Skip to main content
Log in

An Efficient Approach for Privacy-Preserving of the Client’s Location and Query in M-Business Supplying LBS Services

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

Privacy-preserving in mobile business supplying location-based services (LBS) has the potential to become a primary concern for clients and service providers. In m-business providing LBS services, a client sends its exact locations to service providers. This data may involve sensitive and private personal information. Therefore, the misuse of location information by service providers creates privacy issues for clients. Moreover, the query must not be linked to the mobile client, even if the location information is exposed willingly by her/him to obtain specific services. Thus, there are location cloaking algorithms that allow the protection of the location privacy of mobile users. Hence, many temporal and spatial approaches to cloaking a specific user’s location have been proposed. Different from the existing methods, the current works define location and query privacy separately. Therefore, in this paper, we investigate the issues related to the mobile client privacy. Mainly, we aim to preserve the client location privacy as well as the continuous queries privacy, where mobile clients continuously emit different queries during their travels. It’s on this premise that we propose a new clique-based cloaking algorithm named Mobile Clique Cloak (MCC) to preserve the mobile client’s privacy in the M-business providing LBS services. Also, to build the cloaking region in our approach, we take into account the similarity of client velocity and direction to obtain a right balance between quality of service QoS and privacy. Furthermore, we generate different realistic dummies instead of dropping the query; thus, all queries will be processed even in the case of k−1 other mobile clients’ queries cannot be found. Moreover, our work deals with a series of attacks in the same cloaking process (location attack, tracking attack, query sampling attacks and homogenous attack). We evaluate our approach from three aspects: privacy guaranty, quality of service and performance. Experimental evaluation of our algorithms on a real world map shows that our approach ensures total privacy for clients and protects the privacy of clients during the entire query period whiles allowing clients’ choice of privacy requirements. Besides, we compare our algorithm with existing privacy protection algorithms such as V-DCA, D-TC and GCA. According to the evaluation results and a comparison of the algorithms, our algorithm MCC can make a good balance between quality of service, performance and privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. S. Steiniger, M. Neun, A. Edwardes, Foundations of location based services lesson 1 cartouche 1- lecture notes on lbs, v. 1.0 2008.

  2. C. Piao, X. Li, X. Pan and C. Zhang, User privacy protection for a mobile commerce alliance, Electronic Commerce Research and Applications, Vol. 18, pp. 58–70, 2016.

    Article  Google Scholar 

  3. R. Al-Dhubhani, J.M. Cazalas, An adaptive geo-indistinguishability mechanism for continuous lbs queries. Wireless Networks pp. 1–19, 2017.

  4. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, K.L. Tan, Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (pp. 121–132. ACM 2008).

  5. B. Gedik, L. Liu, Location privacy in mobile systems: A personalized anonymization model. In: ICDCS 2005 Proceedings 25th IEEE international conference on distributed computing systems, (pp. 620–629. IEEE 2005).

  6. M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on Mobile systems, applications and services, (pp. 31–42. ACM 2003).

  7. H. Kido, Y. Yanagisawa, T. Satoh, Protection of location privacy using dummies for location-based services. In: 21st International Conference on Data Engineering Workshops, 2005, (pp. 1248–1248. IEEE, 2005).

  8. H. Lu, C. Jensen, M. Yiu, A3d: Anonymity area aware, dummy-based location privacy in mobile services. In: Proc. Data Eng. for Wireless and Mobile Access (MobiDE’08) 2008.

  9. M.F. Mokbel, C.Y. Chow, W.G. Aref, The new casper: Query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on Very large data bases, pp. 763–774. VLDB Endowment 2006.

  10. U. Hengartner, Hiding location information from location-based services. In: 2007 International Conference on Mobile Data Management, (pp. 268–272. IEEE 2007).

  11. F. Anuar, U. Gretzel, Privacy concerns in the context of location-based services for tourism. In: ENTER 2011 Conference, 2011.

  12. J. V. Chen, W. Ross and S. F. Huang, Privacy, trust, and justice considerations for location-based mobile telecommunication services, Info, Vol. 10, No. 4, pp. 30–45, 2008.

    Article  Google Scholar 

  13. C. Piao, S. Dong, L. Cui, A novel scheme on service recommendation for mobile users based on location privacy protection. In: IEEE 10th International Conference on e-Business Engineering (ICEBE), 2013, pp. 300–305. IEEE 2013.

  14. A. R. Beresford and F. Stajano, Location privacy in pervasive computing, IEEE Pervasive Computing, Vol. 2, No. 1, pp. 46–55, 2003.

    Article  Google Scholar 

  15. I. Memon, Authentication user’s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services, Wireless Personal Communications, Vol. 82, No. 3, pp. 1585–1600, 2015.

    Article  Google Scholar 

  16. X. Pan, J. Xu and X. Meng, Protecting location privacy against location-dependent attacks in mobile services, IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 8, pp. 1506–1519, 2012.

    Article  Google Scholar 

  17. S. Saravanan and B. S. Ramakrishnan, Preserving privacy in the context of location based services through location hider in mobile-tourism, Information Technology & Tourism, Vol. 16, No. 2, pp. 229–248, 2016.

    Article  Google Scholar 

  18. J. Um, H. Kim, Y. Choi, J. Chang, A new grid-based cloaking algorithm for privacy protection in location-based services. In: 11th IEEE International Conference on High Performance Computing and Communications, 2009. HPCC’09, pp. 362–368. IEEE 2009.

  19. B. Bamba, L. Liu, P. Pesti, T. Wang, Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th international conference on World Wide Web, (pp. 237–246. ACM, 2008).

  20. H. Lee, B.S. Oh, H.i. Kim, J. Chang, Grid-based cloaking area creation scheme supporting continuous location-based services. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, (pp. 537–543. ACM 2012).

  21. T. Xu, Y. Cai, Location anonymity in continuous location-based services. In: Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems, p. 39. ACM 2007.

  22. Y. Wang, L.p. He, J. Peng, T.t. Zhang, H.z. Li, Privacy preserving for continuous query in location based services. In: IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS), 2012, pp. 213–220. IEEE 2012.

  23. L. Sweeney, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 10, No. 05, pp. 557–570, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  24. Y.H. Gustav, Y. Wang, M.K. Domenic, F. Zhang, I. Memon, Velocity similarity anonymization for continuous query location based services. In: 2013 International conference on computational problem-solving (ICCP), (pp. 433–436. IEEE 2013).

  25. G. Ghinita, M.L. Damiani, C. Silvestri, E. Bertino, Preventing velocity-based linkage attacks in location-aware applications. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (pp. 246–255. ACM 2009).

  26. F. Liu, K.A. Hua, Y. Cai, Query l-diversity in location-based services. In: MDM’09. Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009, (pp. 436–442. IEEE, 2009).

  27. L. Stenneth, S.Y. Phillip, O. Wolfson, Mobile systems location privacy:“mobipriv” a robust k anonymous system. In: IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2010, pp. 54–63. IEEE 2010.

  28. C. Y. Chow, M. F. Mokbel, J. Bao and X. Liu, Query-aware location anonymization for road networks, GeoInformatica, Vol. 15, No. 3, pp. 571–607, 2011.

    Article  Google Scholar 

  29. H. Kido, Y. Yanagisawa, T. Satoh, An anonymous communication technique using dummies for location-based services. In: ICPS’05 Proceedings International Conference on Pervasive Services, 2005, (pp. 88–97. IEEE, 2005).

  30. T.H. You, W.C. Peng, W.C. Lee, Protecting moving trajectories with dummies. In: International Conference on Mobile Data Management, 2007, pp. 278–282. IEEE 2007.

  31. C.Y. Chow, M. Mokbel, Enabling private continuous queries for revealed user locations. Advances in Spatial and Temporal Databases (pp. 258–275, 2007).

  32. T. Brinkhoff, A framework for generating network-based moving objects, GeoInformatica, Vol. 6, No. 2, pp. 153–180, 2002.

    Article  MATH  Google Scholar 

  33. L. Stenneth, P. Yu, Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries. In: 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), pp. 1–10. IEEE 2010.

  34. X. Pan, X. Meng, J. Xu, Distortion-based anonymity for continuous queries in location-based mobile services. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 256–265. ACM 2009.

Download references

Acknowledgements

This research was partially supported by Intelligent Computer Science Laboratory LINFI of Algeria and LRI Laboratory of Morocco. We thank our colleagues from computer science department of Biskra and Rabat who provided insight and expertise that greatly assisted the research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Aloui.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aloui, A., Kazar, O., Bourekkache, S. et al. An Efficient Approach for Privacy-Preserving of the Client’s Location and Query in M-Business Supplying LBS Services. Int J Wireless Inf Networks 27, 433–454 (2020). https://doi.org/10.1007/s10776-020-00478-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-020-00478-4

Keywords

Navigation