Skip to main content

Adjustable Location Privacy-Preserving Nearest Neighbor Query Method

  • Conference paper
  • First Online:
Web Information Systems and Applications (WISA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11817))

Included in the following conference series:

  • 1993 Accesses

Abstract

Location-based services facilitate the daily life of the people, nevertheless, they also bring about the problem of privacy preserving. Privacy preserving methods without anonymity server, for example, Coprivacy, attract increasing concerning from researchers for their simple and reliable structure and the avoidance of high cost of communication and computing resulting from the using of cloaking area. The drawbacks of Coprivacy are the high cost of communication and computing and the uncontrollability during query period. A feedback based incremental nearest neighbor query method (FINN) is propose to solve the problem. The user sends feedback to the server according to the query, and the server chooses POIs to send to the user according to the feedback. Theoretical analysis and experimental results show that FINN can improve the performance of the system significantly while ensures user’s anonymous requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)

    Article  Google Scholar 

  2. Um, J.-H., Kim, H.-D., Chang, J.-W.: An advanced cloaking algorithm using Hilbert curves for anonymous location based service. In: Proceedings of 2010 IEEE Second International Conference on Social Computing, pp. 1093–1098 (2010)

    Google Scholar 

  3. Hossain, A.-A., Hossain, A., Yoo, H.-K., Chang, J.-W.: H-star: Hilbert-order based star network expansion cloaking algorithm in road networks. In: Proceedings of IEEE 14th International Conference on Computational Science and Engineering (CSE), pp. 81–88, August 2011

    Google Scholar 

  4. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42 (2003)

    Google Scholar 

  5. Wu, J., Ni, W., Zhang, S.: Generalization based privacy-preserving provenance publishing. In: Meng, X., Li, R., Wang, K., Niu, B., Wang, X., Zhao, G. (eds.) WISA 2018. LNCS, vol. 11242, pp. 287–299. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02934-0_27

    Chapter  Google Scholar 

  6. Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189 (2004)

    Google Scholar 

  7. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Pervasive Services, Proceedings of International Conference, pp. 88–97 (2005)

    Google Scholar 

  8. Yiu, M.L., Jensen, C.S., Huang, X.G., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: IEEE 24th International Conference on Data Engineering, pp. 366–375 (2008)

    Google Scholar 

  9. Huang, Y., Huo, Z., Meng, X.: CoPrivacy: a collaborative location privacy-preserving method without cloaking region. Chin. J. Comput. 34(10), 1975–1985 (2001). (in Chinese)

    Google Scholar 

  10. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mobile Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  11. Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4), 1–45 (2009)

    Article  Google Scholar 

  12. Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_14

    Chapter  Google Scholar 

  13. Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. Proc. VLDB Endow. 3(1–2), 619–629 (2010)

    Article  Google Scholar 

  14. Paulet, R., Kaosar, M.G., Yi, X., Bertino, E.: Privacy-preserving and content-protecting location based queries. In: Kementsietsidis, A., Salles, M.A.V. (eds.) Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), pp. 44–53. IEEE Computer Society, Los Alamitos (2012)

    Google Scholar 

  15. Brinkhoff, T.: A framework for generating network based moving objects. GeoInformatica 6(2), 153–180 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Linfeng Xie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, L., Feng, Z., Ji, C., Zhu, Y. (2019). Adjustable Location Privacy-Preserving Nearest Neighbor Query Method. In: Ni, W., Wang, X., Song, W., Li, Y. (eds) Web Information Systems and Applications. WISA 2019. Lecture Notes in Computer Science(), vol 11817. Springer, Cham. https://doi.org/10.1007/978-3-030-30952-7_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30952-7_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30951-0

  • Online ISBN: 978-3-030-30952-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics