Dummy Based Privacy Preservation in Continuous Querying Road Network Services

Dummies are useful for improving success rate because they can be always available, however, using dummies have two main challenges. The first is how to generate a dummy that is indistinguishable from a real user especially on road networks which have varied movement trends. Secondly, dummies can be used to launch attacks on the location based server by malicious clients which affects the business of the service providers. In this paper, we propose a novel client orientated privacy preserving scheme for continuously querying road network service that is also capable of protecting location based servers from attacks. We employed an offline trajectory clustering algorithm that clustered users' trajectory and used the derived parameters to generate a cost effective reusable realistic dummies on road network. To overcome malicious clients using dummies to launch attacks on location based servers, we developed a privacy preserving verification protocol capable of checking the activities of all clients in privacy preserving manner to curb such attacks. We tested the efficiency of our algorithm with some defined evaluation metrics, and it provided an effective privacy protection, satisfied clients at all times within an excellent processing time at a reasonable dummy processing cost when continuously querying road network services.

[1]  Ling Liu,et al.  Privacy-Aware Mobile Services over Road Networks , 2009, Proc. VLDB Endow..

[2]  Chi-Yin Chow,et al.  Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.

[3]  Fumiaki Sato,et al.  A Hybrid Method of User Privacy Protection for Location Based Services , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.

[4]  Khalil El-Khatib,et al.  Privacy Preserving Scheme for Location-Based Services , 2012, J. Information Security.

[5]  Emmanouil Magkos,et al.  Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey , 2011, Int. J. Inf. Technol. Syst. Approach.

[6]  Ling Liu,et al.  On map matching of wireless positioning data: a selective look-ahead approach , 2010, GIS '10.

[7]  Agusti Solanas,et al.  A TTP-free protocol for location privacy in location-based services , 2008, Comput. Commun..

[8]  Hua Lu,et al.  PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.

[9]  Xinwen Fu,et al.  Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.

[10]  Priti Jagwani,et al.  Taxonomy of Dummy Generation Techniques for Preserving Location Privacy , 2013 .

[11]  Chris Clifton,et al.  A Guide to Differential Privacy Theory in Social Network Analysis , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[12]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[13]  Ling Liu,et al.  NEAT: Road Network Aware Trajectory Clustering , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[14]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[15]  Hao Zhou,et al.  Preserving location privacy for location-based services with continuous queries on road network , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[16]  Jae-Woo Chang,et al.  Spatial Cloaking Method Based on Reciprocity Property for Users' Privacy in Road Networks , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.