Skip to main content
Log in

Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

As location-based services (LBSs) require users to report their location to obtain services, many people are starting to realize the exposed to high privacy threats. In order to preserve the privacy, a great deal of privacy preserving algorithms is preserved in the last several years. Unfortunately, existing privacy preserving algorithms for LBSs usually mainly consider generalizing or cloaking the location and neglect the correlation probability between the query and location, and the adversary can use the probability to guess the real location. In this paper, based on the concept of differential privacy, we propose a mechanism for achieving probability indistinguishable, and then based on this mechanism a location-shift scheme to obfuscate the correlation between the query and location is proposed. To address the correlation probability obfuscation, we first show the correlation attack model with four potential methods based on the correlation probability. Then we study the proposed attacks on several existing algorithms designed for snapshot as well as continues services and define a formalization of probability indistinguishable to propose a countermeasure with location-shift, which can mitigate this type of attacks. At last, we verify the security of our location-shift scheme with entropy and mutual information, and the empirical evaluations further verify the effectiveness and efficiency of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. http://dna.fernuni-hagen.de/secondo/BerlinMOD/BerlinMOD.html.

References

  1. Gruteser, M. & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on mobile systems, applications and services, San Francisco, California, pp. 31–42.

  2. Gedik, B. & Ling, L. (2005). Location privacy in mobile systems: A personalized anonymization model. In Proceedings of 25th IEEE international conference on distributed computing systems. ICDCS 2005, pp. 620–629.

  3. Fuyu, L., Hua, K. A., & Ying, C. (2009). Query l-diversity in location-based services. In Tenth international conference on mobile data management: Systems, services and middleware, 2009. MDM ‘09, pp. 436–442.

  4. Rebollo-Monedero, D., Forne, J., Solanas, A., & Martinez-Balleste, A. (2010). Private location-based information retrieval through user collaboration. Computer Communications, 33, 762–774.

    Article  Google Scholar 

  5. Rebollo-Monedero, D., Forne, J., & Domingo-Ferrer, J. (2012). Query profile obfuscation by means of optimal query exchange between users. IEEE Transactions on Dependable and Secure Computing, 9, 641–654.

    Google Scholar 

  6. Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., & Hubaux, J. P. (2014). Hiding in the mobile crowd: Location privacy through collaboration. IEEE Transactions on Dependable and Secure Computing, 11, 266–279.

    Article  Google Scholar 

  7. Niu, B., Zhu, X. Y., Li, Q. H., Chen, J., & Li, H. (2015). A novel attack to spatial cloaking schemes in location-based services. Future Generation Computer Systems—The International Journal of Grid Computing and Escience, 49, 125–132.

    Article  Google Scholar 

  8. Khoshgozaran, A., Shirani-Mehr, H., & Shahabi, C. (2008). SPIRAL: A scalable private information retrieval approach to location privacy. In 2008 Ninth international conference on mobile data management workshops, pp. 49–56.

  9. Khoshgozaran, A., Shahabi, C., & Shirani-Mehr, H. (2011). Location privacy: Going beyond K-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 26, 435–465.

    Article  Google Scholar 

  10. Lien, I. T., Lin, Y.-H., Shieh, J.-R., & Wu, J.-L. (2013). A novel privacy preserving location-based service protocol with secret circular shift for k-NN search. IEEE Transactions on Information Forensics and Security, 8, 863–873.

    Article  Google Scholar 

  11. Paulet, R., Kaosar, M. G., Yi, X., & Bertino, E. (2014). Privacy-preserving and content-protecting location based queries. IEEE Transactions on Knowledge and Data Engineering, 26, 1200–1210.

    Article  Google Scholar 

  12. Ben, N., Qinghua, L., Xiaoyan, Z., Guohong, C., & Hui, L. (2015). Enhancing privacy through caching in location-based services. In 2015 IEEE conference on computer communications (INFOCOM), pp. 1017–1025.

  13. Ma, C. G., Zhou, C. L., & Yang, S. T. (2015). A voronoi-based location privacy-preserving method for continuous query in LBS. International Journal of Distributed Sensor Networks, 2015, 1–17.

    Google Scholar 

  14. Schlegel, R., Chow, C. Y., Huang, Q., & Wong, D. S. (2015). User-defined privacy grid system for continuous location-based services. IEEE Transactions on Mobile Computing, 14, 2158–2172.

    Article  Google Scholar 

  15. Wang, Y., Xia, Y., Hou, J., Gao, S. M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 53, 57–73.

    Article  Google Scholar 

  16. Palanisamy, B., & Liu, L. (2015). Attack-resilient mix-zones over road networks: Architecture and algorithms. IEEE Transactions on Mobile Computing, 14, 495–508.

    Article  Google Scholar 

  17. Gao, S., Ma, J. F., Shi, W. S., & Zhan, G. X. (2015). LTPPM: A location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications & Mobile Computing, 15, 155–169.

    Article  Google Scholar 

  18. Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7, 126–139.

    Article  Google Scholar 

  19. Ozer, M., Keles, I., Toroslu, H., Karagoz, P., Hakki, I., & Ergut, S. (2014). Predicting the next location change and time of change for mobile phone users. In Presented at the proceedings of the third ACM SIGSPATIAL international workshop on mobile geographic information systems, Dallas, Texas, 2014.

  20. Xue, A. Y., Zhang, R., Zheng, Y., Xie, X., Huang, J., Xu, Z. et al. (2013). Destination prediction by sub-trajectory synthesis and privacy protection against such prediction. In 29th IEEE international conference on data engineering (ICDE), Brisbane, Australia, 2013, pp. 254–265.

  21. Su, H., Zheng, K., Wang, H., Huang, J., & Zhou, X. (2013). Calibrating trajectory data for similarity-based analysis. In Proceedings of the 2013 ACM SIGMOD international conference on management of data, pp. 833–844.

  22. Chen, X. H., Pang, J., & Xue, R. (2014). Constructing and comparing user mobility profiles. ACM Transactions on the Web, 8(21), 1–21.

    Google Scholar 

  23. Lei, Z., Chunguang, M., & Songtao, Y. (2016). Location association similar based anonymus algorithm. China Science Paper, 11, 197–201.

    Google Scholar 

  24. Niu, B., Qinghua, L., Xiaoyan, Z., Guohong, C., & Hui, L. (2014). Achieving k-anonymity in privacy-aware location-based services. In INFOCOM, 2014 proceedings IEEE, pp. 754–762.

  25. Dwork, C. (2006). Differential privacy. In Lecture notes in computer science, pp. 1–12.

  26. Xiong, L. (2013). Adaptive differentially private data release for data sharing and data mining. In 2013 IEEE 13th international conference on data mining workshops (Icdmw), pp. 891–891.

  27. Cheng, X., Su, S., Xu, S. Z., & Li, Z. Y. (2015). DP-apriori: A differentially private frequent itemset mining algorithm based on transaction splitting. Computers & Security, 50, 74–90.

    Article  Google Scholar 

  28. Xu, J., Zhang, Z. J., Xiao, X. K., Yang, Y., Yu, G., & Winslett, M. (2013). Differentially private histogram publication. VLDB Journal, 22, 797–822.

    Article  Google Scholar 

  29. Riboni, D., & Bettini, C. (2015). Incremental release of differentially-private check-in data. Pervasive and Mobile Computing, 16, 220–238.

    Article  Google Scholar 

  30. Dewri, R. (2013). Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Transactions on Mobile Computing, 12, 2360–2372.

    Article  Google Scholar 

  31. Andrés, M. E., Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2013). Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp. 901–914.

  32. Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2014). Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp. 251–262.

  33. Primault, V., Mokhtar, S. B., Lauradoux, C., & Brunie, L. (2014). Differentially private location privacy in practice. Eprint Arxiv.

  34. Chatzikokolakis, K., Palamidessi, C., & Stronati, M. (2015). Geo-indistinguishability: A principled approach to location privacy. In R. Natarajan, G. Barua, & M. R. Patra (Eds.), Distributed computing and internet technology, ICDCIT 2015, Vol. 89562015, pp. 49–72.

  35. Perazzo, P., & Dini, G. (2015). A uniformity-based approach to location privacy. Computer Communications, 64, 21–32.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China No. 61472097, Specialized Research Fund for the Doctoral Program of Higher Education No. 20132304110017, Natural Science Foundation of Heilongjiang Province of China No. F2015022.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ma Chunguang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lei, Z., Chunguang, M., Songtao, Y. et al. Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme. Wireless Pers Commun 97, 6167–6187 (2017). https://doi.org/10.1007/s11277-017-4833-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4833-8

Keywords

Navigation