Skip to main content
Log in

An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In the location-based service (LBS) privacy protection, the most common and classic solution is K-anonymity, however, existing schemes rarely consider the issue that whether other mobile users are willing to provide assistance to the requesters to form the K-anonymity set, thus leading to their poor practicability. In this paper, an incentive mechanism based on credit is introduced into the distributed K-anonymity, and only providing assistance to the others, a user can gain and accumulate his credit. Based on the fuzzy logic in the soft computing, a probability threshold is introduced to reflect a user’s reputation, and only when a user’s reputation reaches this threshold, can he get the assistance from other neighbors. Security analysis shows that our scheme is secure with respect to various typical attacks. And because of not relying on a trusted third party, our scheme can avoid the security issue resulting from its breach. Extensive experiments indicate that the time to form the anonymity set is short and it increases slowly as the value of K increases. Finally, the additional traffic introduced by this scheme is very limited.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. http://www.pewinternet.org/2013/09/12/location-based-services/.

  2. http://www.kazaa.com/.

References

  • Adar E, Huberman BA (2000) Free riding on Gnutella. First Monday 5(10):1–22

  • Ahmad MW, Ansari MA (2012) A survey: soft computing in intelligent information retrieval systems. In: Proceedings of the 12th International Conference on Computational Science and Its Applications, pp 783–796

  • Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of the 17th International Conference on World Wide Web, pp 237–246

  • Bernstein, Curve DJ (2006) New Diffie-Hellman speed records. In: Proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, pp 207–228

  • Chow CY, Mokbel MF, Aref WG (2009) Casper: query processing for location services without compromising privacy. ACM Trans Database Syst 34(4):1–24

    Article  Google Scholar 

  • Daniel J, Bernstein Niels D, Lange TJ (2012) High-speed high-security signatures. J Cryptogr Eng 2(2):77–89

    Article  MATH  Google Scholar 

  • Ficco M, Palmieri F, Castiglione A (2014) Hybrid indoor and outdoor location services for new generation mobile terminals. J Person Ubiquitiou Comput 18(2):271–285

    Article  Google Scholar 

  • Freudiger J, Shokri R, Hubaux J (2009) On the optimal placement of mix zones. In: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, pp 216–234

  • Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18

    Article  Google Scholar 

  • Golle P, Leyton-Brown K, Mironov I (2001) Incentives for sharing in peer-to-peer networks. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, pp 264–267

  • Gruteser M, Grunwal D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications,and Services, pp 163–168

  • Hernandez J, Moreno MV, Jara AJ, Skarmeta AF (2014) A soft computing based location-aware access control for smart buildings. Soft Comput 18(9):1659–1674

    Article  Google Scholar 

  • Hu H, Chen Q, Xu J (2013) VERDICT: privacy-preserving authentication of range queries in location-based services. In: Proceedings of the 29th IEEE International Conference on Data Engineering, pp 1312–1315

  • Jung T, Li XY (2013) Search me if you can: privacy-preserving location query service. In: Proceedings of the 32nd IEEE International Conference on Computer Communications, pp 2760–2768

  • Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. Proc Int Conf Pervasive Serv 2005:88–97

  • Levin D, LaCurts K (2008) BitTorrent is an Auetion:Analyzing and Improving BitTorrent’s Incentives. In: Proeeedings of the ACM SIGCOMM 2008 Conference on Data Communication, pp 243–254

  • Lien IT, Lin YH, Shieh JR (2005) A novel privacy preserving location-based service protocol with secret circular shift for k-nn search. IEEE Trans Inf Forensics Secur 8(6):863–873

    Article  Google Scholar 

  • Metre PB, Radhika KR, Gowrishankar G (2012) Survey of soft computing techniques for joint radio resource management. In: Proceedings of 2012 International Conference on Multimedia Computing and System, pp 562–565

  • Paulet R, Kaosar MG, Yi X, Bertino E (2012) Privacy-preserving and content-protecting location based queries. In: Proceedings of the 28th IEEE International Conference on Data Engineering, pp 44–53

  • Tang F, Li J, You L, Guo M (2015) Long-term location privacy protection for location-based services in mobile cloud computing. J Soft Comput (published online)

  • Trawinski K, Alonso JK, Hernandez N (2013) A multiclassifier approach for topology-based wifi indoor localization. Soft Comput 17(10):1817–1831

    Article  Google Scholar 

  • Yang DJ, Fang X, Xue GL (2013) Truthful Incentive Mechanisms for K-Anonymity Location Privacy. In: Proceedings of the 32nd IEEE International Conference on Computer Communications, pp 783–796

Download references

Acknowledgments

Funding: This study was funded by the National Natural Science Foundation of China (Nos. 61372075, U1405255, 61472310, 61202389).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghua Li.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, X., Miao, M., Liu, H. et al. An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism. Soft Comput 21, 3907–3917 (2017). https://doi.org/10.1007/s00500-016-2040-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-016-2040-2

Keywords

Navigation