Abstract
Nowadays communication by using mobile vehicle getting popularity and user experience map services like Google maps to reach at the destination. It is also clear that map services user have to reveal important information like GPS coordinates or some other personal information during this process. According to current mix-zones privacy techniques, it is revealed that, these methods are much generalized and cannot be applied to secure map services users. In this paper, we have given a novel MMLPP technique, which is specifically constructed for map services users over road network. According to this, mobile vehicle’s users to ask a path among two end points defined on the map, however not to disclose secret location and query statistics. The main concept is to place end points in such a way that, they must be near to each other, alternatively: 1) Actual statistics defined inside these end points (like GPS coordinates) must not be altered i.e. location privacy ensured. 2) The path reverted by the map services change a little, i.e. service usability must be ensured. We can re-iterate in such a way that, firstly , a mobile client extract point of interest , that is close to original end points, and then finally consider two POIs considered as shifted end points which satisfy the condition of Geo-Indistinguishability. We analyzed MMLPP technique for road network application for GTMobiSim on multiple scales of map services and experiments are conducted using real traces. It has been revealed that MMLPP has outperformed all other techniques and shows balance among location privacy and service usability.


























References
Adigun A, Amar Bensaber B, Biskri I (2013) Protocol of Change Pseudonyms for VANETs. 9th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Local Computer Networks Workshops (LCN Workshops), 2013 I.E. 38th Conference on. pp. 162–7, ISBN: 978–1–4799-0539-3, 21–24 October 2013, Sydney, NSW
Adu-Gyamfi D, Wang Y, Zhang F, Domenic MK, Memon I, Gustav YH (2013) Modeling the spreading behavior of passive worms in mobile social networks. 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 2013.
Akhtar R, Amin NU, Memon I, Shah M (2012) Implementation of secure AODV in MANET. International Conference on Graphic and Image Processing, 876803–876803-5
Akhtar R, Leng S, Wu F, Memon I (2013) Improvement of content delivery in Mobile Social Networks. In: Computational Problem-solving (ICCP), 2013 International Conference on 2013 Oct 26, pp 139–143, IEEE
Akhtar R, Leng S, Memon I, Ali M, Zhang L (2014) Architecture of hybrid mobile social networks for efficient content delivery. Wirel Pers Commun 80(1):85–96
Arain QA, Zhongliang D, Memon I, Arain S, Shaikh FK, Zubedi A, Unar MA, Ashraf A, Shaikh R (2016a) Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Pers Commun 1–17. doi:10.1007/s11277-016-3906-4
Arain QA, Uqaili MA, Deng Z, Memon I, Jiao J, Shaikh MA, Zubedi A, Ashraf A, Arain UA (2016b) Clustering based energy efficient and communication protocol for multiple mix-zones over road networks. Wireless Pers Commun 1–18. doi:10.1007/s11277-016-3900-x
Baidu Map. http://lbsyun.baidu.com/index.php?title=androidsdk. Accessed 1 Dec 2015
Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th international conference on World Wide Web 2008 Apr 21, pp 237–246, ACM
Bao J, Chen H, Ku WS et al. (2009) Pros: a peer-to-peer system for location privacy protection on road networks. In: 17th ACM SIGSPATIAL international conference on advances in geographic information systems (GIS), 2009, p 552–3
Bing Maps. http://www.bing.com/maps
Buttyán L, Holczer T, Weimerskirch A (Oct 2009) Whyte W (2009) slow: a practical pseudonym changing scheme for location privacy in vanets. IEEE Vehicular Networking Conference 1–8
Yeong-Sheng Chen, Tang-Te Lo, Chiu-Hua Lee, Ai-Chun Pang (2013). Efficient Pseudonym Changing Schemes for Location Privacy Protection in VANETs.2013 International Conference on Connected Vehicles and Expo (ICCVE). doi:10.1109/ICCVE.2013.185
Chow C-Y, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of 10th international conference on advances in spatial and temporal databases (SSTD); 2007. p. 258–73.
Chow C-Y, Mokbel MF, Bao J, Liu X et al (2011) Query-aware location anonymization for road networks. GeoInformatica 15(3):571–607
Foursqure. http://foursquare.com
Freudiger J, Raya M, Félegyházi M, Papadimitratos P, Hubaux J-P (2007) Mixzones for location privacy in vehicular networks. ACM Win-ITS, 2007
Freudiger J, Manshaei H et al (2009) On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the ACM conference on computer and communications security(CCS). ACM, Chicago, pp 324–337
Freudiger J, Manshaei MH, Boudec J-YL, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. INFOCOM, 2010 Proceedings IEEE, pp 1–9, March 2010
Gao K, Zhu Y, Gong S, Tan H (2016) Location privacy protection algorithm for mobile networks. J Wireless Com Network 2016:205. doi:10.1186/s13638-016-0708-z
Google Maps. http://map.google.com
Google Maps Has 150 Million Mobile Users. http://news.softpedia.com/news/Google-Maps-Has-150-Million-Mobile-Users-189262.shtml
Guo S, Zeng D, Xiang Y (2014) Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications. Parallel and Distributed Systems, IEEE Transactions on, Issue Date: Nov 2014
Gustav YH, Wang Y, Kamenyi DM, Zhang F, Memon I (2013) Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) p 433–436. doi:10.1109/ICCPS.2013.6893578
Haas JJ, Hu Y-C, Laberteaux KP et al. (2009) Real-world VANET security protocol performance. In: Proceedings of the 28th IEEE conference on global telecommunications. Hawaii, USA; 2009. p 2629–35
Hao S, Wang W, Yan Y, Bruzzone L (2017) Class-wise dictionary learning for hyperspectral image classification. Neurocomputing 220:121–129
Huan Q, Avramopoulos IC, Kobayashi H, Liu B (2005) Secure data forwarding in wireless ad hoc networks. In: Communications. ICC 2005. 2005 I.E. International Conference on 2005 May 16 (Vol. 5, pp. 3525–3531). IEEE
Huang L, Matsuura K, Yamane H, Sezaki K (2006) Silent cascade: enhancing location privacy without communication QoS degradation. Proceedings of SPC, In, pp 165–180
Huang X, Kang J, Yu R (2015) Optimal roadside unit placement with location privacy enhancement in vehicular social network. 5th International Conference on Information Science and Technology (ICIST), 2015. doi:10.1109/ICIST.2015.7288978
Hubaux JP, Capkun S, Luo J et al (2004) The security and privacy of smart vehicles. IEEE Sec Privacy Mag 2(3):49–55
Kainis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733
M. Kamenyi Domenic, Yong Wan, Fengli Zhang, Imran Memon, Yankson H. Gustav (2013) Preserving users' privacy for continuous query services in road networks. 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 2013. doi:10.1109/ICIII.2013.6702947
Kamenyi DM, Wang Y, Zhang F, Memon I (2013) Authenticated privacy preserving for continuous query in location based services. J Comput Inf Syst 9(24):9857–9864
Kolahdouzan M, Shahabi C (2004) Voronoi-based K nearest neighbor search for spatial network databases. In: Thirtieth international conference on very large data bases, vol. 30 (VLDB), p 840–51
Ku WS, Zimmermann R, Peng WC (2007) Shroff S. Privacy protected query processing on spatial networks. In: 2007 I.E. 23rd international conference on data engineering workshop (PDM), p 215–20
Li XY, Jung T (2013) Search me if you can: privacy-preserving location query service. Proceedings of the IEEE INFOCOM, In
Liu F, Hua KA, Cai Y (2009) Query l-diversity in location-based services. In: Mobile Data Management: Systems, Services and Middleware. MDM’09. Tenth International Conference on 2009 May 18 (pp. 436–442), IEEE
Liu XX, Zhao H, Pan M, Yue H, Li X, Fang Y et al (2012a) Traffic-aware multiple mix zone placement for protecting location privacy. In YIEEE INFOCOM 2012:972–980
Xinxin Liu, Han Zhao, Miao Pan, Hao Yue, Xiaolin Li and Yuguang Fang (2012b) Traffic-Aware Multiple Mix Zone Placement for Protecting Location Privacy. Proceedings IEEE INFOCOM, pp 972–980. doi:10.1109/INFCOM.2012.6195848
Lu R, Lin X, Luan TH, Liang X, Shen XS (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans Veh Technol 61(1):86–96
Memon I (2015a) Authentication User’s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services. Wirel Pers Commun 82(3):1585–1600
Memon I (2015b) A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wirel Pers Commun 85(3):1167–1191
Memon I, Arain QA (2016) Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web:1–33. doi:10.1007/s11280-016-0403-3
Memon I, Mangi FA, Jamro DA (2013) Collision avoidance of intelligent service robot for industrial security system. IJCSI Intern J Comp Sci Issue 10(2):3
Memon I, Mohammed MR, Akhtar R, Memon H, Memon MH, Shaikh RA (2014) Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wirel Pers Commun 79(1):661–686
Memon I, Chen L, Majid A, Lv M, Hussain I, Chen G (2015a) Travel recommendation using geo-tagged photos in social Medi a for tourist. Wirel Pers Commun 80:1347–1362. doi:10.1007/s11277-014-2082-7
Memon I, Hussain I, Akhtar R, Chen G (2015b) Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel Pers Commun 84(2):1487–1508
Memon I, Ali Q, Zubedi A, Mangi FA (2016a) DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimed Tools Appl:1–30. doi:10.1007/s11042–016-4154-z
Memon MH, Li J-P, Memon I, Arain QA (2016b) GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations. Multimed Tool Appl:1–35. doi:10.1007/s11042–016-3834-z
Meyerowitz J, Choudhury R (2009) Hiding stars with fireworks: location privacy through camouflage. MOBICOM, In
Mokbel MF, Chow CY, Aref WG (2006) The new Casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on very large data bases 2006 Sep 1, pp 763–774, VLDB Endowment
Mouratidis K, Yiu ML (2010) Anonymous query processing in road networks. IEEE Trans Knowl Data Eng 22(1):2–15
Narayanan A, Thiagarajan N, Lakhani M, Hamburg M, Boneh D et al (2011) Location privacy via private proximity testing. Proceedings of the network distributed system security conference, In
Olumofin F, Tysowski PK, Goldberg I, Hengartner U (2010). Achieving efficient query privacy for location based services. In: 10th international conference on privacy enhancing technologies (PETS), p 93–110
Palanisamy B, Liu L (2011a) MobiMix: Protecting location privacy with mix-zones over road networks. In: 2011 I.E. 27th international conference on data engineering (ICDE), p 494–505
Palanisamy B, Liu L (2011b) MobiMix: protecting location privacy with mix zones over road networks. Proc. of 27th IEEE International Conference on Data Engineering (ICDE’11), pp 494–505
Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495–508
Pan Y, Li J (2013) Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J Netw Comput Appl 36:1599–1609
Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519
Papadopoulos S, Bakiras S, Papadias D (2010) Nearest neighbor search with strong location privacy. Proceedings of the VLDB endowment, In
Pesti P, Bamba B, Doo M, Liu L, Palanisamy B (2009) http://code.google.com/p/gt-mobisim/ Weber M (2009) GTMobiSIM: a mobile trace generator for road networks. College of Computing, Georgia Institute of Technology
Pingley A, Zhang N, Fu XW, Choi H-A, Subramaniam S, Zhao W et al. (2011a) Protection of query privacy for continuous location based services. IEEE INFOCOM, pp 1710–1718
Pingley A, Zhang N, Fu XW, Choi H-A, Subramaniam S, Zhao W (2011b) Protection of query privacy for continuous location based services. IEEE INFOCOM, pp 1710–1718
Sadhukhan P, Chatterjee N, Das A (Dec 2010) Das PK (2010) a scalable location-based services infrastructure combining gps and bluetooth based positioning for providing services in ubiquitous environment. IMSAA 2010:15–17
Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04. Computer Science Laboratory, SRI International
Shiode N, Li C, Batty M, Longley P, Maguire D (2002) The impact and penetration of location-based services. CASA Working Paper 50 http://www.casa.ucl.ac.uk/working_papers/paper50.pdf. Accessed 23 June 2010
Sun Y, Zhang B, Zhao B, Xiangyu S, Jinshu S (2015) Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Netw Appl 8:1108–1121
G Sun, D Liao, H Li, H Yu, V Chang (2016) L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems. 9th September 2016. doi:10.1016/j.future.2016.08.023
U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. Available at http://www.census.gov/geo/www/tiger/
U.S. Geological Survey. http://www.usgs.gov
Virrantaus K, Markkula J, Garmash A, Terziyan V, Veijalainen J, Katanosov A et al. (2001) Developing GIS-supported location-based services. In: Proc. of the international conference on Web information systems engineering (Vol. 2, pp 66–75)
Wang T, Liu L (2009a) Privacy-Aware Mobile Services over Road Networks. In VLDB
Wang T, Liu L (2009b) Privacy-aware mobile services over road networks. Proceedings of the VLDB endowment 2(1):1042–1053
Wang Y, Xia Y, Hou J, Gao SM, Nie X, Wang Q (2015) A fast privacy-preserving framework for continuous location-based queries in road networks. J Netw Comput Appl 53:57–73
Wang W, Cui Z, Yan Y, Feng J, Yan S, Shu X, Sebe N (2016a) Recurrent face aging. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, In, pp 2378–2386
Wang W, Yan Y, Winkler S, Sebe N (2016b) Category specific dictionary learning for attribute specific feature selection. IEEE Trans Image Process 25(3):1465–1478
Wang W, Yan Y, Zhang L, Hong R, Sebe N (2016c) Collaborative sparse coding for multiview action recognition. IEEE MultiMedia 23(4):80–87
Yahoo Maps. http://maps.yahoo.com
Yan C, Zhang Y, Dai F, Li L (2013) Highly parallel framework for HEVC motion estimation on many-core platform. In Data Compression Conference (DCC), 2013 Mar 20, pp 63–72. IEEE
Yan C, Zhang Y, Xu J, Dai F, Li L, Dai Q, Wu F (2014a) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21(5):573–576
Yan C, Zhang Y, Xu J, Dai F, Zhang J, Dai Q, Wu F (2014b) Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trans Circ Sys Vid Technol 24(12):2077–2089
Yan C, Zhang Y, Dai F, Wang X, Li L, Dai Q ( 2014c) Parallel deblocking filter for HEVC on many-core processor. Electronics Letters. 27:50(5):367–8.
Yan C, Zhang Y, Dai F, Zhang J, Li L, Dai Q (2014d) Efficient parallel HEVC intra-prediction on many-core processor. Electronics Letters 22;50(11):805–6.
KT Yang, GM Chiu, HJ Lyu, DJ Huang (2012) Path privacy protection in continuous location-based services over road networks .IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2012. doi: 10.1109/WiMOB.2012.6379110
Yelp. http://www.yelp.com
Ying B, Makraki D (2015) Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks. IEEE ICC 2015- Communications software, services and multimedia applicaations symposium
Ying B, Makrakis D (2015) Pseudonym changes scheme based on candidate-location-list in vehicular networks. In: IEEE international conference on communications (ICC), p 2015. doi:10.1109/ICC.2015.7249491
Yu R, Kang J, Huang X, Xie S, Zhang Y (2016) MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans Depend Secure Comp 13(1):3–105
Zuberi R, Ahmad S (2016) Secure mix-zones for privacy protection of road network location based services users. J Comput Netw Commun
Acknowledgements
This research has been funded by The National High Technology Research and Development Program of China (NO.2014AA123103, NO.2015AA124103) and National Natural Science Foundation of China (NO.61401040, NO.61372110).
Author information
Authors and Affiliations
Corresponding author
Additional information
Qasim Ali Arain & Imran Memon contributed equally to this work.
Rights and permissions
About this article
Cite this article
Arain, Q.A., Memon, I., Deng, Z. et al. Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimed Tools Appl 77, 5563–5607 (2018). https://doi.org/10.1007/s11042-017-4469-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4469-4