EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs

Location-Based Services (LBSs) have become one of the most popular activities and affected our daily life a lot. Mobile users can enjoy kinds of conveniences by submitting their location and interest-related queries to the LBS server. However, since these queries may expose sensitive information to the untrusted LBS server, privacy concerns arise. To address the serious privacy issues, we propose a novel collaborative scheme, EPcloak, which combines a privacy-preserving spatial cloaking algorithm and caching to protect user's privacy. Different from existing schemes, users in EPcloak cache their past service data for future use. When LBSs are needed, a user first uses a Local Searching Algorithm (LSA) to look for service data from the nearby friends of a collaborative group through Ad Hoc networks. If the requirements cannot be satisfied, the user uses a Spatial Cloaking Algorithm (SCA) to forward the query to another user at a certain distance away through a set of forwarders. That user will query the LBS server to get service data for a larger area that can cover the original user's query area, and send the data back to the original user. SCA protects both user's location privacy and query privacy. Evaluation results indicate that our proposed LSA and SCA are effective and efficient.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[3]  Justin Manweiler,et al.  SMILE: encounter-based trust for mobile social services , 2009, CCS.

[4]  Injong Rhee,et al.  SLAW: A New Mobility Model for Human Walks , 2009, IEEE INFOCOM 2009.

[5]  Nitesh Saxena,et al.  Cover locations: availing location-based services without revealing the location , 2011, WPES '11.

[6]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[7]  Zan Li,et al.  MobiCache: When k-anonymity meets cache , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[8]  Hua Lu,et al.  PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.

[9]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[10]  Kang G. Shin,et al.  LISA: Location information ScrAmbler for privacy protection on smartphones , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[11]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[12]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[13]  Hui Li,et al.  3PLUS: Privacy-preserving pseudo-location updating system in location-based services , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[15]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[16]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[17]  Panagiotis Papadimitratos,et al.  Collaborative Location Privacy , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[18]  Xinwen Fu,et al.  Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.

[19]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[20]  Romit Roy Choudhury,et al.  Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.

[21]  Qinghua Li,et al.  A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[22]  Kang G. Shin,et al.  Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.

[23]  Zhu Han,et al.  Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networks , 2013, 2013 Proceedings IEEE INFOCOM.

[24]  Brian Neil Levine,et al.  A protocol for anonymous communication over the Internet , 2000, CCS.

[25]  Hui Li,et al.  EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[26]  Ying Cai,et al.  Feeling-based location privacy protection for location-based services , 2009, CCS.

[27]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[28]  Kyunghan Lee,et al.  On the Levy-Walk Nature of Human Mobility , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[29]  Marco Gruteser,et al.  USENIX Association , 1992 .

[30]  Xiaoqing Li,et al.  Privacy-area aware dummy generation algorithms for Location-Based Services , 2014, 2014 IEEE International Conference on Communications (ICC).