X-Region: A framework for location privacy preservation in mobile peer-to-peer networks

While enjoying various LBS location-based services, users also face the threats of location privacy disclosure. This is because even if the communications between users and LBS providers can be encrypted and anonymized, the sensitive information inside LBS queries may disclose the exact location or even the identity of a user. The existing research on location privacy preservation in mobile peer-to-peer P2P networks assumed that users trust each other and directly share location information with each other. Nonetheless, this assumption is not practical for most of the mobile P2P scenarios, for example, an adversary can pretend to be a normal user and collect the locations of other users. Aiming at this issue, this paper presents x-region as a solution to preserve the location privacy in a mobile P2P environment where no trust relationships are assumed amongst mobile users. The main idea is to allow users to share a blurred region known as x-region instead of their exact locations so that one cannot distinguish any user from others inside the region. We propose a theoretical metric for measuring the anonymity property of x-region, together with three algorithms for generating an x-region, namely, benchmark algorithm, weighted expanding algorithm, and aggressive weighted expanding algorithm. These algorithms achieve the anonymity and QoS requirements with different strategies. Our experiments verify the performance of the algorithms against three key metrics. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Saroj Kaushik,et al.  A Survey on LBS: System Architecture, Trends and Broad Research Areas , 2011, DNIS.

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Xiaoyan Hong,et al.  An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[4]  Chi-Yin Chow,et al.  Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.

[5]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[6]  Behrouz Minaei-Bidgoli,et al.  Modeling and analysis of access transparency and scalability in P2P distributed systems , 2014, Int. J. Commun. Syst..

[7]  Xu Ji,et al.  Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks , 2010, 2010 International Conference on Information Science and Applications.

[8]  Jung-Shian Li,et al.  A hidden mutual authentication protocol for low-cost RFID tags , 2011, Int. J. Commun. Syst..

[9]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[10]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[11]  Chun Chen,et al.  Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..

[12]  Thomas Brinkhoff,et al.  A Framework for Generating Network-Based Moving Objects , 2002, GeoInformatica.

[13]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[14]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[15]  Xiaoyan Hong,et al.  SALS: semantics-aware location sharing based on cloaking zone in mobile social networks , 2012, MobiGIS.

[16]  Elisa Bertino,et al.  Anonymous Geo-Forwarding in MANETs through Location Cloaking , 2008, IEEE Transactions on Parallel and Distributed Systems.

[17]  Kang G. Shin,et al.  Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.

[18]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[19]  Andrew J. Blumberg,et al.  Privacy and accountability for location-based aggregate statistics , 2011, CCS '11.

[20]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[21]  Milos Borenovic,et al.  Multi-system-multi-operator localization in PLMN using neural networks , 2012, Int. J. Commun. Syst..

[22]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[23]  Cheng-Chi Lee,et al.  A new privacy and authentication protocol for end-to-end mobile users , 2003, Int. J. Commun. Syst..

[24]  Liviu Iftode,et al.  Privately querying location-based services with SybilQuery , 2009, UbiComp.

[25]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[26]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[27]  Panagiotis Papadimitratos,et al.  Collaborative Location Privacy , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[28]  Panos Kalnis,et al.  MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.

[29]  Xiaoyan Hong,et al.  A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[30]  Hong Jun Jang,et al.  Nearest surrounder searching in mobile computing environments , 2013, Int. J. Commun. Syst..

[31]  Tetsuji Satoh,et al.  Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[32]  Xiaoyan Hong,et al.  LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[33]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[34]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[35]  Marco Gruteser,et al.  USENIX Association , 1992 .

[36]  Haibo Hu,et al.  Range Nearest-Neighbor Query , 2006, IEEE Trans. Knowl. Data Eng..