Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3371676.3371695acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Location Privacy Protection Scheme Based on Location Services

Published: 13 January 2020 Publication History

Abstract

Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location privacy protection scheme is proposed, which includes location hiding algorithm and query privacy protection algorithm. Q-Tree storage ensures that anonymous location units are as dispersed as possible. The point of interest (POI) with higher query probability is selected as the query content of anonymous location unit, which protects the user's query privacy. At the same time, private information retrieval technology (PIR) is used to provide users with higher privacy and security protection. Finally, the effectiveness of the scheme is proved by privacy analysis and experimental results.

References

[1]
GEDIK B, LIU L. Protecting location privacy with personalized k-anonymity: architecture and algorithms [J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1--18.
[2]
PINGLY A, YU W, ZHANG N, FU X, et al. Cap: a context-aware privacy protection system for location-based services[C]// ICDCS 2009: 49--57.
[3]
LI X, ZHANG C, JUNG T, QIAN J, et al. Graph-based privacy-preserving data publication[C]//INFOCOM. 2016.
[4]
CHEN Z, HU X, JU X, et al. Lisa: location information scrambler for privacy protection on smartphones[C]//CNS. 2013.
[5]
ZHENG X, CAI Z, LI J, et al. Location-privacy-aware review publication mechanism for local business service systems[C]//International Conference on Computer Communications. IEEE, 2017: 1--9.
[6]
JIANG H, ZHAO P, WANG C. Roblop: towards robust privacy preserving against location dependent attacks in continuous lbs queries [J]. IEEE/ACM Transactions on Networking, 2018, 26(2):1018--1032.
[7]
XIAO Y, XIONG L. Protecting locations with differential privacy under temporal correlations[C]//The 22nd ACM Conference on Computer and Communications Security. 2015: 1--7.
[8]
SHOKRI R, THEODORAKOPOULOS G, BOUDEC J Y L, et al. Quantifying location privacy[C]//IEEE Security and Privacy. 2011: 247--262.
[9]
WANG J, LI Y, YANG D, et al. Achieving effective k-anonymity for query privacy in location-based services[J]. IEEE Access, 2017, 5: 24580--24592.
[10]
LI W, NIU B, LI H, et al. Privacy-preserving strategies in service quality aware location-based services[C]//IEEE International Conference on Communications. 2015: 7328--7334.
[11]
SHOKRI R, THEODORAKOPOULOS G, TRONCOSO C, et al. Protecting location privacy: optimal strategy against localization attacks[C]//Proceedings of ACM Conference on Computer and Communications Security, New York: ACM Press, 2012: 617--627.
[12]
KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing location-based identity inference in anonymous spatial queries [J]. IEEE Transactions on Knowledge & Data Engineering, 2007, 19(12): 1719--1733.
[13]
TRIPATHYB K, MAITY A, RANAJIT B, et al. A fast p-sensitive l-diversity Anonymisation algorithm[C]// Recent Advances in Intelligent Computational Systems. IEEE, 2011: 741--744.
[14]
HE X, JIN R, DAH I. Leveraging spatial diversity for privacy- aware location-based services in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(6):1524--1534.
[15]
HAO G, BINX Y. Research on privacy preserving method based on t-closeness model[C]//The International Conference on Communications in China. IEEE, 2017: 1455--1459.
[16]
MONEDERO D R, FORNE J, FERRER J D. From t-closeness-like privacy to post randomization via information theory [J]. IEEE Transactions on Knowledge and Data Engineering, 2010, 22(11): 1623--1636.
[17]
LI N H, LIT C, VENKATASUBRAMANIAN S. T-closeness: privacy beyond k-anonymity and l-diversity[C]//International Conference on Data Engineering. IEEE, 2007: 106--115.
[18]
CHEN Z, HU X, JU X, et al. Lisa: location information scrambler for privacy protection on smartphones[C]// Conference on Communications and Network Security. IEEE, 2013: 296--304.
[19]
GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services: anonymizers are not necessary[C]// Proceedings of the 2008 ACM SIGMOD international conference on management of data. New York: ACM, 2008: 121--132.

Cited By

View all
  • (2021)A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom53373.2021.00069(413-419)Online publication date: Oct-2021

Index Terms

  1. Location Privacy Protection Scheme Based on Location Services

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCNS '19: Proceedings of the 2019 9th International Conference on Communication and Network Security
    November 2019
    172 pages
    ISBN:9781450376624
    DOI:10.1145/3371676
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Tokyo
    • Chongqing University of Posts and Telecommunications

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 January 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. K-anonymity
    2. Location Service
    3. PIR
    4. Privacy Protection
    5. Q-Tree

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Science and Technology Research Project of Liaoning Provincial Education Department, China

    Conference

    ICCNS 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom53373.2021.00069(413-419)Online publication date: Oct-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media