Abstract
In location based services, users can request interesting services around them at any time and anywhere through mobile devices. They need to send their locations to get the service, which may cause the disclosure of their location privacy. In order to protect the location privacy, a typical way is to convert the specific location into a location area. After finding the interest points around the region, the server needs to refine the result set to get the exact result of the query. In this article, we extended the existing kNN query algorithm based on the circular region, and proposed an algorithm called EkCRNN. This algorithm used an anonymous server to exchange information between the user and the LBS server. We compared two algorithms through experiments, and the experimental results show that our algorithm has higher accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3), 1–27 (2015)
Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: International Conference on World Wide Web, pp. 237–246 (2008)
Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4), 1–48 (2009)
Du, J., Xu, J., Tang, X., Hu, H.: iPDA: supporting privacy-preserving location-based mobile services. In: International Conference on Mobile Data Management, pp. 212–214 (2007)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)
Hashem, T., Kulik, L., Zhang, R.: Countering overlapping rectangle privacy attack for moving kNN queries. Elsevier Science Ltd. (2013)
Hu, H., Xu, J.: Non-exposure location anonymity. In: IEEE International Conference on Data Engineering, pp. 1120–1131 (2009)
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)
Kalnis, P., et al.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19, 1719–1733 (2007)
Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_14
Lv, Y., et al.: An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171(C), 9–22 (2016)
Ma, T., et al.: LED: a fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207, 488–500 (2016)
Ma, T., Ying, C., Ying, C., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M.: Detect structural-connected communities based on BSCHEF in C-DBLP. Concurr. Comput. Pract. Exp. 28(2), 311–330 (2016)
Ma, T., et al.: KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12), 1165–1184 (2015)
Ma, T., et al.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. 98(4), 902–910 (2015)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: International Conference on Very Large Data Bases, pp. 763–774 (2006)
Niu, B., Zhu, X., Li, Q., Chen, J., Li, H.: A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49(C), 125–132 (2015)
Niu, B., Zhu, X., Li, W., Li, H., Wang, Y., Lu, Z.: A personalized two-tier cloaking scheme for privacy-aware location-based services. In: International Conference on Computing, Networking and Communications, pp. 94–98 (2015)
Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attack in mobile services. In: ACM Conference on Information and Knowledge Management, pp. 1475–1476 (2008)
Rong, H., Ma, T., Tang, M., Cao, J.: A novel subgraph \(k^{+}\)-isomorphism method in social network based on graph similarity detection. Soft Comput. 22(8), 2583–2601 (2018)
Shokri, R., Theodorakopoulos, G., Le Boudec, J.Y., Hubaux, J.P.: Quantifying location privacy. In: Security and Privacy, pp. 247–262 (2011)
Stenneth, L., Yu, P.S., Wolfson, O.: Mobile systems location privacy: MobiPriv a robust k anonymous system. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 54–63 (2010)
Um, J.H., Kim, Y.K., Lee, H.J., Jang, M., Chang, J.W.: k-Nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services. J. Syst. Archit. 58(9), 354–371 (2012)
Wang, H.S., Zhou, H.Y.: Development of tourism geographic information system based on Baidu map API. Mod. Comput. 23, 16 (2012)
Xu, J., Tang, X., Hu, H., Du, J.: Privacy-conscious location-based queries in mobile environments. IEEE Trans. Parallel Distrib. Syst. 21(3), 313–326 (2010)
Acknowledgement
This work was supported in part by National Science Foundation of China (No. 61572259, No. U1736105) and Special Public Sector Research Program of China (No. GYHY201506080) and was also supported by PAPD.
This research project was supported by a grant from the Research Center of the Female Scientific and Medical Colleges, Deanship of Scientific Research, King Saud University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, H., Ma, T., Jia, J., Tian, Y., Al-Rodhaan, M. (2018). EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)