Optimizational Scheme for Constructing Anonymous Spatial Region under Continuous LBS Queries

K-anonymity technology is one of the important technologies of location privacy protection based on LBS(Location-based service, LBS), it protects users' location privacy by constructing ASR(anonymous spatial region, ASR). Existing construction schemes for ASR based on continuous LBS queries giving rise to the problem of generating a large ASR, which increases query latency and server load, thus affect the QoS(quality of service, QoS) of users. Considering the shortages of existing ASR construction schemes for continuous LBS queries and the influence of aggregation property and moving directions of historical users in ASR, a new ASR construction scheme is proposed in this paper by selecting regions with high frequency of users and introducing the idea of ASR segmentation. The experimental results show that this scheme can further reduce the ASR and improve the QoS under the premise of satisfying users' location privacy demands. Keywords-continuous LBS queries; user aggregation; ASR segmentation; QoS

[1]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[2]  Ying Cai,et al.  Feeling-based location privacy protection for location-based services , 2009, CCS.

[3]  Heng Liu,et al.  Location privacy in sparse environment , 2010, 2010 2nd International Conference on Advanced Computer Control.

[4]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[5]  Jianfeng Ma,et al.  A demand-aware location privacy protection scheme in continuous location-based services , 2014, 2014 International Conference on Connected Vehicles and Expo (ICCVE).

[6]  Xing Xie,et al.  GeoLife2.0: A Location-Based Social Networking Service , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[7]  Chao Zhang,et al.  L2P2: Location-aware location privacy protection for location-based services , 2012, 2012 Proceedings IEEE INFOCOM.

[8]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[9]  Zhou Ao Location-Based Services: Architecture and Progress , 2011 .

[10]  Marco Gruteser,et al.  USENIX Association , 1992 .

[11]  Zhang Yuhan,et al.  Location-cloaking algorithm based on grid-divided space , 2012 .

[12]  Kyriakos Mouratidis,et al.  Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity , 2009, SSTD.