Skip to main content

A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries

  • Conference paper
  • First Online:
Book cover Wireless Algorithms, Systems, and Applications (WASA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

Abstract

In the continuous location-based service (LBS) queries, the trajectory k-anonymity method that incorporates user’s moving trend is becoming popular because of its high quality of service (QoS). The existing works often apply user’s moving direction to represent the user’s moving trend. However, the query destinations of the users with closer moving directions are not necessarily closer. As a result, the users in a cloaked set may diverge with the proceeding of the continuous queries, leading to large cloaked areas as well as a reduction of QoS. Therefore, in this paper, a new concept named “location similarity of query destination (LS-QD)”, is proposed to reflect user’s global moving trend. By incorporating LS-QD, we develop a novel trajectory k-anonymity method for continuous LBS queries. Our system architecture utilizes a quadtree model with a pyramid structure to construct the user cloaked sets conveniently. Both theoretical analysis and simulation experiments are carried out to evaluate the robustness and security performance of our proposed method. Compared with other existing methods, our LS-QD based k-anonymity method can reduce the cloaking area and cloaking time while increasing the cloaking success ratio by about 40%–70%, which demonstrates its superiority in guaranteeing QoS for continuous LBS queries.

L. Zhang and S. Zhu—Both authors contributed equally to this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yan, B., Yu, J., Yang, M., Jiang, H., Wan, Z., Ni, L.: A novel distributed social internet of things service recommendation scheme based on LSH forest. Pers. Ubiquit. Comput. 1–14 (2019). https://doi.org/10.1007/s00779-019-01283-4

  2. Song, T., Li, R., Mei, B., Yu, J., Xing, X., Cheng, X.: A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J. 4(6), 1844–1852 (2017)

    Article  Google Scholar 

  3. Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving \(k\) -means clustering in social participatory sensing. IEEE Trans. Ind. Inform. 13(4), 2066–2076 (2017)

    Google Scholar 

  4. Pu, Y., et al.: Two secure privacy-preserving data aggregation schemes for IoT. Wirel. Commun. Mob. Comput. 2019, 3 985 232:1–3 985 232:11 (2019)

    Google Scholar 

  5. Ni, L., Li, C., Wang, X., Jiang, H., Yu, J.: DP-MCDBSCAN: differential privacy preserving multi-core DBSCAN clustering for network user data. IEEE Access 6, 21053–21063 (2018)

    Article  Google Scholar 

  6. He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)

    Article  Google Scholar 

  7. Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inform. 15(12), 6492–6499 (2019)

    Article  Google Scholar 

  8. Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766–775 (2018)

    Article  MathSciNet  Google Scholar 

  9. Liang, Y., Cai, Z., Han, Q., Li, Y.: Location privacy leakage through sensory data. Secur. Commun. Netw. 2017, 7 576 307:1–7 576 307:12 (2017)

    Article  Google Scholar 

  10. Zhu, S., Cai, Z., Hu, H., Li, Y., Li, W.: zkCrowd: a hybrid blockchain-based crowdsourcing platform. IEEE Trans. Ind. Inform. 16(6), 4196–4205 (2019)

    Article  Google Scholar 

  11. Li, K., Tian, L., Li, W., Luo, G., Cai, Z.: Incorporating social interaction into three-party game towards privacy protection in IoT. Comput. Netw. 150, 90–101 (2019)

    Article  Google Scholar 

  12. Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968–979 (2020)

    Article  Google Scholar 

  13. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577–590 (2018)

    Google Scholar 

  14. Zheng, X., Cai, Z., Li, Y.: Data linkage in smart Internet of Things systems: a consideration from a privacy perspective. IEEE Commun. Mag. 56(9), 55–61 (2018)

    Article  Google Scholar 

  15. Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8–14 (2018)

    Article  Google Scholar 

  16. Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, 1–4 May 2017, pp. 1–9 (2017)

    Google Scholar 

  17. Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. 4(6), 1868–1878 (2017)

    Article  Google Scholar 

  18. Li, W., Hu, C., Song, T., Yu, J., Xing, X., Cai, Z.: Privacy-preserving data collection in context-aware applications. In: 2018 IEEE Symposium on Privacy-Aware Computing, PAC 2018, Washington, DC, USA, 26–28 September 2018, pp. 75–85 (2018)

    Google Scholar 

  19. Li, W., Song, T., Li, Y., Ma, L., Yu, J., Cheng, X.: A hierarchical game framework for data privacy preservation in context-aware IoT applications. In: IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, 1–4 August 2017, pp. 176–177 (2017)

