Abstract
With the development of wireless communication technologies, people-centric sensing network which is a newly sensor network provides an opportunity to create intelligence systems. However, location privacy became one of the most serious problems to promote development of people-centric sensing network. Currently, many privacy-preserving techniques for location services focused on obfuscation. However, most of them did not take into account the semantics-aware threat. In this paper, we propose a novel scheme named a novel Semantics-aware scheme for location privacy in People-centric Sensing network (SPS). The original contribution of the paper is a novel scheme for selecting the sensitivity threshold value and protecting location privacy from the obfuscated space generator. Moreover, we evaluate the performance of SPS. The result shows that SPS could resist the semantics-aware threat under a reasonable cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdelzaher, T., et al.: Mobiscopes for human spaces. IEEE Pervasive Computing 6(2), 20–29 (2007)
Campbell, A.T., et al.: The rise of people-centric sensing. IEEE Internet Computing 12(4), 12–21 (2008)
Eisenman, S.B., et al.: BikeNet: A mobile sensing system for cyclist experience mapping. ACM Transactions on Sensor Networks (TOSN) 6(1), 6 (2009)
Welsh, M., Bers, J.: CitySense: an urban-scale sensor network. In: Harvard Graduate School of Design, pp. 164–165. Lars Müller Publishers, Zurich (2010)
Mun, M., et al.: PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services. ACM (2009)
Microsoft Research Sense Web project (2007), http://research.microsoft.com/nec/senseweb/.website (visited March 2013)
Crepaldi, R., et al.: Illinois vehicular project, live data sampling and opportunistic internet connectivity. In: Proceedings of the Third ACM International Workshop on Mobile Opportunistic Networks. ACM (2012)
Schiller, J., Voisard, A. (eds.): Location-based services. Elsevier (2004)
Gokul, S.: Location Dependent Query Processing. Diss. Cochin University of Science and Technology (2011)
Morris, J., et al.: An Architecture for Location and Location Privacy in Internet Applications (2011)
Mascetti, S., et al.: Providenthider: An algorithm to preserve historical k-anonymity in lbs. In: Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009. IEEE (2009)
Lu, R., et al.: Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE Transactions on Vehicular Technology 61(1), 86–96 (2012)
Brush, A.J., Krumm, J., Scott, J.: Exploring end user preferences for location obfuscation, location-based services, and the value of location. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing. ACM (2010)
Quercia, D., et al.: Spotme if you can: Randomized responses for location obfuscation on mobile phones. In: 2011 31st International Conference on Distributed Computing Systems (ICDCS). IEEE (2011)
Sheth, A., Ilarri, S., Mena, E.: Semantics in Location-Based Services. IEEE Internet Computing 15(6), 0010–14 (2011)
Basu Roy, S., Chakrabarti, K.: Location-aware type ahead search on spatial databases: semantics and efficiency. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. ACM (2011)
Damiani, M.L., Silvestri, C., Bertino, E.: Semantics-aware obfuscation for location privacy. Journal of Computing Science and Engineering 2(2), 137–170 (2008)
Le, T.T.B., Dang, T.K.: Semantic-aware obfuscation for location privacy at database level. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 111–120. Springer, Heidelberg (2013)
Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 348–357. ACM (2009)
Wang, Y., Xu, D., He, X., et al.: L2p2: Location-aware location privacy protection for location-based services. In: 2012 Proceedings IEEE INFOCOM, pp. 1996–2004. IEEE (2012)
Che, Y., et al.: SALS: semantics-aware location sharing based on cloaking zone in mobile social networks. In: Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems. ACM (2012)
Ishizaka, A., Labib, A.: Review of the main developments in the analytic hiersarchy process. Expert Systems with Applications 38(11), 14336–14345 (2011)
Saaty, T.L., Vargas, L.G.: How to Make a Decision[M]//Models, Methods, Concepts & Applications of the Analytic Hierarchy Process, pp. 1–21. Springer, US (2012)
Wang, L., Chu, M.T.: On the global convergence of the high-order power method for rank-one tensor approximation. North Carolina State University (2013) (preprint)
Wei, Z., Zhao, B., Su, J.: PDA: A Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System. International Journal of Distributed Sensor Networks 2013 (2013)
Saaty, T.L.: Analytic hierarchy process. Encyclopedia of Operations Research and Management Science, pp. 52–64. Springer, US (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Wei, Z., Su, J., Zhao, B. (2014). SPS: A Novel Semantics-Aware Scheme for Location Privacy in People-Centric Sensing Network. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2014. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-07782-6_30
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07781-9
Online ISBN: 978-3-319-07782-6
eBook Packages: Computer ScienceComputer Science (R0)