Skip to main content
Log in

The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Internet of things (IoT) based location-based services (LBS) are playing an increasingly important role in our daily lives. However, since the LBS server may be hacked, malicious or not credible, there is a good chance that interacting with the LBS server may result in loss of privacy.As per journal instruction, author photo and biography are mandatory for this article. Please provide. Thus, protecting user privacy such as the privacy of user location and trajectory is an important issue to be addressed while using LBS. To address this problem, we first construct three kinds of attack models that may expose a user’s trajectory or path while the user is sending continuous queries to a LBS server. Then we construct a novel LBS system model for preserving privacy, and propose the k-anonymity trajectory (KAT) algorithm which is suitable for both single query and continuous queries. Different from existing works, the KAT algorithm selects \(k-1\) dummy locations using the sliding window based k-anonymity mechanism when the user is making single query, and selects \(k-1\) dummy trajectories using the trajectory select mechanism for continuous queries. We evaluate the effectiveness of our proposed algorithm by conducting simulations for the single-query and continuous-query scenarios. The simulation results show that our proposed algorithm can protect privacy of users better than existing approaches, while incurring a lower time complexity than those approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Truong, H., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)

    Article  Google Scholar 

  2. Barcelo, M., Correa, A., Llorca, J., et al.: IoT-cloud service optimization in next generation smart environments. IEEE J. Sel. Areas Commun. 34(12), 4077–4090 (2016)

    Article  Google Scholar 

  3. Kalmar, E., Kertesz, A., Varadi, S., et al.: Legal and regulative aspects of IoT cloud systems. In: IEEE International Conference on Future Internet of Things and Cloud Workshops, pp. 15–20 (2016)

  4. Cai, H., Xu, B., Jiang, L., et al.: IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J. 387, 75–87 (2016)

    Google Scholar 

  5. Botta, A., de Donato, W., Persico, V., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)

    Article  Google Scholar 

  6. Landwehr, C.: Privacy research directions. Commun. ACM 59(2), 29–31 (2016)

    Article  Google Scholar 

  7. Xin, M., Lu, M., Li, W.: An adaptive collaboration evaluation model and its algorithm oriented to multi-domain location-based services. Expert Syst. Appl. 42, 2798–2807 (2015)

    Article  Google Scholar 

  8. Wang, Y., Xu, D., He, X., et al.: L2p2: location aware location privacy protection for location-based services. In: IEEE INFOCOM, 1996- 2004 (2012)

  9. Li, Y., Yiu, M.: Route-saver: leveraging route APIs for accurate and efficient query processing at location-based services. IEEE Trans. Knowl. Data Eng. 27(1), 235–249 (2015)

    Article  Google Scholar 

  10. Schlegel, R., Chow, C., Huang, Q., et al.: User-defined privacy grid system for continuous location-based services. IEEE Trans. Mob. Comput. 14(10), 2158–2172 (2015)

    Article  Google Scholar 

  11. Zhou, T.: Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors. Inf. Syst. Front. 17(2), 413–422 (2015)

    Article  Google Scholar 

  12. Niu, B., Li, Q., Zhu, X., et al.: Achieving K-anonymity in privacy-aware location-based services. In: IEEE INFOCOM, pp. 754–762 (2014)

  13. Niu, B., Li, Q., Zhu, X., et al.: Enhancing privacy through caching in location-based services. In: IEEE INFOCOM (2015)

  14. Liu, X., Zhao, H., Pan, M., et al.: Traffic aware multiple mix zone placement for protecting location privacy. In: IEEE INFOCOM, pp. 972–980 (2012)

  15. Zhu, X., Chi, H., Niu, B., et al.: Mobi Cache: when k-anonymity meets cache. In: IEEE GLOBECOM, pp. 820–825 (2013)

  16. Shu, T., Chen, Y., Yang, J.: Multi-lateral privacy preserving localization in pervasive environments. In: IEEE INFOCOM, pp. 2319–2327 (2014)

  17. Li, H., Sun, L., Zhu, H., et al.: Achieving privacy preservation in WiFi fingerprint-based localization. In: IEEE INFOCOM, pp. 2337–2345 (2014)

  18. Beresford, A., Stajano, F.: Mix zones: user privacy in location-aware services. In: The Second IEEE Conference on Pervasive Computing and Communications Workshops, pp. 127–131 (2004)

  19. Liu, X., Liu, K., Guo, L., et al.: A game-theoretic approach for achieving k-anonymity in location based services. In: IEEE INFCOM, pp. 2985–2993 (2013)

