Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy

The Internet of Things (IoT) connects a huge number of different types of sensing devices, with capabilities ranging from very high to very low, enabling them to communicate and share many types of collected data. Among the different types of data, location information is particularly important as it is needed to create a smart environment that can greatly increase the quality of human life. However, the issue of location privacy has been intensified by the new properties introduced by the IoT. We have thus developed a scheme for protecting location privacy that can be deployed in low-capability user devices and run in a distributed IoT system without a trusted server. In this "lightweight collaborative semantic scheme," each user device stores only a portion of the map data and shares information with the other user devices to generate an obfuscated region that includes only accessible locations. Testing demonstrated that this scheme is practical for generating a location-protection region and that it has acceptable performance.

[1]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[2]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[3]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[4]  Elisa Bertino,et al.  Protecting Location Privacy through Semantics-aware Obfuscation Techniques , 2008, IFIPTM.

[5]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[6]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[7]  Xing Xie,et al.  GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory , 2010, IEEE Data Eng. Bull..

[8]  Wei-Ying Ma,et al.  Understanding mobility based on GPS data , 2008, UbiComp.

[9]  Karen Renaud,et al.  Privacy of the Internet of Things: A Systematic Literature Review , 2016, HICSS.

[10]  Tran Khanh Dang,et al.  Bob-Tree: An Efficient B + -Tree Based Index Structure for Geographic-Aware Obfuscation , 2011, ACIIDS.

[11]  Qiangfu Zhao,et al.  Privacy preserving infrared sensor array based indoor location awareness , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[12]  Tao Peng,et al.  Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..

[13]  Axel Küpper Location-based services , 2005 .

[14]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[15]  Elena Simona Lohan,et al.  Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.

[16]  Mohamed F. Mokbel,et al.  Privacy in Location-Based Services: State-of-the-Art and Research Directions , 2007, 2007 International Conference on Mobile Data Management.

[17]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[18]  Xing Xie,et al.  Mining interesting locations and travel sequences from GPS trajectories , 2009, WWW '09.