Protecting User Privacy in Mobile Environment Using ELM-UPP

In this paper, we address the topic of user privacy preservation in mobile environment. Existing techniques mostly rely on structure-based spatial cloaking, but pay little attention to location semantic information. Yet, such information may disclose sensitive information about mobile users. Thus, we propose ELM-UPP, a semantic-awareness privacy preservation framework to protect users privacy from violation. It allows mobile users to explicitly define their preferred privacy requirements in terms of location hiding measures. To provide location semantic protection for mobile users, in our framework, two features are firstly proposed to capture the semantic of locations. Then, a ELM-based unsupervised clustering is leveraged to detect semantic homogeneity locations. Besides, we design cloaking areas that should cover different semantic locations as well as achieving high quality of service. Since the problem of calculating the optimal cloaking area is NP-hard, we design a greedy algorithm that balances quality of service and privacy requirements. Extensive experimental results show the efficiency and effectiveness of our proposed algorithm.

[1]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[4]  Lei Chen,et al.  Semantic-Aware Location Privacy Preservation on Road Networks , 2016, DASFAA.

[5]  Guang-Bin Huang,et al.  Extreme learning machine: a new learning scheme of feedforward neural networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[6]  Ling Liu,et al.  Privacy-Aware Mobile Services over Road Networks , 2009, Proc. VLDB Endow..

[7]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[8]  Stavros Papadopoulos,et al.  Nearest neighbor search with strong location privacy , 2010, Proc. VLDB Endow..

[9]  Chee Kheong Siew,et al.  Universal Approximation using Incremental Constructive Feedforward Networks with Random Hidden Nodes , 2006, IEEE Transactions on Neural Networks.

[10]  Franco Turini,et al.  Privacy Protection: Regulations and Technologies, Opportunities and Threats , 2008, Mobility, Data Mining and Privacy.

[11]  Ling Liu,et al.  MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[12]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[13]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[14]  Guang-Bin Huang,et al.  Convex incremental extreme learning machine , 2007, Neurocomputing.

[15]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[16]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[17]  Marco Gruteser,et al.  USENIX Association , 1992 .

[18]  Cheng Wu,et al.  Semi-Supervised and Unsupervised Extreme Learning Machines , 2014, IEEE Transactions on Cybernetics.

[19]  Lei Chen,et al.  Enhanced random search based incremental extreme learning machine , 2008, Neurocomputing.

[20]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.