skip to main content
10.1145/3371676.3371695acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Location Privacy Protection Scheme Based on Location Services

Authors Info & Claims
Published:13 January 2020Publication History

ABSTRACT

Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location privacy protection scheme is proposed, which includes location hiding algorithm and query privacy protection algorithm. Q-Tree storage ensures that anonymous location units are as dispersed as possible. The point of interest (POI) with higher query probability is selected as the query content of anonymous location unit, which protects the user's query privacy. At the same time, private information retrieval technology (PIR) is used to provide users with higher privacy and security protection. Finally, the effectiveness of the scheme is proved by privacy analysis and experimental results.

References

  1. GEDIK B, LIU L. Protecting location privacy with personalized k-anonymity: architecture and algorithms [J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1--18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. PINGLY A, YU W, ZHANG N, FU X, et al. Cap: a context-aware privacy protection system for location-based services[C]// ICDCS 2009: 49--57.Google ScholarGoogle Scholar
  3. LI X, ZHANG C, JUNG T, QIAN J, et al. Graph-based privacy-preserving data publication[C]//INFOCOM. 2016.Google ScholarGoogle Scholar
  4. CHEN Z, HU X, JU X, et al. Lisa: location information scrambler for privacy protection on smartphones[C]//CNS. 2013.Google ScholarGoogle Scholar
  5. ZHENG X, CAI Z, LI J, et al. Location-privacy-aware review publication mechanism for local business service systems[C]//International Conference on Computer Communications. IEEE, 2017: 1--9.Google ScholarGoogle Scholar
  6. JIANG H, ZHAO P, WANG C. Roblop: towards robust privacy preserving against location dependent attacks in continuous lbs queries [J]. IEEE/ACM Transactions on Networking, 2018, 26(2):1018--1032.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. XIAO Y, XIONG L. Protecting locations with differential privacy under temporal correlations[C]//The 22nd ACM Conference on Computer and Communications Security. 2015: 1--7.Google ScholarGoogle Scholar
  8. SHOKRI R, THEODORAKOPOULOS G, BOUDEC J Y L, et al. Quantifying location privacy[C]//IEEE Security and Privacy. 2011: 247--262.Google ScholarGoogle Scholar
  9. WANG J, LI Y, YANG D, et al. Achieving effective k-anonymity for query privacy in location-based services[J]. IEEE Access, 2017, 5: 24580--24592.Google ScholarGoogle ScholarCross RefCross Ref
  10. LI W, NIU B, LI H, et al. Privacy-preserving strategies in service quality aware location-based services[C]//IEEE International Conference on Communications. 2015: 7328--7334.Google ScholarGoogle Scholar
  11. SHOKRI R, THEODORAKOPOULOS G, TRONCOSO C, et al. Protecting location privacy: optimal strategy against localization attacks[C]//Proceedings of ACM Conference on Computer and Communications Security, New York: ACM Press, 2012: 617--627.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing location-based identity inference in anonymous spatial queries [J]. IEEE Transactions on Knowledge & Data Engineering, 2007, 19(12): 1719--1733.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. TRIPATHYB K, MAITY A, RANAJIT B, et al. A fast p-sensitive l-diversity Anonymisation algorithm[C]// Recent Advances in Intelligent Computational Systems. IEEE, 2011: 741--744.Google ScholarGoogle Scholar
  14. HE X, JIN R, DAH I. Leveraging spatial diversity for privacy- aware location-based services in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(6):1524--1534.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. HAO G, BINX Y. Research on privacy preserving method based on t-closeness model[C]//The International Conference on Communications in China. IEEE, 2017: 1455--1459.Google ScholarGoogle Scholar
  16. MONEDERO D R, FORNE J, FERRER J D. From t-closeness-like privacy to post randomization via information theory [J]. IEEE Transactions on Knowledge and Data Engineering, 2010, 22(11): 1623--1636.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. LI N H, LIT C, VENKATASUBRAMANIAN S. T-closeness: privacy beyond k-anonymity and l-diversity[C]//International Conference on Data Engineering. IEEE, 2007: 106--115.Google ScholarGoogle Scholar
  18. CHEN Z, HU X, JU X, et al. Lisa: location information scrambler for privacy protection on smartphones[C]// Conference on Communications and Network Security. IEEE, 2013: 296--304.Google ScholarGoogle Scholar
  19. GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services: anonymizers are not necessary[C]// Proceedings of the 2008 ACM SIGMOD international conference on management of data. New York: ACM, 2008: 121--132.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Location Privacy Protection Scheme Based on Location Services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCNS '19: Proceedings of the 2019 9th International Conference on Communication and Network Security
      November 2019
      172 pages
      ISBN:9781450376624
      DOI:10.1145/3371676

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 January 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader