Multidimensional privacy preservation in location-based services

Abstract Users of mobile communication services can reap great benefits and take advantage of the convenience offered by various location-based services (LBSs). Privacy disclosure in LBSs poses a serious threat to the user’s security, and thus, existing solutions adopt K-anonymity principles to protect the location privacy of users. However, existing solutions have rarely considered the comprehensive protection of user privacy offered by LBSs such as location privacy, trajectory privacy, and query privacy. In this paper, we propose a multidimensional privacy preservation (MPP) scheme that provides full protection for user privacy without any need for a trusted third party (TTP). The MPP scheme employs a semi-trusted middle entity to perform user anonymization and result-blind filtering while unaware of any sensitive information regarding the mobile users. We utilize the Hilbert curve to transform user locations, and preserve users’ query contents using encryption technology. The proposed scheme provides enhanced security protection in both snapshot and continuous LBSs. Extensive experiments were conducted to verify the effectiveness and efficiency of the proposed scheme.

[1]  Ren-Hung Hwang,et al.  A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.

[2]  Cyrus Shahabi,et al.  Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Indrajit Ray,et al.  Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[5]  Jun Zhang,et al.  Detecting and Preventing Cyber Insider Threats: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[6]  Gang Sun,et al.  L2P2: A location-label based approach for privacy preserving in LBS , 2017, Future Gener. Comput. Syst..

[7]  Imran Memon,et al.  Search me if you can: Multiple mix zones with location privacy protection for mapping services , 2017, Int. J. Commun. Syst..

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[10]  Ibrahim Kamel,et al.  Dynamic spatial index for efficient query processing on the cloud , 2017, Journal of Cloud Computing.

[11]  D. Hilbert Ueber die stetige Abbildung einer Line auf ein Flächenstück , 1891 .

[12]  Md Zakirul Alam Bhuiyan,et al.  A Dual Privacy Preserving Scheme in Continuous Location-Based Services , 2018, IEEE Internet of Things Journal.

[13]  Rong Zheng,et al.  Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[14]  Günther F. Schrack,et al.  Encoding and decoding the Hilbert order , 1996 .

[15]  Cyrus Shahabi,et al.  Differentially Private Location Protection for Worker Datasets in Spatial Crowdsourcing , 2017, IEEE Transactions on Mobile Computing.

[16]  Chi-Yin Chow,et al.  Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.

[17]  Elisa Bertino,et al.  Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.

[18]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[19]  Carmela Troncoso,et al.  Privacy Games Along Location Traces , 2016, ACM Trans. Priv. Secur..

[20]  Yi Mu,et al.  One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications , 2016, IEEE Transactions on Information Forensics and Security.

[21]  Tao Peng,et al.  Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..

[22]  Elisa Bertino,et al.  Privacy-Preserving and Content-Protecting Location Based Queries , 2014, IEEE Trans. Knowl. Data Eng..

[23]  Jiannong Cao,et al.  Optimal Resource Allocation for Reliable and Energy Efficient Cooperative Communications , 2013, IEEE Transactions on Wireless Communications.

[24]  Jie Wu,et al.  Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.

[25]  Frank Dürr,et al.  A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.

[26]  Yuguang Fang,et al.  Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing , 2018, IEEE Transactions on Emerging Topics in Computing.

[27]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[28]  Nasser Ghadiri,et al.  $P^4QS$: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications , 2016, IEEE Transactions on Vehicular Technology.

[29]  Jie Wu,et al.  Dynamic access policy in cloud-based personal health record (PHR) systems , 2017, Inf. Sci..

[30]  Tao Peng,et al.  Privacy Preserving Scheme for Location and Content Protection in Location-Based Services , 2016, SpaCCS.

[31]  Sabrina De Capitani di Vimercati,et al.  An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.

[32]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[33]  Tao Peng,et al.  Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.

[34]  Jianfeng Ma,et al.  TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.

[35]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[36]  Jie Wu,et al.  Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..

[37]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[38]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[39]  Cheng Huang,et al.  An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud , 2016, IEEE Transactions on Vehicular Technology.

[40]  D. T. Lee,et al.  On k-Nearest Neighbor Voronoi Diagrams in the Plane , 1982, IEEE Transactions on Computers.

[41]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..