Skip to main content

Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBS

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1563))

Included in the following conference series:

  • 1015 Accesses

Abstract

With the high demand of using location-based services (LBSs) in our daily lives, the privacy protection of users’ trajectories has become a significant concern. When users utilize LBSs, their location and trajectory information may expose their identities in continuous LBSs. Using the spatial and temporal correspondences on users’ trajectories, adversaries can easily gather their private information. Using collaboration between users instead of location service providers (LSPs) reduces the chance of revealing private information to adversaries. However, there is an assumption of a trusting relationship between peers. In this paper, we propose the trustworthy collaborative query-trajectory privacy-preserving (TCQTPP) scheme, which anonymizes users’ trajectories and resolves the untrustworthy relationship between users based on peer-to-region LBSs. Moreover, the TCQTPP scheme provides query content preservation based on a fake query concept in which we conceal the user’s actual query among a set of queries. The results of several experiments with different conditions confirm that our proposed scheme can protect users’ trajectory privacy successfully in a trustworthy and efficient manner.

.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chow, C.-Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351–380 (2011)

    Article  Google Scholar 

  2. Chow, C.-Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. Newsl. 13(1), 19–29 (2011)

    Article  Google Scholar 

  3. Li, X., Miao, M., Liu, H., Ma, J., Li, K.-C.: An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism. Soft Comput. 21(14), 3907–3917 (2017)

    Article  Google Scholar 

  4. Peddinti, S.T., Saxena, N.: On the limitations of query obfuscation techniques for location privacy. In: The Proceedings of the 13th International Conference on Ubiquitous Computing (Beijing, China). ACM (2011)

    Google Scholar 

  5. Hwang, R., Hsueh, Y., Chung, H.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)

    Article  Google Scholar 

  6. Peng, T., Liu, Q., Meng, D., Wang, G.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165–179 (2017)

    Article  Google Scholar 

  7. Ye, A., Li, Y., Li, X.: A novel location privacy-preserving scheme based on l-queries for continuous LBS. Comput. Commun. 98, 1–10 (2017)

    Article  Google Scholar 

  8. Dewri, R., Ray, I., Whitley, D.: Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. City (2010)

    Google Scholar 

  9. Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., Hubaux, J.: Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans. Dependable Secure Comput. 11(3), 266–279 (2014)

    Article  Google Scholar 

  10. Wang, P., Yang, J., Zhang, J.-P.: Protection of location privacy based on distributed collaborative recommendations. PLoS ONE 11(9), e0163053 (2016)

    Google Scholar 

  11. Lei, Y., Yu, D., Bin, Z., Yang, Y.: Interactive-means clustering method based on user behavior for different analysis target in medicine. Comput. Math. Methods Med. 2017 (2017)

    Google Scholar 

  12. Wang, J., Li, Y., Yang, D., Gao, H., Luo, G., Li, J.: achieving effective k-anonymity for query privacy in location-based services. IEEE Access 5, 24580–24592 (2017)

    Article  Google Scholar 

  13. Zheng, L., Yue, H., Li, Z., Pan, X., Wu, M., Yang, F.: k-anonymity location privacy algorithm based on clustering. IEEE Access 6, 28328–28338 (2018)

    Article  Google Scholar 

  14. Gupta, R., Rao, U.P., Kumar, M.: Perturbed Anonymization: Two Level Smart Privacy for LBS Mobile Users (2018)

    Google Scholar 

  15. Zhang, S., Choo, K.-K., Liu, Q., Wang, G.: Enhancing privacy through uniform grid and caching in location-based services. Future Gener. Comput. Syst. 86, 881–892 (2018). https://doi.org/10.1016/j.future.2017.06.022

    Article  Google Scholar 

  16. Chow, C.-Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (Arlington, Virginia, USA). ACM (2006)

    Google Scholar 

  17. Wang, P., Yang, J., Zhang, J.: A strategy toward collaborative filter recommended location service for privacy protection. Sensors 18(5), 1522 (2018)

    Article  Google Scholar 

  18. Zhang, S., Wang, G., Liu, Q., Abawajy, J.H.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18), 6121–6133 (2017)

    Article  Google Scholar 

  19. AnyLogic: AnyLogic: Multimethod Simulation Software. City (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miada Murad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Murad, M., Altwaijri, S., Khabti, J., Baazeem, I., Tian, Y. (2022). Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBS. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0852-1_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0851-4

  • Online ISBN: 978-981-19-0852-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics