Skip to main content

On the Vulnerability and Generality of K–Anonymity Location Privacy Under Continuous LBS Requests

  • Conference paper
  • First Online:
Web and Big Data (APWeb-WAIM 2020)

Abstract

With the development of personal communication devices, location-based services have been widely used. However, the risk of location information leakage is a fundamental problem that prevents the success for these applications. Recently, some location-based privacy protection schemes have been proposed, among which K-anonymity scheme is the most popular one. However, as we empirically demonstrated, these schemes may not preserve satisfactory effect in trajectory-aware scenarios. In particular, we propose a new attack model using public navigation services. According to the empirical results, the attack algorithm correlates a series of snapshots associated with continuous queries, eliminating some of the less likely routes, and seriously undermining the anonymity of the query, thereby increasing the probability of attack. In order to defend against the proposed attacks, two enhanced versions of K-anonymity mechanism are proposed for this attack model, which further protects the user’s trajectory privacy.

Hanbo Dai and Hui Li are co-first authors and contribute equally to this work. This work is granted by National Natural Science Foundation of China (No. 61672408, 61972309) and National Engineering Laboratory (China) for Public Safety Risk Perception and Control by Big Data (PSRPC).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://lbsyun.baidu.com/index.php?title=webapi/route-matrix-api-v2.

  2. 2.

    http://www.didichuxing.com/.

References

  1. Anthony, D., Henderson, T., Kotz, D.: Privacy in location-aware computing environments. IEEE Pervasive Comput. 6(4), 64–72 (2007)

    Article  Google Scholar 

  2. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)

    Article  Google Scholar 

  3. Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS, pp. 620–629. IEEE Computer Society (2005)

    Google Scholar 

  4. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp. 121–132. ACM (2008)

    Google Scholar 

  5. Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobilea peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221–238. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_13

    Chapter  Google Scholar 

  6. Gkoulalas-Divanis, A., Kalnis, P., Verykios, V.S.: Providing k-anonymity in location based services. SIGKDD Explor. 12(1), 3–10 (2010)

    Article  Google Scholar 

  7. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, pp. 31–42. USENIX (2003)

    Google Scholar 

  8. Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_14

    Chapter  Google Scholar 

  9. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS, pp. 88–97. IEEE Computer Society (2005)

    Google Scholar 

  10. Liu, H., Li, X., Li, H., Ma, J., Ma, X.: Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. In: INFOCOM, pp. 1–9. IEEE (2017)

    Google Scholar 

  11. Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: INFOCOM, pp. 1017–1025. IEEE (2015)

    Google Scholar 

  12. Peng, T., Liu, Q., Meng, D., Wang, G.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165–179 (2017)

    Article  Google Scholar 

  13. Song, D., Park, K.: A privacy-preserving location-based system for continuous spatial queries. Mob. Inf. Syst. 2016(1), 1–9 (2016)

    Google Scholar 

  14. Vu, K., Zheng, R., Gao, J.: Efficient algorithms for k-anonymous location privacy in participatory sensing. In: INFOCOM, pp. 2399–2407. IEEE (2012)

    Google Scholar 

  15. Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE, pp. 366–375. IEEE Computer Society (2008)

    Google Scholar 

  16. Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: INFOCOM, pp. 1–9. IEEE (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dai, H., Li, H., Meng, X., Wang, Y. (2020). On the Vulnerability and Generality of K–Anonymity Location Privacy Under Continuous LBS Requests. In: Wang, X., Zhang, R., Lee, YK., Sun, L., Moon, YS. (eds) Web and Big Data. APWeb-WAIM 2020. Lecture Notes in Computer Science(), vol 12318. Springer, Cham. https://doi.org/10.1007/978-3-030-60290-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60290-1_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60289-5

  • Online ISBN: 978-3-030-60290-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics