Skip to main content
Log in

Privacy Protected Spatial Query Processing for Advanced Location Based Services

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Due to the popularity of mobile devices (e.g., cell phones, PDAs, etc.), location-based services have become more and more prevalent in recent years. However, users have to reveal their location information to access location-based services with existing service infrastructures. It is possible that adversaries could collect the location information, which in turn invades user’s privacy. There are existing solutions for query processing on spatial networks and mobile user privacy protection in Euclidean space. However there is no solution for solving queries on spatial networks with privacy protection. Therefore, we aim to provide network distance spatial query solutions which can preserve user privacy by utilizing K-anonymity mechanisms. In this paper, we propose an effective location cloaking mechanism based on spatial networks and two novel query algorithms, PSNN and PSRQ, for answering nearest neighbor queries and range queries on spatial networks without revealing private information of the query initiator. We demonstrate the appeal of our technique using extensive simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Aref, W. G., & Samet, H. (1990). Efficient processing of window queries in the pyramid data structure. In PODS (pp. 265–272).

  2. Brinkhoff T. (2002) A framework for generating network-based moving objects. GeoInformatica 6(2): 153–180

    Article  MATH  Google Scholar 

  3. Brinkhoff, T., Kriegel, H.-P., & Seeger, B. (1993). Efficient processing of spatial joins using R-trees. In SIGMOD Conference (pp. 237–246).

  4. Cheng, R., Kalashnikov, D. V., & Prabhakar, S. (2003). Evaluating probabilistic queries over imprecise data. In SIGMOD Conference (pp. 551–562).

  5. Dijkstra E.W. (1959) A note on two problems in connexion with graphs. Numerische Mathematik 1: 269–271

    Article  MATH  MathSciNet  Google Scholar 

  6. Gedik, B., & Liu, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In 25th International Conference on Distributed Computing Systems (pp. 620–629).

  7. Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys.

  8. Gruteser M., Liu X. (2004) Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy 2(2): 28–34

    Article  Google Scholar 

  9. Guttman, A. (1984). R-trees: A dynamic index structure for spatial searching. In SIGMOD Conference (pp. 47–57).

  10. Hjaltason G.R., Samet H. (1999) Distance browsing in spatial databases. ACM Transactions on Database Systems 24(2): 265–318

    Article  Google Scholar 

  11. Kolahdouzan, M. R., Shahabi, C. (2004). Voronoi-based K nearest neighbor search for spatial network databases. In VLDB (pp. 840–851).

  12. Ku, W.-S., Zimmermann, R., Peng, W.-C., & Shroff, S. (2007). Privacy protected query processing on spatial networks. In ICDE Workshops (pp. 215–220).

  13. Mokbel, M. F. (2006). Towards privacy-aware location-based database servers. In ICDE Workshops (p. 93).

  14. Mokbel, M. F., Chow, C.-Y., & Aref, W. G. (2006). The new casper: Query processing for location services without compromising privacy. In VLDB (pp. 763–774).

  15. Papadias, D., Zhang, J., Mamoulis, N., & Tao, Y. (2003). Query processing in spatial network databases. In VLDB (pp. 802–813).

  16. Roussopoulos, N., Kelley, S., & Vincent, F. (1995). Nearest neighbor queries. In SIGMOD Conference (pp. 71–79).

  17. Schilit B.N., Hong J.I., Gruteser M. (2003) Wireless location privacy protection. IEEE Computer 36(12): 135–137

    Google Scholar 

  18. Sweene L. (2002) k-Anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5): 557–570

    Article  MathSciNet  Google Scholar 

  19. Tanimoto S.L., Pavlidis T. (1975) A hierarchical data structure for picture processing. Computer Graphics and Image Processing 4(2): 104–113

    Article  Google Scholar 

  20. Voelcker J. (2006) Stalked by satellite: An alarming rise in GPS-enabled harassment. IEEE Spectrum 47(7): 15–16

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei-Shinn Ku.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ku, WS., Chen, Y. & Zimmermann, R. Privacy Protected Spatial Query Processing for Advanced Location Based Services. Wireless Pers Commun 51, 53–65 (2009). https://doi.org/10.1007/s11277-008-9608-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-008-9608-9

Keywords

Navigation