Location information is utilized for a variety of purposes, such as military operation, Internet of Things, big data, and application services. Problems can occur if location information is exposed, such as a higher likelihood of crime and invasion of privacy. In the battlefield, exposed location data can lead to significant losses because of the exposure of military secrets and operation information. Existing transformation schemes to protect location data have been studied. However, such schemes are not suitable for real-time processing systems that use location data because transformation processing requires too much time. In order to solve this problem, we propose a Point Transformation Scheme (PTS) for location data privacy. PTS has symmetry movement by selecting a direction based on previous location data. The proposed scheme makes complex transformation processes simple compared with conventional schemes. This way, processing time can be reduced to be suitable for real-time processing systems. In addition, location data of the proposed scheme have unique keys value and transformation formulas. This means that transformation data have original data attributes at all times. Therefore, PTS can be used to share location data by grouping different transformation data among authorized users. The simulation results show that PTS is a faster and more secure scheme for real-time processing systems than conventional schemes.
[1]
Ramakrishnan Srikant,et al.
Order preserving encryption for numeric data
,
2004,
SIGMOD '04.
[2]
Walid G. Aref,et al.
Casper*: Query processing for location services without compromising privacy
,
2006,
TODS.
[3]
Jean-Yves Le Boudec,et al.
Quantifying Location Privacy
,
2011,
2011 IEEE Symposium on Security and Privacy.
[4]
Ling Liu,et al.
Privacy-Aware Mobile Services over Road Networks
,
2009,
Proc. VLDB Endow..
[5]
Feng Tian,et al.
Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage
,
2014,
TheScientificWorldJournal.
[6]
Panos Kalnis,et al.
Enabling search services on outsourced private spatial data
,
2009,
The VLDB Journal.
[7]
Jaesung Lim,et al.
Fast Time Synchronization Strategy for Mitigating Collision of Initial Entry Message over Link-16
,
2014,
2014 IEEE Military Communications Conference.
[8]
S.Suvarna Raju,et al.
Outsourced Similarity Search on Metric Data Assets
,
2014
.
[9]
Panos Kalnis,et al.
MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries
,
2007,
SSTD.
[10]
Andreas Gutscher.
Coordinate transformation - a solution for the privacy problem of location based services?
,
2006,
Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.