Abstract
In this paper, an optimal query strategy is proposed for location privacy in location-based services (LBSs) from a game-theoretic perspective. Distributed location privacy metrics are proposed, and a user-centric model is proposed, in which users make their own decisions to protect their location privacy. In addition, the mobile users’ cooperation is formalized as a query strategy selection optimizing problem by using the framework of Bayesian games. Based on the analysis of Bayesian Nash Equilibria, a User Query Strategy Optimization Algorithm (UQSOA) is designed to help users achieve optimized utilities. We perform simulations to assess the privacy protection effectiveness of our approach and validate the theoretical properties of the UQSOA algorithm.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Xu T & Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE
Liu X, Liu K, Guo L, Li X, & Fang Y (2013) A game-theoretic approach for achieving k-anonymity in Location Based Services. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 2985–2993
Shokri R, Theodorakopoulos G, Troncoso C, Hubaux JP & Le Boudec JY (2012) Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 617–627
Shokri R, Theodorakopoulos G, Le Boudec JY & Hubaux JP (2011) Quantifying location privacy. In: Security and Privacy (SP), 2011 I.E. Symposium on. IEEE, pp 247–262
de Montjoye YA, Hidalgo CA, Verleysen M & Blondel VD (2013) Unique in the crowd: The privacy bounds of human mobility. Sci Rep 3
Wang T, Liu L (2009) Privacy-aware mobile services over road networks. Proc VLDB Endowment 2(1):1042–1053
Kido H, Yanagisawa Y & Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Pervasive Services, 2005. ICPS’05. Proceedings. International Conference on. IEEE, pp 88–97
Chow CY & Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in Spatial and Temporal Databases. Springer Berlin Heidelberg, pp 258–275
Freudiger J, Manshaei MH, Hubaux JP & Parkes DC (2009). On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM, pp 324–337
Yang D, Xue G, Fang X, & Tang J (2012) Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, pp 173–184
Srivatsa M, & Hicks M (2012) Deanonymizing mobility traces: using social network as a side-channel. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 628–637
Tan R, Badrinath Krishna V, Yau DK, & Kalbarczyk Z (2013) Impact of integrity attacks on real-time pricing in smart grids. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, pp 439–450
Dong M, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans 97-D(10):2606–2612
Acknowledgments
The work was supported by the National Natural Science Foundation of China (No.61202099, 61372075, 61472418), the National High Technology Research and Development Program of China (863 Program) (No.2012AA101608), the Plan for Youth Backbone Teacher of Colleges and Universities in Henan Province (2013GGJS-075), the Plan for Scientific Innovation Talent of Henan University of Technology (2012CXRC05), and the Plan for Youth Backbone Teacher of Henan University of Technology.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, Wd., He, Yh., Sun, Lm. et al. An optimal query strategy for protecting location privacy in location-based services. Peer-to-Peer Netw. Appl. 9, 752–761 (2016). https://doi.org/10.1007/s12083-015-0328-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-015-0328-0