    Google Scholar 

  20. Wang, Y., Xia, Y., Hou, J., Gao, S., Nie, X., Wang, Q.: A fast privacy-preserving framework for continuous location-based queries in road networks. J. Netw. Comput. Appl. 53, 57–73 (2015)

    Article  Google Scholar 

  21. Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)

    Article  Google Scholar 

  22. Zhang, J., Yuan, Y., Wang, X., Ni, L., Yu, J., Zhang, M.: RPAR: location privacy preserving via repartitioning anonymous region in mobile social network. Secur. Commun. Netw. 2018, 6 829 326:1–6 829 326:10 (2018)

    Google Scholar 

  23. Cai, Z., He, Z.: Trading private range counting over big IoT data. In: 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, 7–10 July 2019, pp. 144–153 (2019)

    Google Scholar 

  24. Zhang, J., Wang, X., Yuan, Y., Ni, L.: RcDT: privacy preservation based on r-constrained dummy trajectory in mobile social networks. IEEE Access 7, 90 476–90 486 (2019)

    Google Scholar 

  25. Zhang, S., Wang, G., Liu, Q., Abawajy, J.H.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18), 6121–6133 (2017). https://doi.org/10.1007/s00500-017-2676-6

    Article  Google Scholar 

  26. Zhang, L., Jin, C., Huang, H., Fu, X., Wang, R.: A trajectory privacy preserving scheme in the CANNQ service for IoT. Sensors 19(9), 2190 (2019)

    Article  Google Scholar 

  27. Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans. Mob. Comput. 14(3), 495–508 (2015)

    Article  Google Scholar 

  28. Yang, Z., Yang, M., Ning, B.: User relationship privacy protection on trajectory data. In: Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B. (eds.) CSPS 2018. LNEE, vol. 517, pp. 1038–1045. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-6508-9_126

    Chapter  Google Scholar 

  29. Chow, C., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. 13(1), 19–29 (2011)

    Article  Google Scholar 

  30. Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_15

    Chapter  Google Scholar 

  31. Pan, X., Meng, X., Xu, J.: Distortion-based anonymity for continuous queries in location-based mobile services. In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, Seattle, Washington, USA, Proceedings, November, vol. 2009, pp. 256–265 (2009). pp. 4–6

    Google Scholar 

  32. Wang, Y., He, L.P., Peng, J., Zhang, T.T., Li, H.Z.: Privacy preserving for continuous query in location based services. In: 18th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2012, Singapore, 17–19 December 2012, pp. 213–220 (2012)

    Google Scholar 

  33. Ye, A., Li, Y., Xu, L.: A novel location privacy-preserving scheme based on l-queries for continuous LBS. Comput. Commun. 98, 1–10 (2017)

    Article  Google Scholar 

  34. Shin, H., Vaidya, J., Atluri, V., Choi, S.: Ensuring privacy and security for LBS through trajectory partitioning. In: Eleventh International Conference on Mobile Data Management, MDM 2010, Kanas City, Missouri, USA, 23–26 May 2010, pp. 224–226 (2010)

    Google Scholar 

  35. Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, Phoenix, AZ, USA, 13–18 April 2008, pp. 547–555 (2008)

    Google Scholar 

  36. Hwang, R., Hsueh, Y., Chung, H.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)

    Article  Google Scholar 

  37. Shin, H., Vaidya, J., Atluri, V.: Anonymization models for directional location based service environments. Comput. Secur. 29(1), 59–73 (2010)

    Article  Google Scholar 

  38. Gustav, Y.H., Wang, Y., Domenic, M.K., Zhang, F., Memon, I.: Velocity similarity anonymization for continuous query location based services. In: 2013 International conference on Computational Problem-Solving (ICCP), pp. 433–436. IEEE (2013)

    Google Scholar 

  39. Ma, C., Zhou, C., Yang, S.: A voronoi-based location privacy-preserving method for continuous query in LBS. IJDSN 11, 326 953:1–326 953:17 (2015)

    Google Scholar 

  40. Al-Dhubhani, R., Cazalas, J.M.: An adaptive geo-indistinguishability mechanism for continuous LBSqueries. Wirel. Netw. 24(8), 3221–3239 (2018)

    Article  Google Scholar 

  41. Brinkhoff, T.: A framework for generating network-based moving objects. Geo Inform. 6(2), 153–180 (2002)

    MATH  Google Scholar 

  42. Al-Hussaeni, K., Fung, B.C.M., Cheung, W.K.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89–109 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jing Meng or Wei Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, L., Zhu, S., Li, F., Li, R., Meng, J., Li, W. (2020). A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics