A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS

Most of the mobile phones have GPS sensors which make location based service (LBS) applicable. LBS brings not only convenience but also location privacy leak to us. Achieving anonymity and sending private queries are two main privacy-preserving courses in LBS. A novel location privacy-preserving method is proposed based on Voronoi graph partition on road networks. Firstly, based on the prediction of a user's moving direction, a cooperative k-anonymity method is proposed without constructing cloaking regions which may lead to efficiency decline in continuous query. And then, a query algorithm is proposed without providing any user's actual location, replaced by continuous anchor sequence, to LBS provider. This algorithm can work out precise results according to candidate sets returned by LBS provider and it also solves uneven distribution problem in SpaceTwist. Performance analysis and experiments show that our method achieves a preferable tradeoff between QoS and location privacy preserving; it has obvious advantages compared with other methods.

[1]  Muhammad Aamir Cheema,et al.  Efficiently processing snapshot and continuous reverse k nearest neighbors queries , 2012, The VLDB Journal.

[2]  Meng Xiao,et al.  CoPrivacy:A Collaborative Location Privacy-Preserving Method without Cloaking Region , 2011 .

[3]  Mohamed F. Mokbel,et al.  Towards Privacy-Aware Location-Based Database Servers , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).

[4]  Philip S. Yu,et al.  Mobile Systems Privacy: 'MobiPriv' A Robust System for Snapshot or Continuous Querying Location Based Mobile Systems , 2012, Trans. Data Priv..

[5]  Xing Xie,et al.  Protecting Privacy in Location-Based Services Using K-Anonymity without Cloaked Region , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[6]  Yong Wang,et al.  LBSs privacy preserving for continuous query based on semi-honest third parties , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).

[7]  Indrajit Ray,et al.  Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[8]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[9]  Marco Gruteser,et al.  USENIX Association , 1992 .

[10]  Jianliang Xu,et al.  Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2012, IEEE Transactions on Knowledge and Data Engineering.

[11]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[12]  Xiaojing Wang,et al.  Identity privacy-based reliable routing method in VANETs , 2014, Peer Peer Netw. Appl..

[13]  Chi-Yin Chow,et al.  Trajectory privacy in location-based services and data publication , 2011, SKDD.

[14]  Meng Xiaofeng,et al.  Privacy Preserving Towards Continuous Query in Location-Based Services , 2010 .

[15]  Jianliang Xu,et al.  Distortion-based anonymity for continuous queries in location-based mobile services , 2009, GIS.

[16]  Shicong Meng,et al.  Anonymizing continuous queries with delay-tolerant mix-zones over road networks , 2014, Distributed and Parallel Databases.

[17]  Ge-Ming Chiu,et al.  Path privacy protection in continuous location-based services over road networks , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[18]  Xue Jiao,et al.  A Location Privacy Preserving Approach on Road Network , 2011 .

[19]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[20]  Hyunjo Lee,et al.  Grid-based cloaking area creation scheme supporting continuous location-based services , 2012, SAC '12.

[21]  James A. Sethian,et al.  Analysis and applications of the Voronoi Implicit Interface Method , 2012, J. Comput. Phys..

[22]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[23]  Wen Tao Zhu,et al.  Protecting user anonymity in location-based services with fragmented cloaking region , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[24]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[25]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[26]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[27]  Tanzima Hashem,et al.  Countering overlapping rectangle privacy attack for moving kNN queries , 2013, Inf. Syst..

[28]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[29]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[30]  Xinwen Fu,et al.  Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.

[31]  Bin Wang,et al.  A Location Privacy Preserving Approach on Road Network: A Location Privacy Preserving Approach on Road Network , 2011 .

[32]  Xiaohui Liang,et al.  STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.

[33]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[34]  Xiaofeng Meng,et al.  CoPrivacy: A Collaborative Location Privacy-Preserving Method without Cloaking Region: CoPrivacy: A Collaborative Location Privacy-Preserving Method without Cloaking Region , 2011 .