A new grid partitioning technology for location privacy protection

A new grid partitioning technology for location privacy protection

Nowadays, the location-based service (LBS) has become an essential part of convenient service in people’s daily life. However, the untrusted LBS servers can store lots of information about the user, such as the user’s identity, location, and destination. Then the information can be used as background knowledge and combined with the query frequency of the user to launch the inference attack to obtain user’s privacy. In most of the existing schemes, the author considers the algorithm of virtual location selection from the historical location of the user. However, the LBS server can infer the user’s location information on the historical data that has been counted for a long time. In order to ensure that the users’ historical query data and query frequency will not be obtained by the attacker, we propose a privacy protection algorithm based on grid expansion. With the help of third-party agents, the combination of cooperative users and pseudonyms can resist the privacy disclosure caused by users requesting services during the mobile process. Extensive simulation experiments have been carried out on Gowalla dataset to evaluate the efficiency of the proposed algorithm. By comparing with other existing methods, the experimental verify the effectiveness of our algorithm in privacy protection.

___

  • [1] Gupta BB, Akhtar T. A survey on smart power grid: frameworks, tools, security issues, and solutions. Annals of Telecommunications 2017; 72 (9-10): 517-549.
  • [2] Stergiou C, Psannis KE, Kim BG, Gupta BB. Secure integration of IoT and cloud computing. Future Generation Computer Systems 2018; 78: 964-975.
  • [3] Zhang L, Li J, Yang S, Wang B. Privacy preserving in cloud environment for obstructed shortest path query. Wireless Personal Communications 2017; 96 (2): 2305-2322.
  • [4] Gupta BB, Gupta S, Chaudhary P. Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. International Journal of Cloud Applications and Computing 2017; 7 (1): 1-31.
  • [5] Niu B, Li Q, Zhu X, Cao G,Liet H. Enhancing privacy through caching in location-based services. In: 2015 IEEE Conference on Computer Communications; Hong Kong, China; 2015. pp. 1017-1025.
  • [6] Akhtar T, Gupta BB, Yamaguchi S. Malware propagation effects on SCADA system and smart power grid. In: 2018 IEEE International Conference on Consumer Electronics; New York, NY, USA; 2018. pp. 1-6.
  • [7] Schlegel R, Chow C, Huang Q, Wong DS. User-defined privacy grid system for continuous location-based services. IEEE Transactions on Mobile Computing 2015; 14 (10): 2158-2172.
  • [8] Ye A, Chen Q, Xu L, Wu W. The flexible and privacy-preserving proximity detection in mobile social network. Future Generation Computer Systems 2018; 79 (1): 271-283.
  • [9] Peng T, Liu Q, Meng D, Wang G. Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences 2017; 387 (5): 165-179.
  • [10] Wang S, Hu Q, Sun Y, Huang J. Privacy preservation in location-based services. IEEE Communications Magazine 2018; 56 (3): 134-140.
  • [11] Li X, Miao M, Liu H, Ma J, Li K. An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Computing 2017; 21 (14): 3907-3917.
  • [12] Rohilla A, Khurana M, Singh L. Location privacy using homomorphic encryption over cloud. International Journal of Computer Network and Information Security 2017; 9(8): 32-40.
  • [13] Sun G, Liao D, Li H, Yu H, Chang V. L2P2: a location-label based approach for privacy preserving in LBS. Future Generation Computer Systems 2017; 74 (9): 375-384.
  • [14] Yin C, Xi J, Sun R, Wang J. Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Transactions on Industrial Informatics 2018; 14 (8): 3628-3636.
  • [15] Dargahi T, Ambrosin M, Conti M, Asokan N. ABAKA: a novel attribute-based k-anonymous collaborative solution for LBSs. Computer Communications 2016; 85 (7): 1-13.
  • [16] Ni W, Gu M, Chen X. Location privacy-preserving k nearest neighbor query under user’s preference. KnowledgeBased Systems 2016; 103 (7): 19-27.
  • [17] Huang Y, Cai Z, Bourgeois AG. Search locations safely and accurately: a location privacy protection algorithm with accurate service. Journal of Network and Computer Applications 2018; 103 (1): 146-156.
  • [18] Kido H, Yanagisawa Y, Satoh T. An anonymous communication technique using dummies for location-based services. In: Pervasive Services, 2005 ICPS’05 Proceedings International Conference; Santorini, Greece; 2005. pp. 88-97.
  • [19] Sun Y, Chen M, Hu L, Qian Y, Hassan MM. ASA: against statistical attacks for privacy-aware users in location based service. Future Generation Computer Systems 2017; 70 (5): 48-58.
  • [20] Niu B, Li Q, Zhu X, Cao G, Li H. Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications; Westin Harbour Castle Toronto, Canada; 2014. pp. 754-762.
  • [21] Zhang L, Li J, Yang S, Wang B, Bian X. A novel attributes anonymity scheme in continuous query. Wireless Personal Communications 2018; 101 (2): 943-961.
  • [22] Chen J, He K, Yuan Q, Chen M, Du R et al. Blind filtering at third parties: an efficient privacy-preserving framework for location-based services. IEEE Transactions on Mobile Computing 2018; 17 (11): 2524-2535.
  • [23] Niu B, Zhu X, Li Q, Chen J, Li H. A novel attack to spatial cloaking schemes in location-based services. Future Generation Computer Systems 2015; 49 (8): 125-132.
  • [24] Lu R, Lin X, Shen X. SPOC: a secure and privacy-preserving opportunistic computing framework for mobilehealthcare emergency. IEEE Transactions on Parallel and Distributed Systems 2013; 24 (3): 614-624.
  • [25] Meyerowitz J, Roy Choudhury R, Romit. Hiding stars with fireworks: location privacy through camouflage. Proceedings of the Annual International Conference on Mobile Computing and Networking 2009; 1: 345-356.
  • [26] Shokri R, Theodorakopoulos G, Le Boudec JY, Hubaux JP. Quantifying location privacy. In: 2011 IEEE Symposium on Security and Privacy; Berkeley, CA, USA; 2011. pp. 247-262.
  • [27] Zhu X, Chi H, Niu B, Zhang W, Li Z et al. Mobicache: when k-anonymity meets cache. In: 2013 IEEE Global Communications Conference, (Globecom); Atlanta, GA, USA; 2013. pp. 9-13.
  • [28] Li Z, Wang J, Zhang W. Revisiting post-quantum hash proof systems over lattices for internet of thing authentications. Journal of Ambient Intelligence and Humanized Computing 2019; 1: 1-11.
  • [29] Palanisamy B, Liu L. Effective mix-zone anonymization techniques for mobile travelers. Geoinformatica 2014; 18 (1): 135-164.
  • [30] Lei Z, Lili H, Desheng L, Jing L, Jiang QF et al. An attribute generalization mix-zone without privacy leakage. IEEE Access 2019; 7: 57088-57099.
  • [31] Shokri R, Theodorakopoulos G, Troncoso C, Hubaux JP, Le Boudec JY et al. Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security; New York, NY, USA; 2012. pp. 617-627.
  • [32] Lei Z, Chunguang M, Songtao Y, Xiaodong Z. Probability indistinguishable: a query and location correlation attack resistance scheme. Wireless Personal Communications 2017; 97 (4): 6167-6187.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK