Abstract
Internet of things (IoT) based location-based services (LBS) are playing an increasingly important role in our daily lives. However, since the LBS server may be hacked, malicious or not credible, there is a good chance that interacting with the LBS server may result in loss of privacy.As per journal instruction, author photo and biography are mandatory for this article. Please provide. Thus, protecting user privacy such as the privacy of user location and trajectory is an important issue to be addressed while using LBS. To address this problem, we first construct three kinds of attack models that may expose a user’s trajectory or path while the user is sending continuous queries to a LBS server. Then we construct a novel LBS system model for preserving privacy, and propose the k-anonymity trajectory (KAT) algorithm which is suitable for both single query and continuous queries. Different from existing works, the KAT algorithm selects \(k-1\) dummy locations using the sliding window based k-anonymity mechanism when the user is making single query, and selects \(k-1\) dummy trajectories using the trajectory select mechanism for continuous queries. We evaluate the effectiveness of our proposed algorithm by conducting simulations for the single-query and continuous-query scenarios. The simulation results show that our proposed algorithm can protect privacy of users better than existing approaches, while incurring a lower time complexity than those approaches.
Similar content being viewed by others
References
Truong, H., Dustdar, S.: Principles for engineering IoT cloud systems. IEEE Cloud Comput. 2(2), 68–76 (2015)
Barcelo, M., Correa, A., Llorca, J., et al.: IoT-cloud service optimization in next generation smart environments. IEEE J. Sel. Areas Commun. 34(12), 4077–4090 (2016)
Kalmar, E., Kertesz, A., Varadi, S., et al.: Legal and regulative aspects of IoT cloud systems. In: IEEE International Conference on Future Internet of Things and Cloud Workshops, pp. 15–20 (2016)
Cai, H., Xu, B., Jiang, L., et al.: IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J. 387, 75–87 (2016)
Botta, A., de Donato, W., Persico, V., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)
Landwehr, C.: Privacy research directions. Commun. ACM 59(2), 29–31 (2016)
Xin, M., Lu, M., Li, W.: An adaptive collaboration evaluation model and its algorithm oriented to multi-domain location-based services. Expert Syst. Appl. 42, 2798–2807 (2015)
Wang, Y., Xu, D., He, X., et al.: L2p2: location aware location privacy protection for location-based services. In: IEEE INFOCOM, 1996- 2004 (2012)
Li, Y., Yiu, M.: Route-saver: leveraging route APIs for accurate and efficient query processing at location-based services. IEEE Trans. Knowl. Data Eng. 27(1), 235–249 (2015)
Schlegel, R., Chow, C., Huang, Q., et al.: User-defined privacy grid system for continuous location-based services. IEEE Trans. Mob. Comput. 14(10), 2158–2172 (2015)
Zhou, T.: Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors. Inf. Syst. Front. 17(2), 413–422 (2015)
Niu, B., Li, Q., Zhu, X., et al.: Achieving K-anonymity in privacy-aware location-based services. In: IEEE INFOCOM, pp. 754–762 (2014)
Niu, B., Li, Q., Zhu, X., et al.: Enhancing privacy through caching in location-based services. In: IEEE INFOCOM (2015)
Liu, X., Zhao, H., Pan, M., et al.: Traffic aware multiple mix zone placement for protecting location privacy. In: IEEE INFOCOM, pp. 972–980 (2012)
Zhu, X., Chi, H., Niu, B., et al.: Mobi Cache: when k-anonymity meets cache. In: IEEE GLOBECOM, pp. 820–825 (2013)
Shu, T., Chen, Y., Yang, J.: Multi-lateral privacy preserving localization in pervasive environments. In: IEEE INFOCOM, pp. 2319–2327 (2014)
Li, H., Sun, L., Zhu, H., et al.: Achieving privacy preservation in WiFi fingerprint-based localization. In: IEEE INFOCOM, pp. 2337–2345 (2014)
Beresford, A., Stajano, F.: Mix zones: user privacy in location-aware services. In: The Second IEEE Conference on Pervasive Computing and Communications Workshops, pp. 127–131 (2004)
Liu, X., Liu, K., Guo, L., et al.: A game-theoretic approach for achieving k-anonymity in location based services. In: IEEE INFCOM, pp. 2985–2993 (2013)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)
Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: IEEE INFOCOM, pp. 2994–3002 (2013)
Sharma, V., Shen, C.: Evaluation of an entropy-based k-anonymity model for location based services. In: International Conference on Computing, Networking and Communications (ICNC), pp. 374–378 (2015)
Shokri, R., Troncoso, C., Diaz, C.: Unraveling an old cloak: K-anonymity for location privacy. In: ACM Workshop on Privacy in the Electronic Society, pp. 115–118 (2010)
Lu, R., Lin, X., Shi, Z., et al.: PLAM: a privacy-preserving framework for local-area mobile social networks. In: IEEE INFOCOM, pp. 763–771 (2014)
Li, X., Miao, M., Liu, H., et al.: An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Computing (2016). 10.1007/s00500-016-2040-2
Caballero-Gil, C., Molina-Gil, J., Hernández-Serrano, J., et al.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482–494 (2016)
Andrews, M., Wilfong, G., Zhang, L.: Analysis of k-anonymity algorithms for streaming location data. In: IEEE Conference on Computer Communications Workshops, pp. 1–6 (2015)
Gedik, B., liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Mob. Comput. 7, 1–18 (2007)
Buttyan, L., Holczer, T.: A practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular Networking Conference, pp. 1–8 (2009)
Du, J., Xu, J.: IPDA: supporting privacy-preserving location-based mobile services. In: International Conference Mobile Data Management, pp. 212–214 (2007)
Yao, L., Lin, C., Liu, G., et al.: Location anonymity based on fake queries in continuous location-based services. In: The 7th International Conference on Availability, Reliability and Security, pp. 375–382 (2012)
Feng, Y., Liu, P., Zhang, J.: A mobile terminal based trajectory preserving strategy for continuous querying LBS users. In: IEEE International Conference on Distributed Computing in Sensor Systems, pp. 92–98 (2012)
Mohammed, N., Fung, B., Debbabi, M.: Walking in the crowd, anonymizing trajectory data for pattern analysis. In: The 18th ACM Conference on Information and Knowledge, pp. 1441–1444 (2009)
Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: IEEE INFOCOM, pp. 547–555 (2008)
Yigitoglu, E., Luisa, M.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: IEEE 13th International Conference on Mobile Data Management, pp. 186–195 (2012)
Chow, C., Mokebel, M.F.: Trajectory privacy in location-based services and data publications. ACM SIGKDD Explor. Newsl. 13(1), 19–29 (2011)
Schmid, F., Richter, K.: Semantic trajectory compression. Advances in spatial and temporal databases. In: Lecture Notes in Computer Science, pp. 411–416 (2009)
Peng, T., Liu, Q., Meng, D., et al.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165–179 (2016)
Li, X., Wang, E., Yang, W., et al.: DALP: a demand-aware location privacy protection scheme in continuous location-based services. Concurr. Comput. Pract. Exp. 28(4), 1219–1236 (2016)
Niu, B., Gao, S., Li, F., et al.: Protection of location privacy in continuous LBSs against adversaries with background information. In: IEEE International Conference on Computing, Networking and Communications, pp. 1–6 (2016)
Sun, G., Liao, D., Li, H., et al.: L2P2: a location-label based approach for privacy preserving in LBS. Future Gener. Comput. Syst. 74, 375–384 (2016)
Sun, G., Chang, V., Ramachandran, M., et al.: Efficient location privacy algorithm for Internet of Things (IoT) services and applications. J. Netw. Comput. Appl. 89, 3–3 (2016)
Sun, G., Xie, Y., Liao, D., et al.: User-defined privacy location-sharing system in mobile online social networks. J. Netw. Comput. Appl. 86, 34–45 (2017)
Acknowledgements
This research was partially supported by National Grand Fundamental Research of China (2013CB329103), Natural Science Foundation of China (61571098, 61303250), Fundamental Research Funds for the Central Universities (ZYGX2016J217), Guangdong Science and Technology Foundation (2013A040600001, 2013B090200004, 2014B090901007, 2015A040404001, 2013B040300001).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liao, D., Sun, G., Li, H. et al. The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems. Cluster Comput 20, 2283–2297 (2017). https://doi.org/10.1007/s10586-017-0986-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-0986-1