A Dual Privacy Preserving Scheme in Continuous Location-Based Services

With the development of wireless communication and positioning technology, location-based services (LBSs) have been gaining tremendous popularity, due to its ability to greatly facilitate the people’s daily lives. Meanwhile, it also entails the risk of location privacy disclosure. To address this issue, general solutions introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information in jeopardy. In this paper, we propose a dual privacy preserving (DPP) scheme in continuous LBSs to protect the users’ trajectory and query privacy. Our scheme introduces multiple anonymizers between the users and LSP, and combines with Shamir threshold mechanism, dynamic pseudonym mechanism, and ${K}$ -anonymity technology to improve the users’ trajectory and content privacy in continuous LBSs. An anonymizer alone cannot get the users’ trajectory and query contents, and it thus can be semi-trusted. Our scheme can enhance the users’ privacy and effectively solve the single point of failure in single anonymizer structure. At the same time, the query authentication can guarantee the correctness of the query results. The analysis and simulation results demonstrate that the proposed scheme has the ability to protect users’ trajectory and content privacy effectively, and to reduce the computation and communication overhead of the single anonymizer.

[1]  Jie Wu,et al.  PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems , 2018, IEEE Communications Magazine.

[2]  Jie Wu,et al.  Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.

[3]  Qiong Huang,et al.  Privacy-Preserving Location Sharing Services for Social Networks , 2017, IEEE Transactions on Services Computing.

[4]  Qiong Huang,et al.  User-Defined Privacy Grid System for Continuous Location-Based Services , 2015, IEEE Transactions on Mobile Computing.

[5]  Jie Wu,et al.  Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..

[6]  Yaping Lin,et al.  Anonymizing popularity in online social networks with full utility , 2017, Future Gener. Comput. Syst..

[7]  Panagiotis Papadimitratos,et al.  Ieee Transactions on Dependable and Secure Computing, Special Issue on " Security and Privacy in Mobile Platforms " , 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration , 2022 .

[8]  Md Zakirul Alam Bhuiyan,et al.  Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.

[9]  Jianfeng Ma,et al.  TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Tao Peng,et al.  Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..

[11]  Kim-Kwang Raymond Choo,et al.  Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..

[12]  Hui Li,et al.  Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services , 2017, IEEE Internet of Things Journal.

[13]  Ying Cai,et al.  A Parity-Based Data Outsourcing Model for Query Authentication and Correction , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[14]  Hui Li,et al.  Protecting User Trajectory in Location-Based Services , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[15]  Xiaoqing Li,et al.  Privacy-area aware dummy generation algorithms for Location-Based Services , 2014, 2014 IEEE International Conference on Communications (ICC).

[16]  Michael Gertz,et al.  Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..

[17]  Yonghong Chen,et al.  Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.

[18]  Rong Zheng,et al.  Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[19]  Sabrina De Capitani di Vimercati,et al.  An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.

[20]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[21]  Ron Steinfeld,et al.  Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2007, IEEE Trans. Inf. Theory.

[22]  Lichun Li,et al.  EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data , 2016, IEEE Internet of Things Journal.

[23]  Michael Gertz,et al.  Authentic Third-party Data Publication , 2000, DBSec.

[24]  Dong Hoon Lee,et al.  Privacy Enhanced Location Sharing for Mobile Online Social Networks , 2020, IEEE Transactions on Sustainable Computing.

[25]  Xinwen Fu,et al.  Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.

[26]  Tao Peng,et al.  Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.

[27]  Mohamed Grissa,et al.  Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing , 2017, IEEE Transactions on Information Forensics and Security.

[28]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..

[29]  Ren-Hung Hwang,et al.  A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.

[30]  Gang Sun,et al.  The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems , 2017, Cluster Computing.