Abstract
With the increase in the number of active location-based service (LBS) users, protecting the privacy of user trajectory has become a significant concern. In this paper, we propose a deviation-based query exchange (DQE) scheme that obfuscates the users’ query point to mitigate trajectory disclosure in mobile social networks (MSNs). The user finds a best matching user (BMU) in an MSN to exchange queries when a query request is issued. The DQE scheme can prevent the attacker from reconstructing the user’s trajectory by collecting data from the LBS server which records only the user’s ID and his BMUs’ locations (fake locations). By virtue of the private matching algorithm based on the matrix confusion, the DQE scheme allows LBS users to enjoy the service while preserving their privacy. In order to test the effectiveness and efficiency of the proposed scheme, we carried out extensive security and performance analyses under various conditions. The results of the experiments show that the proposed DQE scheme can protect users’ trajectory privacy effectively and reduce the overhead of the LBS server.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Brinkhoff T (2003) Generating traffic data. Bull Tech Comm Data Eng IEEE Comput Soc 26:2003
Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in spatial and temporal databases, international symposium, SSTD 2007, Boston, MA, USA. pp 258–275. 16–18 Jul 2007
Chow CY (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: ACM international symposium on geographic information systems, ACM-Gis 2006, Arlington, VA, USA. pp 171–178. 10–11 Nov 2006
Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM, New york
Dai J, Hua L (2015) A method for the trajectory privacy protection based on the segmented fake trajectory under road networks. In: International conference on information science and control engineering. pp 13–17
Ficco M, Pietrantuono R, Russo S (2016) Using multi-objective metaheuristics for the optimal selection of positioning systems. Soft Comput 20(7):2641–2664
Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200
Gao S, Ma J, Shi W, Zhan G, Sun C (2013) TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887
Huo Z, Huang Y, Meng X (2011) History trajectory privacy-preserving through graph partition. In International workshop on mobile location-based service. pp 71–78
Huo Z, Meng X, Hu H, Huang Y (2012) You can walk alone: trajectory privacy-preserving through significant stays protection. In: International conference on database systems for advanced applications. pp 351–366
Hwang RH, Hsueh YL, Chung HW (2014) A novel time-obfuscated algorithm for trajectory privacy protection. In: International symposium on pervasive systems, algorithms and networks. pp 208–215
Jin L, Palanisamy B, Joshi JBD (2014) Poster: compromising cloaking-based location privacy preserving mechanisms with location injection attacks. In: ACM SIGSAC conference on computer and communications security. pp 1439–1441
Kim HI, Kim YK, Chang JW (2013) A grid-based coaking area creation scheme for continuous LBS queries in distributed systems. JoC 4(1):23–30
Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener Comput Syst 63(C):56–75
Lei PR, Peng WC, Su J, Chang CP (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350
Li X, Miao M, Liu H, Ma J, Li KC (2016) An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Comput. doi:10.1007/s00500-016-2040-2
Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233
Niu B , Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: INFOCOM, 2014 proceedings IEEE. pp 754–762
Niu B, Zhu X, Chi H, Li H (2013) 3plus: privacy-preserving pseudo-location updating system in location-based services. In: Wireless communications and networking conference. pp 4564–4569
Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495–508
Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519
Primault V, Boutet A, Mokhtar SB, Brunie L (2016) Adaptive location privacy with alp. In: The 35th symposium on reliable distributed systems, pp 269–278
Sang Y, Shen H, Tian H, Zhang Z (2016) Achieving probabilistic anonymity in a linear and hybrid randomization model. IEEE Trans Inf Forensics Secur 11(10):2187–2202
Schlegel R, Chow CY, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172
Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux JP (2014) Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans Dependable Secur Comput 11(3):266–279
Sui X, Chen Z, Guo L, Kai W, Ma J, Wang G (2017) Social media as sensor in real world: movement trajectory detection with microblog. Soft Comput 21(3):765–779
Tang F, Li J, You I, Guo M (2016) Long-term location privacy protection for location-based services in mobile cloud computing. Soft Comput 20(5):1735–1747
Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: International conference on mobile data management. pp 65–72
Vu K, Zheng R, Gao J (2012) Efficient algorithms for k-anonymous location privacy in participatory sensing. Proc IEEE INFOCOM 131(5):2399–2407
Wang G, Du Q, Zhou W, Liu Q (2013) A scalable encryption scheme for multi-privileged group communications. J Supercomput 64(3):1075–1091
Wang X, Pande A, Zhu J, Mohapatra P (2016) Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans Netw 99:1–1
Xiao X, Chen C, Sangaiah AK, Hu G, Ye R, Jiang Y (2017) Cenlocshare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener Comput Syst. doi:10.1016/j.future.2017.01.035
Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559
Zhang S, Liu Q, Wang G (2015) Deviation-based location switching protocol for trajectory privacy protection. Springer, Berlin
Zhu X, Liu J, Jiang S, Chen Z (2014) Efficient weight-based private matching for proximity-based mobile social networks. In: IEEE international conference on communications. pp 4114–4119
Acknowledgements
This work is supported in part by the National Natural Science Foundation of China under Grant Nos. 61632009, 61472451 and 61402161, the High Level Talents Program of Higher Education in Guangdong Province under Grant No. 2016ZJ01, the Hunan Provincial Education Department of China under Grant No. 2015C0589, the Hunan Provincial Natural Science Foundation of China under Grant No. 2015JJ3046, the Fundamental Research Funds for the Central Universities of Central South University under Grant No. 2016zzts058.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there are no conflicts of interest.
Human and animal rights
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Zhang, S., Wang, G., Liu, Q. et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput 22, 6121–6133 (2018). https://doi.org/10.1007/s00500-017-2676-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-017-2676-6