A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services

With the development of wireless communication and positioning technology, location-based services (LBSs) have been gaining tremendous popularity, due to its ability to greatly facilitate the people’s daily lives. Meanwhile, it also entails the risk of location privacy disclosure. To address this issue, we usually adopt K-anonymity in the centralized architecture based on a single trusted anonymizer. However, it may expose the user’s privacy in continuous LBSs. In this paper, we propose a dual-K mechanism (DKM) to protect the user’s trajectory privacy for continuous LBSs. Our scheme introduces multiple anonymizers between the user and the location service provider (LSP), and each time the K query locations are sent to K anonymizers to form K-anonymity respectively. At the same time, we combine with location selection mechanism to confuse the user’s real location to enhance the user’s privacy. The LSP and a single anonymizer cannot get the user’s trajectory, and the anonymizers can be semi-trusted. The security analysis demonstrates that our scheme can effectively protect the user’s trajectory privacy.

[1]  Qin Liu,et al.  Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.

[2]  Ren-Hung Hwang,et al.  A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.

[3]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..

[4]  Mohamed Grissa,et al.  Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Panos Kalnis,et al.  A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..

[6]  Tao Peng,et al.  Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.

[7]  Tao Peng,et al.  Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..

[8]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[9]  Elisa Bertino,et al.  Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.

[10]  Jemal H. Abawajy,et al.  Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..

[11]  Xinwen Fu,et al.  Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.

[12]  Jianliang Xu,et al.  Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2008, IEEE Transactions on Knowledge and Data Engineering.

[13]  Jie Wu,et al.  Friendship-based location privacy in Mobile Social Networks , 2011, Int. J. Secur. Networks.

[14]  Hui Li,et al.  3PLUS: Privacy-preserving pseudo-location updating system in location-based services , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[15]  Qiong Huang,et al.  User-Defined Privacy Grid System for Continuous Location-Based Services , 2015, IEEE Transactions on Mobile Computing.

[16]  Jiannong Cao,et al.  Optimal Resource Allocation for Reliable and Energy Efficient Cooperative Communications , 2013, IEEE Transactions on Wireless Communications.

[17]  Jianfeng Ma,et al.  TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.

[18]  Xiaoqing Li,et al.  Privacy-area aware dummy generation algorithms for Location-Based Services , 2014, 2014 IEEE International Conference on Communications (ICC).

[19]  Yuan Zhang,et al.  On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for $k$ -Anonymity Location Privacy , 2016, IEEE Transactions on Information Forensics and Security.

[20]  Rong Zheng,et al.  Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[21]  Qin Liu,et al.  Enhancing Location Privacy through User-Defined Grid in Location-Based Services , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[22]  Qing Liu,et al.  A Hybrid Prediction Model for Moving Objects , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[23]  Hui Li,et al.  Protecting User Trajectory in Location-Based Services , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[24]  Kim-Kwang Raymond Choo,et al.  Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..

[25]  Kang G. Shin,et al.  Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.