Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An optimal query strategy for protecting location privacy in location-based services

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In this paper, an optimal query strategy is proposed for location privacy in location-based services (LBSs) from a game-theoretic perspective. Distributed location privacy metrics are proposed, and a user-centric model is proposed, in which users make their own decisions to protect their location privacy. In addition, the mobile users’ cooperation is formalized as a query strategy selection optimizing problem by using the framework of Bayesian games. Based on the analysis of Bayesian Nash Equilibria, a User Query Strategy Optimization Algorithm (UQSOA) is designed to help users achieve optimized utilities. We perform simulations to assess the privacy protection effectiveness of our approach and validate the theoretical properties of the UQSOA algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Xu T & Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE

  2. Liu X, Liu K, Guo L, Li X, & Fang Y (2013) A game-theoretic approach for achieving k-anonymity in Location Based Services. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp 2985–2993

  3. Shokri R, Theodorakopoulos G, Troncoso C, Hubaux JP & Le Boudec JY (2012) Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 617–627

  4. Shokri R, Theodorakopoulos G, Le Boudec JY & Hubaux JP (2011) Quantifying location privacy. In: Security and Privacy (SP), 2011 I.E. Symposium on. IEEE, pp 247–262

  5. de Montjoye YA, Hidalgo CA, Verleysen M & Blondel VD (2013) Unique in the crowd: The privacy bounds of human mobility. Sci Rep 3

  6. Wang T, Liu L (2009) Privacy-aware mobile services over road networks. Proc VLDB Endowment 2(1):1042–1053

    Article  Google Scholar 

  7. Kido H, Yanagisawa Y & Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Pervasive Services, 2005. ICPS’05. Proceedings. International Conference on. IEEE, pp 88–97

  8. Chow CY & Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in Spatial and Temporal Databases. Springer Berlin Heidelberg, pp 258–275

  9. Freudiger J, Manshaei MH, Hubaux JP & Parkes DC (2009). On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM, pp 324–337

  10. Yang D, Xue G, Fang X, & Tang J (2012) Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, pp 173–184

  11. Srivatsa M, & Hicks M (2012) Deanonymizing mobility traces: using social network as a side-channel. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 628–637

  12. Tan R, Badrinath Krishna V, Yau DK, & Kalbarczyk Z (2013) Impact of integrity attacks on real-time pricing in smart grids. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, pp 439–450

  13. Dong M, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans 97-D(10):2606–2612

    Google Scholar 

Download references

Acknowledgments

The work was supported by the National Natural Science Foundation of China (No.61202099, 61372075, 61472418), the National High Technology Research and Development Program of China (863 Program) (No.2012AA101608), the Plan for Youth Backbone Teacher of Colleges and Universities in Henan Province (2013GGJS-075), the Plan for Scientific Innovation Talent of Henan University of Technology (2012CXRC05), and the Plan for Youth Backbone Teacher of Henan University of Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei-dong Yang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, Wd., He, Yh., Sun, Lm. et al. An optimal query strategy for protecting location privacy in location-based services. Peer-to-Peer Netw. Appl. 9, 752–761 (2016). https://doi.org/10.1007/s12083-015-0328-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0328-0

Keywords