  20. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  21. Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: IEEE INFOCOM, pp. 2994–3002 (2013)

  22. Sharma, V., Shen, C.: Evaluation of an entropy-based k-anonymity model for location based services. In: International Conference on Computing, Networking and Communications (ICNC), pp. 374–378 (2015)

  23. Shokri, R., Troncoso, C., Diaz, C.: Unraveling an old cloak: K-anonymity for location privacy. In: ACM Workshop on Privacy in the Electronic Society, pp. 115–118 (2010)

  24. Lu, R., Lin, X., Shi, Z., et al.: PLAM: a privacy-preserving framework for local-area mobile social networks. In: IEEE INFOCOM, pp. 763–771 (2014)

  25. Li, X., Miao, M., Liu, H., et al.: An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Computing (2016). 10.1007/s00500-016-2040-2

  26. Caballero-Gil, C., Molina-Gil, J., Hernández-Serrano, J., et al.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482–494 (2016)

    Article  Google Scholar 

  27. Andrews, M., Wilfong, G., Zhang, L.: Analysis of k-anonymity algorithms for streaming location data. In: IEEE Conference on Computer Communications Workshops, pp. 1–6 (2015)

  28. Gedik, B., liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Mob. Comput. 7, 1–18 (2007)

    Google Scholar 

  29. Buttyan, L., Holczer, T.: A practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular Networking Conference, pp. 1–8 (2009)

  30. Du, J., Xu, J.: IPDA: supporting privacy-preserving location-based mobile services. In: International Conference Mobile Data Management, pp. 212–214 (2007)

  31. Yao, L., Lin, C., Liu, G., et al.: Location anonymity based on fake queries in continuous location-based services. In: The 7th International Conference on Availability, Reliability and Security, pp. 375–382 (2012)

  32. Feng, Y., Liu, P., Zhang, J.: A mobile terminal based trajectory preserving strategy for continuous querying LBS users. In: IEEE International Conference on Distributed Computing in Sensor Systems, pp. 92–98 (2012)

  33. Mohammed, N., Fung, B., Debbabi, M.: Walking in the crowd, anonymizing trajectory data for pattern analysis. In: The 18th ACM Conference on Information and Knowledge, pp. 1441–1444 (2009)

  34. Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM, pp. 547–555 (2008)

  35. Yigitoglu, E., Luisa, M.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: IEEE 13th International Conference on Mobile Data Management, pp. 186–195 (2012)

  36. Chow, C., Mokebel, M.F.: Trajectory privacy in location-based services and data publications. ACM SIGKDD Explor. Newsl. 13(1), 19–29 (2011)

    Article  Google Scholar 

  37. Schmid, F., Richter, K.: Semantic trajectory compression. Advances in spatial and temporal databases. In: Lecture Notes in Computer Science, pp. 411–416 (2009)

  38. Peng, T., Liu, Q., Meng, D., et al.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165–179 (2016)

    Article  Google Scholar 

  39. Li, X., Wang, E., Yang, W., et al.: DALP: a demand-aware location privacy protection scheme in continuous location-based services. Concurr. Comput. Pract. Exp. 28(4), 1219–1236 (2016)

    Article  Google Scholar 

  40. Niu, B., Gao, S., Li, F., et al.: Protection of location privacy in continuous LBSs against adversaries with background information. In: IEEE International Conference on Computing, Networking and Communications, pp. 1–6 (2016)

  41. Sun, G., Liao, D., Li, H., et al.: L2P2: a location-label based approach for privacy preserving in LBS. Future Gener. Comput. Syst. 74, 375–384 (2016)

    Article  Google Scholar 

  42. Sun, G., Chang, V., Ramachandran, M., et al.: Efficient location privacy algorithm for Internet of Things (IoT) services and applications. J. Netw. Comput. Appl. 89, 3–3 (2016)

    Article  Google Scholar 

  43. Sun, G., Xie, Y., Liao, D., et al.: User-defined privacy location-sharing system in mobile online social networks. J. Netw. Comput. Appl. 86, 34–45 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This research was partially supported by National Grand Fundamental Research of China (2013CB329103), Natural Science Foundation of China (61571098, 61303250), Fundamental Research Funds for the Central Universities (ZYGX2016J217), Guangdong Science and Technology Foundation (2013A040600001, 2013B090200004, 2014B090901007, 2015A040404001, 2013B040300001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gang Sun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liao, D., Sun, G., Li, H. et al. The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems. Cluster Comput 20, 2283–2297 (2017). https://doi.org/10.1007/s10586-017-0986-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-0986-1

Keywords

Navigation