Skip to main content
Log in

Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays communication by using mobile vehicle getting popularity and user experience map services like Google maps to reach at the destination. It is also clear that map services user have to reveal important information like GPS coordinates or some other personal information during this process. According to current mix-zones privacy techniques, it is revealed that, these methods are much generalized and cannot be applied to secure map services users. In this paper, we have given a novel MMLPP technique, which is specifically constructed for map services users over road network. According to this, mobile vehicle’s users to ask a path among two end points defined on the map, however not to disclose secret location and query statistics. The main concept is to place end points in such a way that, they must be near to each other, alternatively: 1) Actual statistics defined inside these end points (like GPS coordinates) must not be altered i.e. location privacy ensured. 2) The path reverted by the map services change a little, i.e. service usability must be ensured. We can re-iterate in such a way that, firstly , a mobile client extract point of interest , that is close to original end points, and then finally consider two POIs considered as shifted end points which satisfy the condition of Geo-Indistinguishability. We analyzed MMLPP technique for road network application for GTMobiSim on multiple scales of map services and experiments are conducted using real traces. It has been revealed that MMLPP has outperformed all other techniques and shows balance among location privacy and service usability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

References

  1. Adigun A, Amar Bensaber B, Biskri I (2013) Protocol of Change Pseudonyms for VANETs. 9th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Local Computer Networks Workshops (LCN Workshops), 2013 I.E. 38th Conference on. pp. 162–7, ISBN: 978–1–4799-0539-3, 21–24 October 2013, Sydney, NSW

  2. Adu-Gyamfi D, Wang Y, Zhang F, Domenic MK, Memon I, Gustav YH (2013) Modeling the spreading behavior of passive worms in mobile social networks. 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 2013.

  3. Akhtar R, Amin NU, Memon I, Shah M (2012) Implementation of secure AODV in MANET. International Conference on Graphic and Image Processing, 876803–876803-5

  4. Akhtar R, Leng S, Wu F, Memon I (2013) Improvement of content delivery in Mobile Social Networks. In: Computational Problem-solving (ICCP), 2013 International Conference on 2013 Oct 26, pp 139–143, IEEE

  5. Akhtar R, Leng S, Memon I, Ali M, Zhang L (2014) Architecture of hybrid mobile social networks for efficient content delivery. Wirel Pers Commun 80(1):85–96

  6. Arain QA, Zhongliang D, Memon I, Arain S, Shaikh FK, Zubedi A, Unar MA, Ashraf A, Shaikh R (2016a) Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Pers Commun 1–17. doi:10.1007/s11277-016-3906-4

  7. Arain QA, Uqaili MA, Deng Z, Memon I, Jiao J, Shaikh MA, Zubedi A, Ashraf A, Arain UA (2016b) Clustering based energy efficient and communication protocol for multiple mix-zones over road networks. Wireless Pers Commun 1–18. doi:10.1007/s11277-016-3900-x

  8. Baidu Map. http://lbsyun.baidu.com/index.php?title=androidsdk. Accessed 1 Dec 2015

  9. Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th international conference on World Wide Web 2008 Apr 21, pp 237–246, ACM

  10. Bao J, Chen H, Ku WS et al. (2009) Pros: a peer-to-peer system for location privacy protection on road networks. In: 17th ACM SIGSPATIAL international conference on advances in geographic information systems (GIS), 2009, p 552–3

  11. Bing Maps. http://www.bing.com/maps

  12. Buttyán L, Holczer T, Weimerskirch A (Oct 2009) Whyte W (2009) slow: a practical pseudonym changing scheme for location privacy in vanets. IEEE Vehicular Networking Conference 1–8

  13. Yeong-Sheng Chen, Tang-Te Lo, Chiu-Hua Lee, Ai-Chun Pang (2013). Efficient Pseudonym Changing Schemes for Location Privacy Protection in VANETs.2013 International Conference on Connected Vehicles and Expo (ICCVE). doi:10.1109/ICCVE.2013.185

  14. Chow C-Y, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of 10th international conference on advances in spatial and temporal databases (SSTD); 2007. p. 258–73.

  15. Chow C-Y, Mokbel MF, Bao J, Liu X et al (2011) Query-aware location anonymization for road networks. GeoInformatica 15(3):571–607

    Article  Google Scholar 

  16. Foursqure. http://foursquare.com

  17. Freudiger J, Raya M, Félegyházi M, Papadimitratos P, Hubaux J-P (2007) Mixzones for location privacy in vehicular networks. ACM Win-ITS, 2007

  18. Freudiger J, Manshaei H et al (2009) On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the ACM conference on computer and communications security(CCS). ACM, Chicago, pp 324–337

    Google Scholar 

  19. Freudiger J, Manshaei MH, Boudec J-YL, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. INFOCOM, 2010 Proceedings IEEE, pp 1–9, March 2010

  20. Gao K, Zhu Y, Gong S, Tan H (2016) Location privacy protection algorithm for mobile networks. J Wireless Com Network 2016:205. doi:10.1186/s13638-016-0708-z

    Article  Google Scholar 

  21. Google Maps. http://map.google.com

  22. Google Maps Has 150 Million Mobile Users. http://news.softpedia.com/news/Google-Maps-Has-150-Million-Mobile-Users-189262.shtml

  23. Guo S, Zeng D, Xiang Y (2014) Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications. Parallel and Distributed Systems, IEEE Transactions on, Issue Date: Nov 2014

  24. Gustav YH, Wang Y, Kamenyi DM, Zhang F, Memon I (2013) Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) p 433–436. doi:10.1109/ICCPS.2013.6893578

  25. Haas JJ, Hu Y-C, Laberteaux KP et al. (2009) Real-world VANET security protocol performance. In: Proceedings of the 28th IEEE conference on global telecommunications. Hawaii, USA; 2009. p 2629–35

  26. Hao S, Wang W, Yan Y, Bruzzone L (2017) Class-wise dictionary learning for hyperspectral image classification. Neurocomputing 220:121–129

    Article  Google Scholar 

  27. Huan Q, Avramopoulos IC, Kobayashi H, Liu B (2005) Secure data forwarding in wireless ad hoc networks. In: Communications. ICC 2005. 2005 I.E. International Conference on 2005 May 16 (Vol. 5, pp. 3525–3531). IEEE

  28. Huang L, Matsuura K, Yamane H, Sezaki K (2006) Silent cascade: enhancing location privacy without communication QoS degradation. Proceedings of SPC, In, pp 165–180

    Google Scholar 

  29. Huang X, Kang J, Yu R (2015) Optimal roadside unit placement with location privacy enhancement in vehicular social network. 5th International Conference on Information Science and Technology (ICIST), 2015. doi:10.1109/ICIST.2015.7288978

  30. Hubaux JP, Capkun S, Luo J et al (2004) The security and privacy of smart vehicles. IEEE Sec Privacy Mag 2(3):49–55

    Article  Google Scholar 

  31. Kainis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733

    Article  Google Scholar 

  32. M. Kamenyi Domenic, Yong Wan, Fengli Zhang, Imran Memon, Yankson H. Gustav (2013) Preserving users' privacy for continuous query services in road networks. 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 2013. doi:10.1109/ICIII.2013.6702947

  33. Kamenyi DM, Wang Y, Zhang F, Memon I (2013) Authenticated privacy preserving for continuous query in location based services. J Comput Inf Syst 9(24):9857–9864

    Google Scholar 

  34. Kolahdouzan M, Shahabi C (2004) Voronoi-based K nearest neighbor search for spatial network databases. In: Thirtieth international conference on very large data bases, vol. 30 (VLDB), p 840–51

  35. Ku WS, Zimmermann R, Peng WC (2007) Shroff S. Privacy protected query processing on spatial networks. In: 2007 I.E. 23rd international conference on data engineering workshop (PDM), p 215–20

  36. Li XY, Jung T (2013) Search me if you can: privacy-preserving location query service. Proceedings of the IEEE INFOCOM, In

    Google Scholar 

  37. Liu F, Hua KA, Cai Y (2009) Query l-diversity in location-based services. In: Mobile Data Management: Systems, Services and Middleware. MDM’09. Tenth International Conference on 2009 May 18 (pp. 436–442), IEEE

  38. Liu XX, Zhao H, Pan M, Yue H, Li X, Fang Y et al (2012a) Traffic-aware multiple mix zone placement for protecting location privacy. In YIEEE INFOCOM 2012:972–980

    Google Scholar 

  39. Xinxin Liu, Han Zhao, Miao Pan, Hao Yue, Xiaolin Li and Yuguang Fang (2012b) Traffic-Aware Multiple Mix Zone Placement for Protecting Location Privacy. Proceedings IEEE INFOCOM, pp 972–980. doi:10.1109/INFCOM.2012.6195848

  40. Lu R, Lin X, Luan TH, Liang X, Shen XS (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans Veh Technol 61(1):86–96

    Article  Google Scholar 

  41. Memon I (2015a) Authentication User’s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services. Wirel Pers Commun 82(3):1585–1600

    Article  Google Scholar 

  42. Memon I (2015b) A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wirel Pers Commun 85(3):1167–1191

    Article  Google Scholar 

  43. Memon I, Arain QA (2016) Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web:1–33. doi:10.1007/s11280-016-0403-3

  44. Memon I, Mangi FA, Jamro DA (2013) Collision avoidance of intelligent service robot for industrial security system. IJCSI Intern J Comp Sci Issue 10(2):3

    Google Scholar 

  45. Memon I, Mohammed MR, Akhtar R, Memon H, Memon MH, Shaikh RA (2014) Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wirel Pers Commun 79(1):661–686

    Article  Google Scholar 

  46. Memon I, Chen L, Majid A, Lv M, Hussain I, Chen G (2015a) Travel recommendation using geo-tagged photos in social Medi a for tourist. Wirel Pers Commun 80:1347–1362. doi:10.1007/s11277-014-2082-7

    Article  Google Scholar 

  47. Memon I, Hussain I, Akhtar R, Chen G (2015b) Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel Pers Commun 84(2):1487–1508

    Article  Google Scholar 

  48. Memon I, Ali Q, Zubedi A, Mangi FA (2016a) DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimed Tools Appl:1–30. doi:10.1007/s11042–016-4154-z

  49. Memon MH, Li J-P, Memon I, Arain QA (2016b) GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations. Multimed Tool Appl:1–35. doi:10.1007/s11042–016-3834-z

  50. Meyerowitz J, Choudhury R (2009) Hiding stars with fireworks: location privacy through camouflage. MOBICOM, In

    Book  Google Scholar 

  51. Mokbel MF, Chow CY, Aref WG (2006) The new Casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on very large data bases 2006 Sep 1, pp 763–774, VLDB Endowment

  52. Mouratidis K, Yiu ML (2010) Anonymous query processing in road networks. IEEE Trans Knowl Data Eng 22(1):2–15

    Article  Google Scholar 

  53. Narayanan A, Thiagarajan N, Lakhani M, Hamburg M, Boneh D et al (2011) Location privacy via private proximity testing. Proceedings of the network distributed system security conference, In

    Google Scholar 

  54. Olumofin F, Tysowski PK, Goldberg I, Hengartner U (2010). Achieving efficient query privacy for location based services. In: 10th international conference on privacy enhancing technologies (PETS), p 93–110

  55. Palanisamy B, Liu L (2011a) MobiMix: Protecting location privacy with mix-zones over road networks. In: 2011 I.E. 27th international conference on data engineering (ICDE), p 494–505

  56. Palanisamy B, Liu L (2011b) MobiMix: protecting location privacy with mix zones over road networks. Proc. of 27th IEEE International Conference on Data Engineering (ICDE’11), pp 494–505

  57. Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495–508

    Article  Google Scholar 

  58. Pan Y, Li J (2013) Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J Netw Comput Appl 36:1599–1609

    Article  Google Scholar 

  59. Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519

    Article  Google Scholar 

  60. Papadopoulos S, Bakiras S, Papadias D (2010) Nearest neighbor search with strong location privacy. Proceedings of the VLDB endowment, In

    Google Scholar 

  61. Pesti P, Bamba B, Doo M, Liu L, Palanisamy B (2009) http://code.google.com/p/gt-mobisim/ Weber M (2009) GTMobiSIM: a mobile trace generator for road networks. College of Computing, Georgia Institute of Technology

    Google Scholar 

  62. Pingley A, Zhang N, Fu XW, Choi H-A, Subramaniam S, Zhao W et al. (2011a) Protection of query privacy for continuous location based services. IEEE INFOCOM, pp 1710–1718

  63. Pingley A, Zhang N, Fu XW, Choi H-A, Subramaniam S, Zhao W (2011b) Protection of query privacy for continuous location based services. IEEE INFOCOM, pp 1710–1718

  64. Sadhukhan P, Chatterjee N, Das A (Dec 2010) Das PK (2010) a scalable location-based services infrastructure combining gps and bluetooth based positioning for providing services in ubiquitous environment. IMSAA 2010:15–17

    Google Scholar 

  65. Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04. Computer Science Laboratory, SRI International

  66. Shiode N, Li C, Batty M, Longley P, Maguire D (2002) The impact and penetration of location-based services. CASA Working Paper 50 http://www.casa.ucl.ac.uk/working_papers/paper50.pdf. Accessed 23 June 2010

  67. Sun Y, Zhang B, Zhao B, Xiangyu S, Jinshu S (2015) Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Netw Appl 8:1108–1121

    Article  Google Scholar 

  68. G Sun, D Liao, H Li, H Yu, V Chang (2016) L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems. 9th September 2016. doi:10.1016/j.future.2016.08.023

  69. U.S. Census Bureau.TIGER, TIGER/Line and TIGER-related products. Available at http://www.census.gov/geo/www/tiger/

  70. U.S. Geological Survey. http://www.usgs.gov

  71. Virrantaus K, Markkula J, Garmash A, Terziyan V, Veijalainen J, Katanosov A et al. (2001) Developing GIS-supported location-based services. In: Proc. of the international conference on Web information systems engineering (Vol. 2, pp 66–75)

  72. Wang T, Liu L (2009a) Privacy-Aware Mobile Services over Road Networks. In VLDB

  73. Wang T, Liu L (2009b) Privacy-aware mobile services over road networks. Proceedings of the VLDB endowment 2(1):1042–1053

    Article  MathSciNet  Google Scholar 

  74. Wang Y, Xia Y, Hou J, Gao SM, Nie X, Wang Q (2015) A fast privacy-preserving framework for continuous location-based queries in road networks. J Netw Comput Appl 53:57–73

  75. Wang W, Cui Z, Yan Y, Feng J, Yan S, Shu X, Sebe N (2016a) Recurrent face aging. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, In, pp 2378–2386

    Google Scholar 

  76. Wang W, Yan Y, Winkler S, Sebe N (2016b) Category specific dictionary learning for attribute specific feature selection. IEEE Trans Image Process 25(3):1465–1478

    Article  MathSciNet  Google Scholar 

  77. Wang W, Yan Y, Zhang L, Hong R, Sebe N (2016c) Collaborative sparse coding for multiview action recognition. IEEE MultiMedia 23(4):80–87

    Article  Google Scholar 

  78. Yahoo Maps. http://maps.yahoo.com

  79. Yan C, Zhang Y, Dai F, Li L (2013) Highly parallel framework for HEVC motion estimation on many-core platform. In Data Compression Conference (DCC), 2013 Mar 20, pp 63–72. IEEE

  80. Yan C, Zhang Y, Xu J, Dai F, Li L, Dai Q, Wu F (2014a) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21(5):573–576

  81. Yan C, Zhang Y, Xu J, Dai F, Zhang J, Dai Q, Wu F (2014b) Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trans Circ Sys Vid Technol 24(12):2077–2089

    Article  Google Scholar 

  82. Yan C, Zhang Y, Dai F, Wang X, Li L, Dai Q ( 2014c) Parallel deblocking filter for HEVC on many-core processor. Electronics Letters. 27:50(5):367–8.

  83. Yan C, Zhang Y, Dai F, Zhang J, Li L, Dai Q (2014d) Efficient parallel HEVC intra-prediction on many-core processor. Electronics Letters 22;50(11):805–6.

  84. KT Yang, GM Chiu, HJ Lyu, DJ Huang (2012) Path privacy protection in continuous location-based services over road networks .IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2012. doi: 10.1109/WiMOB.2012.6379110

  85. Yelp. http://www.yelp.com

  86. Ying B, Makraki D (2015) Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks. IEEE ICC 2015- Communications software, services and multimedia applicaations symposium

  87. Ying B, Makrakis D (2015) Pseudonym changes scheme based on candidate-location-list in vehicular networks. In: IEEE international conference on communications (ICC), p 2015. doi:10.1109/ICC.2015.7249491

  88. Yu R, Kang J, Huang X, Xie S, Zhang Y (2016) MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans Depend Secure Comp 13(1):3–105

    Google Scholar 

  89. Zuberi R, Ahmad S (2016) Secure mix-zones for privacy protection of road network location based services users. J Comput Netw Commun

    Google Scholar 

Download references

Acknowledgements

This research has been funded by The National High Technology Research and Development Program of China (NO.2014AA123103, NO.2015AA124103) and National Natural Science Foundation of China (NO.61401040, NO.61372110).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imran Memon.

Additional information

Qasim Ali Arain & Imran Memon contributed equally to this work.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arain, Q.A., Memon, I., Deng, Z. et al. Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimed Tools Appl 77, 5563–5607 (2018). https://doi.org/10.1007/s11042-017-4469-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4469-4

Keywords

Navigation