Enabling Smart Anonymity Scheme for Security Collaborative Enhancement in Location-Based Services

Security enhancement is and always will be a prime concern for the deployment of point-of-interest (POI) recommendation services in mobile sensing environment. Recent tamper-proof technical protection such as strong encryption has undoubtedly become a major safeguard against threats to privacy in location-based services. Although the disclosure of location information could increase recommendation accuracy, the publication of trajectory data to untrusted entities could reveal sensitive details, e.g., daily routes, destinations, and favorite restaurants. In this paper, we propose a smart scheme named BUSA to approach the above problem by reconciling the tension between privacy protection and recommendation accuracy in location-based recommendation services. This scheme uses anonymizer agents positioned between the service-requesting users and location service providers; these agents operate by dividing the query information and using $k$ -anonymity to enhance privacy protection. The scheme also utilizes clustering techniques to group users into clusters by learning their trajectory data and selects the spatial center cells as a cluster core and a benchmark for calculating recommendations via trust computing. An anonymizer coordination strategy is proposed to replace a low-performing anonymizer with one that provides stronger privacy protection for a recommendation service. The BUSA scheme adopts $k$ -anonymity and clustering to protect privacy, and the calculated recommendation will be suitable for the cluster core that represents the entirety of users’ location preferences. The security analysis reveals that the BUSA scheme can effectively protect privacy against fraudulent query requestors and the simulation results also indicate that it provides stronger privacy protection than its counterparts from the perspective of recommendation hit rate and the extent of disclosure.

[1]  Xiaohu Tang,et al.  Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud , 2018, IEEE Transactions on Services Computing.

[2]  Victor C. M. Leung,et al.  Green Internet of Things for Smart World , 2015, IEEE Access.

[3]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[4]  Jinjun Chen,et al.  A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..

[5]  Li-zhen Cui,et al.  CEPTM: A Cross-Edge Model for Diverse Personalization Service and Topic Migration in MEC , 2018, Wirel. Commun. Mob. Comput..

[6]  Sheng Zhong,et al.  A Jointly Differentially Private Scheduling Protocol for Ridesharing Services , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Shaobo Zhang,et al.  A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..

[8]  Bo Cheng,et al.  Multi-Dimensional QoS Prediction for Service Recommendations , 2019, IEEE Transactions on Services Computing.

[9]  Chieh-Yuan Tsai,et al.  A Location-Item-Time sequential pattern mining algorithm for route recommendation , 2015, Knowl. Based Syst..

[10]  Shusen Yang,et al.  Lightweight Management of Resource-Constrained Sensor Devices in Internet of Things , 2015, IEEE Internet of Things Journal.

[11]  Qingzhong Li,et al.  Div-clustering: Exploring active users for social collaborative recommendation , 2013, J. Netw. Comput. Appl..

[12]  Chen Wang,et al.  ILLIA: Enabling $k$ -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries , 2018, IEEE Internet of Things Journal.

[13]  Panos Kalnis,et al.  A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..

[14]  Gang Sun,et al.  The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems , 2017, Cluster Computing.

[15]  Zibin Zheng,et al.  QoS-Aware Web Service Recommendation by Collaborative Filtering , 2011, IEEE Transactions on Services Computing.

[16]  Walid Gaaloul,et al.  Scientific Workflow Clustering and Recommendation Leveraging Layer Hierarchical Analysis , 2018, IEEE Transactions on Services Computing.

[17]  Xiong Luo,et al.  Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy Neural Networks for Cloud Services , 2015, IEEE Access.

[18]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[19]  Huan Liu,et al.  Content-Aware Point of Interest Recommendation on Location-Based Social Networks , 2015, AAAI.

[20]  Kim-Kwang Raymond Choo,et al.  Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..

[21]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[22]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[23]  Alfred Kobsa,et al.  Improving the prediction of users ’ disclosure behavior ... by making them disclose more predictably ? , 2014 .

[24]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[25]  Xiaolei Wang,et al.  Geospatial Web Service Sub-chain Ranking and Recommendation , 2014, 2014 IEEE International Conference on Services Computing.

[26]  Yucong Duan,et al.  Crossing Scientific Workflow Fragments Discovery Through Activity Abstraction in Smart Campus , 2018, IEEE Access.

[27]  Sabu M. Thampi,et al.  Linguistic Feature Based Filtering Mechanism for Recommending Posts in a Social Networking Group , 2018, IEEE Access.

[28]  Yan Huang,et al.  The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems , 2018, IEEE Access.

[29]  Yuan Zhang,et al.  On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for $k$ -Anonymity Location Privacy , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Tao Peng,et al.  Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..

[31]  Victor C. M. Leung,et al.  Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT , 2015, IEEE Access.

[32]  Frank Dürr,et al.  A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.

[33]  Anfeng Liu,et al.  Fog-based storage technology to fight with cyber threat , 2018, Future Gener. Comput. Syst..