Privacy Preserving Path Recommendation for Moving User on Location Based Service

With the increasing adoption of location based services, privacy is becoming a major concern. To hide the identity and location of a request on location based service, most methods consider a set of users in a reasonable region so as to confuse their requests. When there are not enough users, the cloaking region needs expanding to a larger area or the response needs delay. Either way degrades the quality-of-service. In this paper, we tackle the privacy problem in a predication way by recommending a privacy-preserving path for a requester. We consider the popular navigation application, where users may continuously query different location based servers during their movements. Based on a set of metrics on privacy, distance and the quality of services that a LBS requester often desires, a secure path is computed for each request according to user's preference, and can be dynamically adjusted when the situation is changed. A set of experiments are performed to verify our method and the relationship between parameters are discussed in details. We also discuss how to apply our method into practical applications.

[1]  Lei Chen,et al.  Finding time period-based most frequent path in big trajectory data , 2013, SIGMOD '13.

[2]  Keun Ho Ryu,et al.  Historical index structure for reducing insertion and search cost in LBS , 2010, J. Syst. Softw..

[3]  Suman Nath,et al.  Privacy-aware personalization for mobile advertising , 2012, CCS.

[4]  Benjamin C. M. Fung,et al.  Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..

[5]  Jinshu Su,et al.  Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[6]  Xing Xie,et al.  Destination prediction by sub-trajectory synthesis and privacy protection against such prediction , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).

[7]  Yan Liu,et al.  EBM: an entropy-based model to infer social strength from spatiotemporal data , 2013, SIGMOD '13.

[8]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[9]  Anthony Stentz,et al.  Optimal and efficient path planning for partially-known environments , 1994, Proceedings of the 1994 IEEE International Conference on Robotics and Automation.

[10]  Marco Gruteser,et al.  Framework for security and privacy in automotive telematics , 2002, WMC '02.

[11]  Benjamin C. M. Fung,et al.  Preserving Privacy for Location-Based Services with Continuous Queries , 2009, 2009 IEEE International Conference on Communications.

[12]  Chi-Yin Chow,et al.  Trajectory privacy in location-based services and data publication , 2011, SKDD.

[13]  Benjamin C. M. Fung,et al.  Differentially private transit data publication: a case study on the montreal transportation system , 2012, KDD.

[14]  Sushil Jajodia,et al.  Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.

[15]  Eduardo Mena,et al.  An approach to process continuous location-dependent queries on moving objects with support for location granules , 2011, J. Syst. Softw..

[16]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[17]  Xiaojun Ma,et al.  Path planning for privacy preserving in location based service , 2011, Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD).