Abstract
In the continuous location-based service (LBS) queries, the trajectory k-anonymity method that incorporates user’s moving trend is becoming popular because of its high quality of service (QoS). The existing works often apply user’s moving direction to represent the user’s moving trend. However, the query destinations of the users with closer moving directions are not necessarily closer. As a result, the users in a cloaked set may diverge with the proceeding of the continuous queries, leading to large cloaked areas as well as a reduction of QoS. Therefore, in this paper, a new concept named “location similarity of query destination (LS-QD)”, is proposed to reflect user’s global moving trend. By incorporating LS-QD, we develop a novel trajectory k-anonymity method for continuous LBS queries. Our system architecture utilizes a quadtree model with a pyramid structure to construct the user cloaked sets conveniently. Both theoretical analysis and simulation experiments are carried out to evaluate the robustness and security performance of our proposed method. Compared with other existing methods, our LS-QD based k-anonymity method can reduce the cloaking area and cloaking time while increasing the cloaking success ratio by about 40%–70%, which demonstrates its superiority in guaranteeing QoS for continuous LBS queries.
L. Zhang and S. Zhu—Both authors contributed equally to this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yan, B., Yu, J., Yang, M., Jiang, H., Wan, Z., Ni, L.: A novel distributed social internet of things service recommendation scheme based on LSH forest. Pers. Ubiquit. Comput. 1–14 (2019). https://doi.org/10.1007/s00779-019-01283-4
Song, T., Li, R., Mei, B., Yu, J., Xing, X., Cheng, X.: A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J. 4(6), 1844–1852 (2017)
Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving \(k\) -means clustering in social participatory sensing. IEEE Trans. Ind. Inform. 13(4), 2066–2076 (2017)
Pu, Y., et al.: Two secure privacy-preserving data aggregation schemes for IoT. Wirel. Commun. Mob. Comput. 2019, 3 985 232:1–3 985 232:11 (2019)
Ni, L., Li, C., Wang, X., Jiang, H., Yu, J.: DP-MCDBSCAN: differential privacy preserving multi-core DBSCAN clustering for network user data. IEEE Access 6, 21053–21063 (2018)
He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)
Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inform. 15(12), 6492–6499 (2019)
Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766–775 (2018)
Liang, Y., Cai, Z., Han, Q., Li, Y.: Location privacy leakage through sensory data. Secur. Commun. Netw. 2017, 7 576 307:1–7 576 307:12 (2017)
Zhu, S., Cai, Z., Hu, H., Li, Y., Li, W.: zkCrowd: a hybrid blockchain-based crowdsourcing platform. IEEE Trans. Ind. Inform. 16(6), 4196–4205 (2019)
Li, K., Tian, L., Li, W., Luo, G., Cai, Z.: Incorporating social interaction into three-party game towards privacy protection in IoT. Comput. Netw. 150, 90–101 (2019)
Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968–979 (2020)
Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577–590 (2018)
Zheng, X., Cai, Z., Li, Y.: Data linkage in smart Internet of Things systems: a consideration from a privacy perspective. IEEE Commun. Mag. 56(9), 55–61 (2018)
Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8–14 (2018)
Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, 1–4 May 2017, pp. 1–9 (2017)
Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. 4(6), 1868–1878 (2017)
Li, W., Hu, C., Song, T., Yu, J., Xing, X., Cai, Z.: Privacy-preserving data collection in context-aware applications. In: 2018 IEEE Symposium on Privacy-Aware Computing, PAC 2018, Washington, DC, USA, 26–28 September 2018, pp. 75–85 (2018)
Li, W., Song, T., Li, Y., Ma, L., Yu, J., Cheng, X.: A hierarchical game framework for data privacy preservation in context-aware IoT applications. In: IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, 1–4 August 2017, pp. 176–177 (2017)
Wang, Y., Xia, Y., Hou, J., Gao, S., Nie, X., Wang, Q.: A fast privacy-preserving framework for continuous location-based queries in road networks. J. Netw. Comput. Appl. 53, 57–73 (2015)
Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)
Zhang, J., Yuan, Y., Wang, X., Ni, L., Yu, J., Zhang, M.: RPAR: location privacy preserving via repartitioning anonymous region in mobile social network. Secur. Commun. Netw. 2018, 6 829 326:1–6 829 326:10 (2018)
Cai, Z., He, Z.: Trading private range counting over big IoT data. In: 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, 7–10 July 2019, pp. 144–153 (2019)
Zhang, J., Wang, X., Yuan, Y., Ni, L.: RcDT: privacy preservation based on r-constrained dummy trajectory in mobile social networks. IEEE Access 7, 90 476–90 486 (2019)
Zhang, S., Wang, G., Liu, Q., Abawajy, J.H.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18), 6121–6133 (2017). https://doi.org/10.1007/s00500-017-2676-6
Zhang, L., Jin, C., Huang, H., Fu, X., Wang, R.: A trajectory privacy preserving scheme in the CANNQ service for IoT. Sensors 19(9), 2190 (2019)
Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans. Mob. Comput. 14(3), 495–508 (2015)
Yang, Z., Yang, M., Ning, B.: User relationship privacy protection on trajectory data. In: Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B. (eds.) CSPS 2018. LNEE, vol. 517, pp. 1038–1045. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-6508-9_126
Chow, C., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. 13(1), 19–29 (2011)
Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_15
Pan, X., Meng, X., Xu, J.: Distortion-based anonymity for continuous queries in location-based mobile services. In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, Seattle, Washington, USA, Proceedings, November, vol. 2009, pp. 256–265 (2009). pp. 4–6
Wang, Y., He, L.P., Peng, J., Zhang, T.T., Li, H.Z.: Privacy preserving for continuous query in location based services. In: 18th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2012, Singapore, 17–19 December 2012, pp. 213–220 (2012)
Ye, A., Li, Y., Xu, L.: A novel location privacy-preserving scheme based on l-queries for continuous LBS. Comput. Commun. 98, 1–10 (2017)
Shin, H., Vaidya, J., Atluri, V., Choi, S.: Ensuring privacy and security for LBS through trajectory partitioning. In: Eleventh International Conference on Mobile Data Management, MDM 2010, Kanas City, Missouri, USA, 23–26 May 2010, pp. 224–226 (2010)
Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, Phoenix, AZ, USA, 13–18 April 2008, pp. 547–555 (2008)
Hwang, R., Hsueh, Y., Chung, H.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)
Shin, H., Vaidya, J., Atluri, V.: Anonymization models for directional location based service environments. Comput. Secur. 29(1), 59–73 (2010)
Gustav, Y.H., Wang, Y., Domenic, M.K., Zhang, F., Memon, I.: Velocity similarity anonymization for continuous query location based services. In: 2013 International conference on Computational Problem-Solving (ICCP), pp. 433–436. IEEE (2013)
Ma, C., Zhou, C., Yang, S.: A voronoi-based location privacy-preserving method for continuous query in LBS. IJDSN 11, 326 953:1–326 953:17 (2015)
Al-Dhubhani, R., Cazalas, J.M.: An adaptive geo-indistinguishability mechanism for continuous LBSqueries. Wirel. Netw. 24(8), 3221–3239 (2018)
Brinkhoff, T.: A framework for generating network-based moving objects. Geo Inform. 6(2), 153–180 (2002)
Al-Hussaeni, K., Fung, B.C.M., Cheung, W.K.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89–109 (2014)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, L., Zhu, S., Li, F., Li, R., Meng, J., Li, W. (2020). A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_58
Download citation
DOI: https://doi.org/10.1007/978-3-030-59016-1_58
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59015-4
Online ISBN: 978-3-030-59016-1
eBook Packages: Computer ScienceComputer Science (R0)