VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services

Portable devices today are striding computation potential and memory at par and sometimes even significantly higher than those found in desktop machines. Today’s lifestyle is more mobile than earlier, offices are open cafe houses and people prefer to work from plug and play office spaces. With the exponential growth of mobile technology and its users, a more astute system is in place called ‘location based services’ (LBSs). Since client uses these services out of their dynamic or static working behavior and is required to submit the real location (with query) to get the absolute benefits, it is crucial to layout the systems and frameworks which can protect users from the security and privacy threats by keeping the location information private. Existing defense mechanisms based on trusted third party possesses the significant vulnerability to vicinity identification, which in turn end up identifying the real world identity of the query issuer. In this paper, we present a scheme to preserve location privacy, called VIC-PRO, that fortifies the location privacy of the client alongside vicinity protection using geometrical transformations. We experimentally compare the scheme with other existing mechanisms to demonstrate that VIC-PRO is more efficient, safe against vicinity identification attack, and guarantees better user privacy in an LBS setup.

[1]  Mohamed F. Mokbel,et al.  Privacy in Location-Based Services: State-of-the-Art and Research Directions , 2007, 2007 International Conference on Mobile Data Management.

[2]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[3]  Rinku Dewri,et al.  Exploiting Service Similarity for Privacy in Location-Based Search Queries , 2014, IEEE Transactions on Parallel and Distributed Systems.

[4]  Jin Zhao,et al.  DeCache: A decentralized two-level cache for mobile location privacy protection , 2014, 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN).

[5]  William J. Buchanan,et al.  A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services , 2013, Mob. Networks Appl..

[6]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[8]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[9]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[10]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[11]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[12]  Romit Roy Choudhury,et al.  Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.

[13]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[14]  Sushil Jajodia,et al.  Anonymity and Historical-Anonymity in Location-Based Services , 2009, Privacy in Location-Based Applications.

[15]  Elisa Bertino,et al.  The PROBE Framework for the Personalized Cloaking of Private Locations , 2010, Trans. Data Priv..

[16]  Ruchika Gupta,et al.  An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey , 2017, Wirel. Pers. Commun..

[17]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[18]  Bernhard Hofmann-Wellenhof,et al.  GNSS - Global Navigation Satellite Systems: GPS, GLONASS, Galileo, and more , 2007 .

[19]  Marco Gruteser,et al.  USENIX Association , 1992 .

[20]  Panos Kalnis,et al.  MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.

[21]  M. Pauline Baker,et al.  Computer graphics with OpenGL , 1986 .

[22]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.