DGS-HSA: A Dummy Generation Scheme Adopting Hierarchical Structure of the Address

With the increasing convenience of location-based services (LBSs), there have been growing concerns about the risk of privacy leakage. We show that existing techniques fail to defend against a statistical attack meant to infer the user’s location privacy and query privacy, which is due to continuous queries that the same user sends in the same location in a short time, causing the user’s real location to appear consecutively more than once and the query content to be the same or similar in the neighboring query. They also fail to consider the hierarchical structure of the address, so locations in an anonymous group may be located in the same organization, resulting in leaking of the user’s organization information and reducing the privacy protection effect. This paper presents a dummy generation scheme, considering the hierarchical structure of the address (DGS-HSA). In our scheme, we introduce a novel meshing method, which divides the historical location dataset according to the administrative region division. We also choose dummies from the historical location dataset with the two-level grid structure to realize the protection of the user’s location, organization information, and query privacy. Moreover, we prove the feasibility of the presented scheme by solving the multi-objective optimization problem and give the user’s privacy protection parameters recommendation settings, which balance the privacy protection level and system overhead. Finally, we evaluate the effectiveness and the correctness of the DGS-HSA through theoretical analysis and extensive simulations.

[1]  Chi-Yin Chow,et al.  Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.

[2]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[3]  Xing Xie,et al.  GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory , 2010, IEEE Data Eng. Bull..

[4]  Yang Xin,et al.  An Efficient Approach for LBS Privacy Preservation in Mobile Social Networks , 2019 .

[5]  Takahiro Hara,et al.  Dummy Generation Based on User-Movement Estimation for Location Privacy Protection , 2018, IEEE Access.

[6]  Lichun Li,et al.  EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data , 2016, IEEE Internet of Things Journal.

[7]  Long Hu,et al.  ASA: Against statistical attacks for privacy-aware users in Location Based Service , 2017, Future Gener. Comput. Syst..

[8]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[9]  Ralph E. Gomory,et al.  An algorithm for integer solutions to linear programs , 1958 .

[10]  Gang Sun,et al.  L2P2: A location-label based approach for privacy preserving in LBS , 2017, Future Gener. Comput. Syst..

[11]  Konstantinos Demertzis,et al.  A Computational Intelligence System Identifying Cyber-Attacks on Smart Energy Grids , 2018 .

[12]  Sven Dietrich,et al.  Detecting zero-day attacks using context-aware anomaly detection at the application-layer , 2017, International Journal of Information Security.

[13]  Yan Huang,et al.  Cloaking locations for anonymous location based services: a hybrid approach , 2009, GeoInformatica.

[14]  Cyrus Shahabi,et al.  Location privacy: going beyond K-anonymity, cloaking and anonymizers , 2011, Knowledge and Information Systems.

[15]  Benjamin Recht,et al.  Probability of unique integer solution to a system of linear equations , 2011, Eur. J. Oper. Res..

[16]  Hui Li,et al.  Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services , 2017, IEEE Internet of Things Journal.

[17]  Takahiro Hara,et al.  Dummy-Based User Location Anonymization Under Real-World Constraints , 2016, IEEE Access.