Abstract
Quantifying location privacy is an interesting and hot topic in Location-Based Services (LBSs). However, existing schemes only consider the privacy leakage to the untrusted LBS servers, leaving out the leakage during the transportation phase. In this paper, we propose a privacy-preserving scheme to help the LBS user to select optimal privacy strategy with considering the aforementioned problem for the first time. In order to measure the efficacy of different kinds of Privacy-Preserving Mechanisms (PPMs) including cryptographic and non-cryptographic types, we first quantify the revenue of two kinds of aforementioned PPMs by considering the privacy loss and privacy leakage probability on the channel and LBS server, as well as the accumulated leakage previously, simultaneously. Then, we take the consumption of different PPMs into account, to compute the investment. Evaluation results illustrate the effectiveness and efficiency of our proposed scheme.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bilogrevic, I., Huguenin, K., Mihaila, S., Shokri, R., Hubaux, J.P.: Predicting users’ motivations behind location check-ins and utility implications of privacy protection mechanisms. In: Proceedings of ISOC NDSS (2015)
Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, J.-P., Aad, I.: Privacy in mobile computing for location-sharing-based services. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 77–96. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22263-4_5
Bindschaedler, V., Shokri, R.: Synthesizing plausible privacy-preserving location traces. In: Proceedings of IEEE S&P (2016)
Fawaz, K., Feng, H., Shin, K.G.: Anatomization and protection of mobile apps’ location privacy threats. In: Proceedings of USENIX Association USENIX Security (2015)
Fechner, T., Kray, C.: Attacking location privacy: exploring human strategies. In: Proceedings of ACM UbiComp (2012)
Gervais, A., Shokri, R., Singla, A., Capkun, S., Lenders, V.: Quantifying web-search privacy. In: Proceedings of ACM CCS (2014)
Li, H., Zhu, H., Du, S., Liang, X., Shen, X.: Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans. Dependable Secure Comput. (2016)
Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: Proceedings of IEEE INFOCOM (2014)
Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: Proceedings of IEEE INFOCOM (2015)
Niu, B., Zhu, X., Lei, X., Zhang, W., Li, H.: Eps: encounter-based privacy-preserving scheme for location-based services. In: Proceedings of IEEE Globecom (2013)
Niu, B., Zhu, X., Li, W., Li, H.: Epcloak: an efficient and privacy-preserving spatial cloaking scheme for lbss. In: Proceedings of IEEE MASS (2014)
Olteanu, A.M., Huguenin, K., Shokri, R., Humbert, M., Hubaux, J.P.: Quantifying interdependent privacy risks with location data. IEEE Trans. Mob. Comput. 10(1109), 1536–1233 (2016)
Piorkowski, M., Sarafijanovoc-Djukic, N., Grossglauser, M.: A parsimonious model of mobile partitioned networks with clustering. In: Proceedings of COMSNETS (2009). http://www.comsnets.org
Rizoiu, M.A., Xie, L., Caetano, T., Cebrian, M.: Evolution of privacy loss in wikipedia. In: Proceedings of ACM WSDM (2015)
Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 8(6), 838–852 (2013)
Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proceedings of IEEE S&P (2011)
Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Le Boudec, J.Y.: Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of IEEE CCS (2012)
Zhang, S., Yang, H., Singh, L.: Anonymizing query logs by differential privacy. In: Proceedings ACM SIGIR (2016)
Zhang, Y., Tong, W., Zhong, S.: On designing satisfaction-ratio-aware truthful incentive mechanisms for k-anonymity location privacy. IEEE Trans. Inf. Forensics Secur. 11(11), 2528–2541 (2016)
Acknowledgement
This work was supported by the General Program of National Natural Science Foundation of China (61672515), the National Key Research and Development Program of China (2016YFB0800303) and the National Natural Science Foundation of China (61502489).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Li, F., Liu, J., Fang, L., Niu, B., Geng, K., Li, H. (2017). Pricing Privacy Leakage in Location-Based Services. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-60033-8_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60032-1
Online ISBN: 978-3-319-60033-8
eBook Packages: Computer ScienceComputer Science (R0)