Abstract
With the development of personal communication devices, location-based services have been widely used. However, the risk of location information leakage is a fundamental problem that prevents the success for these applications. Recently, some location-based privacy protection schemes have been proposed, among which K-anonymity scheme is the most popular one. However, as we empirically demonstrated, these schemes may not preserve satisfactory effect in trajectory-aware scenarios. In particular, we propose a new attack model using public navigation services. According to the empirical results, the attack algorithm correlates a series of snapshots associated with continuous queries, eliminating some of the less likely routes, and seriously undermining the anonymity of the query, thereby increasing the probability of attack. In order to defend against the proposed attacks, two enhanced versions of K-anonymity mechanism are proposed for this attack model, which further protects the user’s trajectory privacy.
Hanbo Dai and Hui Li are co-first authors and contribute equally to this work. This work is granted by National Natural Science Foundation of China (No. 61672408, 61972309) and National Engineering Laboratory (China) for Public Safety Risk Perception and Control by Big Data (PSRPC).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anthony, D., Henderson, T., Kotz, D.: Privacy in location-aware computing environments. IEEE Pervasive Comput. 6(4), 64–72 (2007)
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)
Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS, pp. 620–629. IEEE Computer Society (2005)
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp. 121–132. ACM (2008)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobilea peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221–238. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_13
Gkoulalas-Divanis, A., Kalnis, P., Verykios, V.S.: Providing k-anonymity in location based services. SIGKDD Explor. 12(1), 3–10 (2010)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, pp. 31–42. USENIX (2003)
Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_14
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS, pp. 88–97. IEEE Computer Society (2005)
Liu, H., Li, X., Li, H., Ma, J., Ma, X.: Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. In: INFOCOM, pp. 1–9. IEEE (2017)
Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: INFOCOM, pp. 1017–1025. IEEE (2015)
Peng, T., Liu, Q., Meng, D., Wang, G.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165–179 (2017)
Song, D., Park, K.: A privacy-preserving location-based system for continuous spatial queries. Mob. Inf. Syst. 2016(1), 1–9 (2016)
Vu, K., Zheng, R., Gao, J.: Efficient algorithms for k-anonymous location privacy in participatory sensing. In: INFOCOM, pp. 2399–2407. IEEE (2012)
Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE, pp. 366–375. IEEE Computer Society (2008)
Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: INFOCOM, pp. 1–9. IEEE (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dai, H., Li, H., Meng, X., Wang, Y. (2020). On the Vulnerability and Generality of K–Anonymity Location Privacy Under Continuous LBS Requests. In: Wang, X., Zhang, R., Lee, YK., Sun, L., Moon, YS. (eds) Web and Big Data. APWeb-WAIM 2020. Lecture Notes in Computer Science(), vol 12318. Springer, Cham. https://doi.org/10.1007/978-3-030-60290-1_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-60290-1_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60289-5
Online ISBN: 978-3-030-60290-1
eBook Packages: Computer ScienceComputer Science (R0)