Anonymous Spatial Query on Non-Uniform Data

Location and local service is one of the hottest bunches of applications in recent years, due to the proliferation of Global Position System GPS and mobile web search technology. Spatial queries retrieving neighboring Point-Of-Interests POI require actual user locations for services. However, exposing the physical location of querier to service system may pose privacy threat to users, if malicious adversary has access to the system. To hinder the service system from obtaining the "true" location of querier, current obfuscation-based approach requires a trusted third party anonymizer. As for the data-encryption-based and cPIR-based approaches, they incur costly computation overheads. Although the secure hardware-aided PIR-based technique has been shown to be superior to formers, it did not consider the characteristics of data distribution of searching domain. To deal with the problem of non-uniform data distribution and efficient retrieval, we propose four schemes: MSQL, NSQL, MNSQL, MHBL, based on flexible multi-layer grids, non-empty lookup table and Hilbert space-filling curve for efficient storage and retrieval of POI data, so that improved performance of PIR-based techniques could be achieved. Numerical experiments demonstrate that the proposed techniques indeed deliver better efficiency under various criteria.

[1]  Rafail Ostrovsky,et al.  Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[2]  David Taniar,et al.  Constrained range search query processing on road networks , 2011, Concurr. Comput. Pract. Exp..

[3]  Robert H. Deng,et al.  Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..

[4]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[5]  Geng Zhao,et al.  Path $k\hbox{NN}$ Query Processing in Mobile Systems , 2013, IEEE Transactions on Industrial Electronics.

[6]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[7]  Elisa Bertino,et al.  Controlling data disclosure in computational PIR protocols , 2010, ASIACCS '10.

[8]  David Taniar,et al.  Spatial Network RNN Queries in GIS , 2011, Comput. J..

[9]  David Taniar,et al.  Reverse k Nearest Neighbor and Reverse Farthest Neighbor Search on Spatial Networks , 2009, Trans. Large Scale Data Knowl. Centered Syst..

[10]  David Taniar,et al.  Voronoi-based reverse nearest neighbor query processing on spatial networks , 2009, Multimedia Systems.

[11]  Felipe Saint-Jean Java Implementation of a Single-Database Computationally Symmetric Private Information Retrieval (cSPIR) Protocol , 2005 .

[12]  Cyrus Shahabi,et al.  Location privacy: going beyond K-anonymity, cloaking and anonymizers , 2011, Knowledge and Information Systems.

[13]  Dmitri Asonov Querying Databases Privately: A New Approach to Private Information Retrieval , 2004, Lecture Notes in Computer Science.

[14]  Haibo Hu,et al.  Range Nearest-Neighbor Query , 2006, IEEE Trans. Knowl. Data Eng..

[15]  David Taniar,et al.  Voronoi-based multi-level range search in mobile navigation , 2011, Multimedia Tools and Applications.

[16]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[17]  David Taniar,et al.  Bichromatic Reverse Nearest-Neighbor Search in Mobile Systems , 2010, IEEE Systems Journal.

[18]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[19]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[20]  David Taniar,et al.  Voronoi-based range and continuous range query processing in mobile databases , 2011, J. Comput. Syst. Sci..

[21]  David Taniar,et al.  Voronoi-Based Continuous $k$ Nearest Neighbor Search in Mobile Navigation , 2011, IEEE Transactions on Industrial Electronics.

[22]  Kyriakos Mouratidis,et al.  Conceptual partitioning: an efficient method for continuous nearest neighbor monitoring , 2005, SIGMOD '05.

[23]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[24]  Stavros Papadopoulos,et al.  Nearest neighbor search with strong location privacy , 2010, Proc. VLDB Endow..

[25]  Divyakant Agrawal,et al.  Generalizing PIR for Practical Private Retrieval of Public Data , 2010, DBSec.

[26]  Lars Kulik,et al.  Simulation of Obfuscation and Negotiation for Location Privacy , 2005, COSIT.

[27]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.