Skip to main content

Achieving Absolute Privacy Preservation in Continuous Query Road Network Services

  • Conference paper
Book cover Advanced Data Mining and Applications (ADMA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8933))

Included in the following conference series:

Abstract

Research have shown that location semantics have lead to privacy leakages especially when two or more users in a cloaked region depict similar semantic locations. This implies that, to achieve absolute privacy(query privacy, location privacy and semantic location privacy) protection for a client on road network, it is important that cloaked users have their locations distinctly diverse with diverse semantics, and making diverse service request thus satisfying the k-anonymity and l-diversity conditions for privacy. Unfortunately, the determination of semantic location of a mobile user online is a challenge which makes the achievement of absolute privacy protection more challenging. In this paper, we developed a privacy preserving algorithm that protects a client’s absolute privacy for continuous query road network services. We employed an offline trajectory clustering algorithm and semantic location graph to aid the selection of cloaked users that will effectively protect the absolute privacy of a client. We evaluated the effectiveness of our algorithm on a real world map with two defined metrics, and it exhibited an excellent anonymization success rate in a very good query processing time for the entire period of continuously querying road network services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Silvestri, C., Yigitoglu, E., Damiani, M.L., Abul, O.: Sawlnet: Sensitivity aware location cloaking on road-networks. In: 2012 IEEE 13th International Conference on Mobile Data Management (MDM), pp. 336–339. IEEE (2012)

    Google Scholar 

  2. Dewri, R., Ray, I., Whitley, D.: Query m-invariance: Preventing query disclosures in continuous location-based services. In: 2010 Eleventh International Conference on Mobile Data Management (MDM), pp. 95–104. IEEE (2010)

    Google Scholar 

  3. Lee, B., Oh, J., Yu, H., Kim, J.: Protecting location privacy using location semantics. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1289–1297. ACM (2011)

    Google Scholar 

  4. Wang, T., Liu, L.: Privacy-aware mobile services over road networks. Proceedings of the VLDB Endowment 2, 1042–1053 (2009)

    Article  Google Scholar 

  5. Damiani, M.L., Silvestri, C., Bertino, E.: Fine-grained cloaking of sensitive positions in location-sharing applications. IEEE Pervasive Computing 10, 64–72 (2011)

    Article  Google Scholar 

  6. Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Li, M., Qin, Z., Wang, C.: Sensitive semantics-aware personality cloaking on road-network environment. International Journal of Security & Its Applications 8 (2014)

    Google Scholar 

  8. Yigitoglu, E., Damiani, M.L., Abul, O., Silvestri, C.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: 2012 IEEE 13th International Conference on Mobile Data Management (MDM), pp. 186–195. IEEE (2012)

    Google Scholar 

  9. Hossain, A., Hossain, A.A., Chang, J.W.: Spatial cloaking method based on reciprocity property for users’ privacy in road networks. In: 2011 IEEE 11th International Conference on Computer and Information Technology (CIT), pp. 487–490. IEEE (2011)

    Google Scholar 

  10. Chow, C.Y., Mokbel, M.F., Bao, J., Liu, X.: Query-aware location anonymization for road networks. GeoInformatica 15, 571–607 (2011)

    Article  Google Scholar 

  11. Han, B., Liu, L., Omiecinski, E.: Neat: Road network aware trajectory clustering. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 142–151. IEEE (2012)

    Google Scholar 

  12. Wang, Y., He, L.P., Peng, J., Zhang, T.T., Li, H.Z.: Privacy preserving for continuous query in location based services. In: Proceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp. 213–220. IEEE Computer Society (2012)

    Google Scholar 

  13. Weber, M., Liu, L., Jones, K., Covington, M.J., Nachman, L., Pesti, P.: On map matching of wireless positioning data: a selective look-ahead approach. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 290–299. ACM (2010)

    Google Scholar 

  14. Haklay, M., Weber, P.: Openstreetmap: User-generated street maps. IEEE Pervasive Computing 7, 12–18 (2008)

    Article  Google Scholar 

  15. Liu, F., Hua, K.A., Cai, Y.: Query l-diversity in location-based services. In: Tenth International Conference on Mobile Data Management: Systems, Services and Middleware MDM 2009, pp. 436–442. IEEE (2009)

    Google Scholar 

  16. Papoulis, A., Pillai, S.U.: Probability, random variables, and stochastic processes. Tata McGraw-Hill Education (2002)

    Google Scholar 

  17. Brinkhoff, T.: A framework for generating network-based moving objects (2008), http://iapg.jade-hs.de/personen/brinkhoff/generator/

  18. Gps data team website, http://www.gps-data-team.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Gustav, Y.H., Wu, X., Ren, Y., Wang, Y., Zhang, F. (2014). Achieving Absolute Privacy Preservation in Continuous Query Road Network Services. In: Luo, X., Yu, J.X., Li, Z. (eds) Advanced Data Mining and Applications. ADMA 2014. Lecture Notes in Computer Science(), vol 8933. Springer, Cham. https://doi.org/10.1007/978-3-319-14717-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14717-8_22

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14716-1

  • Online ISBN: 978-3-319-14717-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics