Using Location-Labeling for Privacy Protection in Location-Based Services

The developments in positioning and mobile communication technology have made applications that use location-based services (LBS) increasingly popular. For privacy reasons and due to lack of trust in the LBS provider, k-anonymity and l-diversity techniques have been widely used to preserve user privacy in distributed LBS architectures. However, in reality, there exist scenarios where the user locations are identical or similar/near each other. In such a scenario the k locations selected by k-anonymity technique are the same and location privacy can be easily compromised or leaked. To address the issue of privacy protection, in this paper, we propose the concept of location-labels to distinguish mobile user locations to sensitive locations and ordinary locations. We design a location-label based (LLB) algorithm for protecting location privacy while minimizing the query response time of LBS. We also evaluate the performance and validate the correctness of the proposed algorithm through extensive simulations.

[1]  Kang G. Shin,et al.  LISA: Location information ScrAmbler for privacy protection on smartphones , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[2]  Jie Yang,et al.  Multi-lateral privacy-preserving localization in pervasive environments , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[3]  Qinghua Li,et al.  A novel attack to spatial cloaking schemes in location-based services , 2015, Future Gener. Comput. Syst..

[4]  Xiaodong Lin,et al.  FINE: A fine-grained privacy-preserving location-based service framework for mobile devices , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[5]  Hui Li,et al.  A personalized two-tier cloaking scheme for privacy-aware location-based services , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[6]  Benjamin C. M. Fung,et al.  Walking in the crowd: anonymizing trajectory data for pattern analysis , 2009, CIKM.

[7]  Xiaodong Lin,et al.  PLAM: A privacy-preserving framework for local-area mobile social networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[8]  Peng Liu,et al.  A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[9]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[10]  Zan Li,et al.  MobiCache: When k-anonymity meets cache , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[11]  Chih-Ming Hsiao,et al.  The improvement of ID-based remote user authentication scheme using bilinear pairings , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).

[12]  Hirozumi Yamaguchi,et al.  UPL: Opportunistic Localization in Urban Districts , 2013, IEEE Transactions on Mobile Computing.

[13]  Limin Sun,et al.  Achieving privacy preservation in WiFi fingerprint-based localization , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[14]  Sushil Jajodia,et al.  Anonymity in Location-Based Services: Towards a General Framework , 2007, 2007 International Conference on Mobile Data Management.

[15]  Man Lung Yiu,et al.  Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services , 2015, IEEE Transactions on Knowledge and Data Engineering.

[16]  Xi Fang,et al.  Truthful incentive mechanisms for k-anonymity location privacy , 2013, 2013 Proceedings IEEE INFOCOM.