Concurrent Queries in Location Based Services

The location-based services (LBS) are gaining a great importance due to the tremendous development in telecommunications and geographic information systems. In addition, the spread of laptops and mobile devices that can use these services at anytime and anywhere helps the diffusion of this type of application. Nevertheless, there are significant challenges that could impede the use of this type of services. User's Privacy is considered as one of these important challenges that limit the usage of these services because this type of services is user location based. Thereby, different techniques are developed to preserve the user location privacy while s/he uses the LBS. Most of these techniques depend on the Kanonymity [11] of user's location by querying about a spatial region that contains k-1 users. Thus, the adversary cannot detect the user who asked for the service from these k users. However, if the adversary is in possession of some information about the users such as users' profiles and historical queries, s/he can discover in a high percentage the query issuer from the k users in the spatial region. In addition, if several users in a specified spatial area send at the same time their requests, the potential attacks targeting the privacy in the LBS could increase. In this paper, we investigate the impact of users' profiles and previously issued queries by the users in case of concurrent queries on the privacy. We propose an algorithm for predicating the issuer of each query and her/his underlying location in case of concurrent queries based on the users' profiles, historical queries, and the spatial area geographical characteristics. The experiments show that the concurrent queries affect negatively the privacy level in the location based services.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Tran Khanh Dang,et al.  Semantic Bob-tree: a new obfuscation technique for location privacy protection , 2012, MoMM '12.

[3]  Indrajit Ray,et al.  Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[4]  Marco Gruteser,et al.  USENIX Association , 1992 .

[5]  Sushil Jajodia,et al.  Anonymity and Historical-Anonymity in Location-Based Services , 2009, Privacy in Location-Based Applications.

[6]  Claudio Bettini,et al.  Privacy in Georeferenced Context-aware Services: A Survey , 2009, PiLBA.

[7]  Sushil Jajodia,et al.  Preserving Anonymity of Recurrent Location-Based Queries , 2009, 2009 16th International Symposium on Temporal Representation and Reasoning.

[8]  Vijayalakshmi Atluri,et al.  A profile anonymization model for location-based services , 2011, J. Comput. Secur..

[9]  Jun Pang,et al.  Measuring query privacy in location-based services , 2012, CODASPY '12.

[10]  Chi-Yin Chow,et al.  Trajectory privacy in location-based services and data publication , 2011, SKDD.

[11]  Vijayalakshmi Atluri,et al.  A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[12]  Jun Pang,et al.  Exploring dependency for query privacy protection in location-based services , 2013, CODASPY.

[13]  Reza Shokri,et al.  Evaluating the Privacy Risk of Location-Based Services , 2011, Financial Cryptography.

[14]  Carmela Troncoso,et al.  Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.

[15]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..