GeoSecure: Towards secure outsourcing of GPS data over cloud

Today geolocation data is used extensively in multiple applications and devices. GPS trajectory data can reveal political, religious affiliations, personal habits, shopping preferences etc. It threatens large number of users who use location-based services on their devices, because they are afraid of revealing their locations and concerned about being tracked. Multiple approaches have been proposed to solve problems related with trajectory data such as encrypting geolocation data, decoupling from users' unique identifiable data using privacy algorithms, and storing the data using compression algorithms. Generally, Location Based Service (LBS) providers must perform these operations sequentially on data which turns out to be inefficient. In this paper, we propose a novel approach to resolve the issues of high data storage cost, security, and privacy threats all at once. Operations on encoded GPS trajectory data are performed using modified delta compression and the Haversine distance in a lossless and privacy ensured way. It can be used to calculate velocity, acceleration, distance, etc. without actually revealing location of the user. the cloud storage cost of the GPS data is reduced using modified delta compression.

[1]  Francesca Pratesi,et al.  Privacy-by-design in big data analytics and social mining , 2014, EPJ Data Science.

[2]  Pradeep K. Atrey,et al.  Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System , 2017, ACM Trans. Multim. Comput. Commun. Appl..

[3]  Cong Sun,et al.  Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..

[4]  S. S. Ravi,et al.  SQUISH: an online approach for GPS trajectory compression , 2011, COM.Geo.

[5]  Piotr Jankowski,et al.  Privacy and spatial pattern preservation in masked GPS trajectory data , 2016, Int. J. Geogr. Inf. Sci..

[6]  Timos K. Sellis,et al.  Sampling Trajectory Streams with Spatiotemporal Criteria , 2006, 18th International Conference on Scientific and Statistical Database Management (SSDBM'06).

[7]  Springer-Verlag London A differentially private algorithm for location data release , 2015 .

[8]  S. S. Ravi,et al.  Compression of trajectory data: a comprehensive evaluation and new approach , 2014, GeoInformatica.

[9]  Roberto Di Pietro,et al.  Track me if you can: Transparent obfuscation for Location based Services , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[10]  Limin Jia,et al.  Compression Algorithm of Road Traffic Spatial Data Based on LZW Encoding , 2017 .

[11]  Yu Zheng,et al.  Trajectory Data Mining , 2015, ACM Trans. Intell. Syst. Technol..

[12]  Chengqi Zhang,et al.  Protecting Location Privacy in Spatial Crowdsourcing using Encrypted Data , 2017, EDBT.

[13]  Zhen He,et al.  Trajic: An Effective Compression System for Trajectory Data , 2015, IEEE Transactions on Knowledge and Data Engineering.

[14]  David H. Douglas,et al.  ALGORITHMS FOR THE REDUCTION OF THE NUMBER OF POINTS REQUIRED TO REPRESENT A DIGITIZED LINE OR ITS CARICATURE , 1973 .

[15]  Xing Xie,et al.  Mining interesting locations and travel sequences from GPS trajectories , 2009, WWW '09.

[16]  Roger W. Sinnott,et al.  Astronomical computing: 1. Computing under the open sky. 2. Virtues of the haversine. , 1984 .

[17]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[18]  Lu Li,et al.  Efficient secure similarity computation on encrypted trajectory data , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[19]  Samuel Madden,et al.  TrajStore: An adaptive storage system for very large trajectory data sets , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[20]  Manoj Misra,et al.  A secure image sharing scheme based on SVD and Fractional Fourier Transform , 2017, Signal Process. Image Commun..

[21]  Hui Xiong,et al.  Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.

[22]  Balasubramanian Raman,et al.  Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud , 2017 .

[23]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[24]  R. Nigel Horspool Improving LZW (data compression algorithm) , 1991, [1991] Proceedings. Data Compression Conference.

[25]  Xing Xie,et al.  GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory , 2010, IEEE Data Eng. Bull..