Preserving Privacy for Location-Based Services with Continuous Queries

Location-based service (LBS) is gaining momentum as GPS-equipped mobile devices become increasingly affordable and popular. One of the potential obstacles faced by LBS is that users may raise concerns about their personal privacy when location data are sent to a distrusted LBS provider. A well-known solution is to render the location data less accurate through spatial or temporal cloaking. In this paper, we show that by combining consecutive location data including speed, heading direction, and cloaked locations, an adversary can obtain more accurate estimation of the actual location. We propose a solution to prevent such inferences by cloaking speed and direction. Since the cloaking is based on estimated future locations, we devise methods for tolerating errors caused by the estimation process. We report simulation results on the tradeoff between the capability of tolerating errors and the degree of cloaking.

[1]  Ian Goldberg,et al.  Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.

[2]  Ying Cai,et al.  Location anonymity in continuous location-based services , 2007, GIS.

[3]  Lars Kulik Privacy for real-time location-based services , 2009, SIGSPACIAL.

[4]  Jae-Woo Chang,et al.  A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based Services , 2009, 2009 11th IEEE International Conference on High Performance Computing and Communications.

[5]  Alissa Cooper,et al.  Binding privacy rules to location on the web , 2009, LOCWEB '09.

[6]  Jianliang Xu,et al.  A Cloaking Algorithm Based on Spatial Networks for Location Privacy , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[7]  Gabriel Ghinita Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy , 2009, Trans. Data Priv..

[8]  Agusti Solanas,et al.  A TTP-free protocol for location privacy in location-based services , 2008, Comput. Commun..

[9]  Sushil Jajodia,et al.  Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases , 2007, Secure Data Management.

[10]  Romit Roy Choudhury,et al.  Realtime location privacy via mobility prediction: creating confusion at crossroads , 2009, HotMobile '09.

[11]  Panos K. Chrysanthis,et al.  Proceedings of the 6th international conference on Mobile data management , 2003 .

[12]  M. Gruteser,et al.  Non-Inference: An Information Flow Control Model for Location-based Services , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.

[13]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[14]  Doo-Kwon Baik,et al.  An anonymous communication model for privacy-enhanced location based service using an echo agent , 2009, ICUIMC '09.

[15]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[16]  Thomas Brinkhoff,et al.  A Framework for Generating Network-Based Moving Objects , 2002, GeoInformatica.

[17]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 1, Basic Tools , 2001 .

[18]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[19]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[20]  Gabriel Ghinita Understanding the privacy-efficiency trade-off in location based queries , 2008, SPRINGL '08.

[21]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[22]  Yufei Tao,et al.  Continuous Nearest Neighbor Search , 2002, VLDB.

[23]  Hui Xiong,et al.  Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.

[24]  Francis Y. L. Chin,et al.  Security problems on inference control for SUM, MAX, and MIN queries , 1986, JACM.

[25]  Jianliang Xu,et al.  p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.

[26]  Lien Fa Lin,et al.  Continuous nearest neighbor search , 2008 .

[27]  Frank Stajano Security in Pervasive Computing , 2003, SPC.

[28]  Jon M. Kleinberg,et al.  Auditing Boolean attributes , 2003, J. Comput. Syst. Sci..

[29]  X. S. Wang,et al.  Preserving Anonymity in Location-based Services When Requests from the Same Issuer May Be Correlated , 2007 .

[30]  Nina Mishra,et al.  Simulatable auditing , 2005, PODS.

[31]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[32]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[33]  Jeffrey D. Ullman,et al.  A model of statistical database their security , 1977, TODS.

[34]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[35]  Frank Stajano Security in Pervasive Computing (Abstract of Invited Talk) , 2004 .

[36]  Yan Huang,et al.  Cloaking locations for anonymous location based services: a hybrid approach , 2009, GeoInformatica.

[37]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[38]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[39]  Chi-Yin Chow,et al.  Privacy in location-based services: a system architecture perspective , 2009, SIGSPACIAL.

[40]  Aziz Mohaisen,et al.  Privacy in Location Based Services: Primitives Toward the Solution , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[41]  Nick Roussopoulos,et al.  K-Nearest Neighbor Search for Moving Query Point , 2001, SSTD.

[42]  Liviu Iftode,et al.  Non-Inference: An Information Flow Control Model for Location-based Services , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[43]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[44]  Urs Hengartner,et al.  Hiding Location Information from Location-Based Services , 2007, 2007 International Conference on Mobile Data Management.

[45]  M.O. Gheorghita,et al.  Location Privacy in Chain-Based Protocols for Location-Based Services , 2008, 2008 The Third International Conference on Digital Telecommunications (icdt 2008).

[46]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[47]  Wang-Chien Lee,et al.  Search continuous nearest neighbors on the air , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[48]  Marco Gruteser,et al.  On the Anonymity of Periodic Location Samples , 2005, SPC.

[49]  Steven P. Reiss Security in Databases: A Combinatorial Study , 1979, JACM.

[50]  Marco Gruteser,et al.  USENIX Association , 1992 .

[51]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[52]  Vijayalakshmi Atluri,et al.  A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[53]  Gultekin Özsoyoglu,et al.  Auditing for secure statistical databases , 1981, ACM '81.

[54]  Panos Kalnis,et al.  Providing K-Anonymity in location based services , 2010, SKDD.

[55]  Bart Preneel,et al.  Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.

[56]  Richard J. Lipton,et al.  Secure databases: protection against user influence , 1979, TODS.

[57]  Thomas F. La Porta,et al.  A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice , 2009, IEEE Transactions on Mobile Computing.

[58]  Jing Xu,et al.  A Method for Privacy Protection in Location Based Services , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.