Location privacy-protection based on p-destination in mobile social networks: A game theory analysis

k-anonymity and l-diversity are widely discussed means of controlling the degree of privacy loss when personal information is processed for data analytics. User privacy can easily be disclosed by tracking its past/future locations. In this paper, we propose a Location Privacy Protection (LPP) method which enables a trusted third party to aggregate location-aware requests based on p-destination in mobile social networks. Our LPP can prevent an attacker from associating users' identities, locations and query contents. We also propose a hide-and-seek game-theoretic model for developing defense strategies for the rational trusted third party in dealing with a rational attacker. Detailed analysis is provided for choosing strategies that maximize payoffs, and simulation results are provided to demonstrate that our proposed method protects user privacy.

[1]  Ehud D. Karnin,et al.  A Parallel Algorithm for the Knapsack Problem , 1984, IEEE Transactions on Computers.

[2]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[3]  Ezzatollah Salari,et al.  A novel Multiple Hypothesis Testing (MHT) scheme for tracking of dim objects , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).

[4]  Ren-Hung Hwang,et al.  SocialCloaking: A distributed architecture for K-anonymity location privacy protection , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[5]  Taeho Jung,et al.  Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.

[6]  Sabrina De Capitani di Vimercati,et al.  An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.

[7]  Milena Radenkovic,et al.  The quest for location-privacy in opportunistic mobile social networks , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[8]  Jianliang Xu,et al.  p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.

[9]  Karim Emara,et al.  Vehicle tracking using vehicular network beacons , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[10]  Chunlei Liu,et al.  Query-Aware Anonymization in Location-Based Service , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[11]  Jianliang Xu,et al.  Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2008, IEEE Transactions on Knowledge and Data Engineering.

[12]  Indrajit Ray,et al.  Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[13]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[14]  Marco Gruteser,et al.  USENIX Association , 1992 .

[15]  Sushil Jajodia,et al.  Preserving Anonymity of Recurrent Location-Based Queries , 2009, 2009 16th International Symposium on Temporal Representation and Reasoning.

[16]  Dimitrios Makrakis,et al.  Protecting Location Privacy with Clustering Anonymization in vehicular networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[17]  Xiaohui Liang,et al.  Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks , 2012, IEEE Transactions on Vehicular Technology.

[18]  Kyriakos Mouratidis,et al.  Anonymous Query Processing in Road Networks , 2010, IEEE Transactions on Knowledge and Data Engineering.

[19]  Xiaodong Lin,et al.  PLAM: A privacy-preserving framework for local-area mobile social networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[20]  Kien A. Hua,et al.  Query l-diversity in Location-Based Services , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[21]  Jae-Woo Chang,et al.  A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[22]  Liang Ye,et al.  MP2P Based on Social Model to Serve for LBS , 2010, 2010 International Conference on E-Business and E-Government.

[23]  Yuguang Fang,et al.  A game-theoretic approach for achieving k-anonymity in Location Based Services , 2013, 2013 Proceedings IEEE INFOCOM.