Christos Faloutsos,et al.  Fractals for secondary key retrieval , 1989, PODS.

[30]  B. R. Badrinath,et al.  VOR base stations for indoor 802.11 positioning , 2004, MobiCom '04.

[31]  Wei Zhao,et al.  Privacy-Preserving Data Mining Systems , 2007, Computer.

[32]  Kay Römer The Lighthouse Location System for Smart Dust , 2003, MobiSys '03.

[33]  Bernhard Plattner,et al.  Analysis of an anonymity network for web browsing , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[34]  Ernesto Damiani,et al.  Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.

[35]  Dirk Grunwald,et al.  Shining Light in Dark Places: A Study of Anonymous Network Usage ; CU-CS-1032-07 , 2007 .

[36]  Radu Sion,et al.  On the Practicality of Private Information Retrieval , 2007, NDSS.

[37]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[38]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[39]  Weibo Gong,et al.  Application level relay for high-bandwidth data transport , 2004 .

[40]  Julian L. Simon,et al.  The Effect of Population Density on Infrastructure: The Case of Road Building , 1975, Economic Development and Cultural Change.

[41]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[42]  Jon Louis Bentley,et al.  An Algorithm for Finding Best Matches in Logarithmic Expected Time , 1977, TOMS.