An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism

In the location-based service (LBS) privacy protection, the most common and classic solution is K-anonymity, however, existing schemes rarely consider the issue that whether other mobile users are willing to provide assistance to the requesters to form the K-anonymity set, thus leading to their poor practicability. In this paper, an incentive mechanism based on credit is introduced into the distributed K-anonymity, and only providing assistance to the others, a user can gain and accumulate his credit. Based on the fuzzy logic in the soft computing, a probability threshold is introduced to reflect a user’s reputation, and only when a user’s reputation reaches this threshold, can he get the assistance from other neighbors. Security analysis shows that our scheme is secure with respect to various typical attacks. And because of not relying on a trusted third party, our scheme can avoid the security issue resulting from its breach. Extensive experiments indicate that the time to form the anonymity set is short and it increases slowly as the value of K increases. Finally, the additional traffic introduced by this scheme is very limited.

[1]  M. A. Ansari,et al.  A Survey: Soft Computing in Intelligent Information Retrieval Systems , 2012, 2012 12th International Conference on Computational Science and Its Applications.

[2]  Reza Shokri,et al.  On the Optimal Placement of Mix Zones , 2009, Privacy Enhancing Technologies.

[3]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[4]  Elisa Bertino,et al.  Privacy-Preserving and Content-Protecting Location Based Queries , 2014, IEEE Trans. Knowl. Data Eng..

[5]  P. B. Metre,et al.  Survey of soft computing techniques for joint radio resource management , 2012, 2012 International Conference on Multimedia Computing and Systems.

[6]  Xi Fang,et al.  Truthful incentive mechanisms for k-anonymity location privacy , 2013, 2013 Proceedings IEEE INFOCOM.

[7]  Taeho Jung,et al.  Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.

[8]  Minyi Guo,et al.  Long-term location privacy protection for location-based services in mobile cloud computing , 2016, Soft Comput..

[9]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[10]  Daniel J. Bernstein,et al.  Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.

[11]  Kevin Leyton-Brown,et al.  Incentives for sharing in peer-to-peer networks , 2001, EC '01.

[12]  Ja-Ling Wu,et al.  A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search , 2013, IEEE Transactions on Information Forensics and Security.

[13]  Antonio F. Gómez-Skarmeta,et al.  A soft computing based location-aware access control for smart buildings , 2014, Soft Comput..

[14]  Tanja Lange,et al.  High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.

[15]  Elisa Bertino,et al.  Privacy-Preserving and Content-Protecting Location Based Queries , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[16]  Jianliang Xu,et al.  VERDICT: Privacy-preserving authentication of range queries in location-based services , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).

[17]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[18]  Marco Gruteser,et al.  USENIX Association , 1992 .

[19]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[20]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[21]  Francesco Palmieri,et al.  Hybrid indoor and outdoor location services for new generation mobile terminals , 2014, Personal and Ubiquitous Computing.

[22]  José M. Alonso,et al.  A multiclassifier approach for topology-based WiFi indoor localization , 2013, Soft Computing.

[23]  Nick Koudas,et al.  The design of a query monitoring system , 2009, TODS.

[24]  Bobby Bhattacharjee,et al.  Bittorrent is an auction: analyzing and improving bittorrent's incentives , 2008, SIGCOMM '08.