A novel location privacy-preserving scheme based on l-queries for continuous LBS

Abstract Location cloaking based on k-anonymity is one of the most prevalent privacy-preserving technologies for Location Based Services (LBS). However, it has been proved vulnerable to expose the user's identity. In this paper, we propose a location anonymity scheme based on the fake queries in continuous location-based services. To prevent attackers from tracing a mobile user by his/her continuous queries, some fake queries will be randomly injected by a Trusted Third Party. These fake queries can prevent the reverse mapping from user identity to query content. Also, we hide his/her actual query amongst a set of queries by merging the neighbors’ request in a single query. Moreover, a partitioning algorithm and a clustering algorithm are introduced to reduce the computation and communication overhead further. Security analysis shows that our scheme can resist the continuous queries attack and the trajectory attack. Detailed theoretical analyses and experimental results show the effectiveness and practicality of the proposed scheme.

[1]  Peng Liu,et al.  A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[2]  Katina Michael,et al.  Location-Based Services and the Privacy-Security Dichotomy , 2006 .

[3]  Wen-Chih Peng,et al.  Dummy-Based Schemes for Protecting Movement Trajectories , 2012, J. Inf. Sci. Eng..

[4]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[5]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[6]  Rinku Dewri,et al.  Exploiting Service Similarity for Privacy in Location-Based Search Queries , 2014, IEEE Transactions on Parallel and Distributed Systems.

[7]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  Philip S. Yu,et al.  Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[9]  Marco Gruteser,et al.  USENIX Association , 1992 .

[10]  Dengfeng Li,et al.  The location privacy protection research in location-based service , 2010, 2010 18th International Conference on Geoinformatics.

[11]  Ren-Hung Hwang,et al.  A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.

[12]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[13]  Yunming Ye,et al.  A New Privacy-Preserving Scheme for Continuous Query in Location-Based Social Networking Services , 2014, Int. J. Distributed Sens. Networks.

[14]  Lin Yao,et al.  Location Anonymity Based on Fake Queries in Continuous Location-Based Services , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[15]  Anup Kumar,et al.  CLOPRO: A Framework for Context Cloaking Privacy Protection , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[16]  Mohamed F. Mokbel,et al.  Privacy in Location-Based Services: State-of-the-Art and Research Directions , 2007, 2007 International Conference on Mobile Data Management.

[17]  Jianliang Xu,et al.  2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services , 2010, IEEE Transactions on Parallel and Distributed Systems.

[18]  Li Shan Attacking Algorithms Against Continuous Queries in LBS and Anonymity Measurement , 2009 .

[19]  Elisa Bertino,et al.  Location Privacy in Moving-Object Environments , 2009, Trans. Data Priv..