Skip to main content

Learning-Based Privacy-Preserving Location Sharing

  • Conference paper
  • First Online:
Computational Intelligence and Intelligent Systems (ISICA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 575))

  • 1668 Accesses

Abstract

With the improvement of mobile communication technology, mobile Online Social Networks (mOSNs) provide users with the corresponding location based services when compared with traditional social networks. Location sharing becomes a fundamental component of mOSNs now, and some practical methods and techniques have been proposed to protect user’s privacy information. Some of these methods can accommodate privacy protection based on the input user profile and user’s privacy preferences through personalization, but user may be unlikely to use them without easy operation and strong privacy guarantee. In this article, we make a further research on privacy-preserving location sharing in mOSNs and develop a framework to help user to choose his desired degree of the privacy protection based on context aware. An adaptive learning model is established to provide user privacy right decisions, based on analyzing a series of factors that influence the choice of user’s privacy profile. This model will manage the different contexts of different user privacy preference with minimal user intervention and can achieve self-perfection gradually. So our proposed model can effectively protect users’ privacy and motivate users to make use of privacy preferences available to them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dinh, H.T., Lee, C., Niyato, D., et al.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)

    Article  Google Scholar 

  2. Tang, K.P., Lin, J., Hong, J.I., et al.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing. pp. 85–94, ACM (2010)

    Google Scholar 

  3. Brooker, D., Carey, T., Warren, I.: Middleware for social networking on mobile devices. In: 2010 21st Australian Software Engineering Conference (ASWEC), pp. 202–211. IEEE (2010)

    Google Scholar 

  4. Xiao, X., Zheng, Y., Luo, Q., et al.: Inferring social ties between users with human location history. J. Ambient Intell. Humanized Comput. 5(1), 3–19 (2014)

    Article  Google Scholar 

  5. Gu, J., He, L., Yang, J., et al.: Location aware mobile cooperation-design and system[J]. Int. J. Sig. Proc. Image Proc. Pattern Recogn. 2(4), 49–60 (2009)

    Google Scholar 

  6. Liu, L.: From data privacy to location privacy: models and algorithms. In: VLDB Endowment Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 1429–1430 (2007)

    Google Scholar 

  7. Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: INTERACT, vol. 3, pp. 702–712 (2003)

    Google Scholar 

  8. Natesan, G., Liu, J.: An adaptive learning model for k-anonymity location privacy protection. In: IEEE 39th Annual Computer Software and Applications Conference (COMPSAC), vol. 3, pp. 10–16. IEEE (2015)

    Google Scholar 

  9. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  10. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)

    Google Scholar 

  11. Cox, L.P., Dalton, A., Marupadi, V.: Smokescreen: flexible privacy controls for presence-sharing. In: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 233–245. ACM (2007)

    Google Scholar 

  12. Wei, W., Xu, F., Li, Q.: Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: 2012 Proceedings IEEE INFOCOM, pp. 2616–2620. IEEE (2012)

    Google Scholar 

  13. Ejigu, D., Scuturici, M., Brunie, L.: An ontology-based approach to context modeling and reasoning in pervasive computing. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 14–19. IEEE (2007)

    Google Scholar 

  14. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  15. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB Endowment Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774 (2006)

    Google Scholar 

  16. Knijnenburg, B.P., Kobsa, A., Jin, H.: Preference-based location sharing: are more privacy options really better?. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2667–2676. ACM (2013)

    Google Scholar 

  17. Xu, H., Gupta, S., Pan, S.: Balancing user privacy concerns in the adoption of location-based services: an empirical analysis across pull-based and push-based applications (2009)

    Google Scholar 

  18. Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 348-357. ACM (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Nan Shen or Chunfu Jia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Shen, N., Chen, X., Liang, S., Yang, J., Li, T., Jia, C. (2016). Learning-Based Privacy-Preserving Location Sharing. In: Li, K., Li, J., Liu, Y., Castiglione, A. (eds) Computational Intelligence and Intelligent Systems. ISICA 2015. Communications in Computer and Information Science, vol 575. Springer, Singapore. https://doi.org/10.1007/978-981-10-0356-1_70

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0356-1_70

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0355-4

  • Online ISBN: 978-981-10-0356-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics