Article Link
Collect
Submit Manuscript
Show Outline
Outline
Abstract
Keywords
Electronic Supplementary Material
References
Show full outline
Hide outline
Regular Paper

Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems

Department of Computer and Information Sciences, Temple University, Pennsylvania 19122, U.S.A.
School of Computer Science and Technology, University of Science and Technology of China, Hefei 230036, China

A preliminary version was published in the Proceedings of IEEE MASS 2019.]]>

Show Author Information

Abstract

With the quick development of the sharing economy, ride-hailing services have been increasingly popular worldwide. Although the service provides convenience for users, one concern from the public is whether the location privacy of passengers would be protected. Service providers (SPs) such as Didi and Uber need to acquire passenger and driver locations before they could successfully dispatch passenger orders. To protect passengers’ privacy based on their requirements, we propose a cloaking region based order dispatch scheme. In our scheme, a passenger sends the SP a cloaking region in which his/her actual location is not distinguishable. The trade-off of the enhanced privacy is the loss of social welfare, i.e., the increase in the overall pick-up distance. To optimize our scheme, we propose to maximize the social welfare under passengers’ privacy requirements. We investigate a bipartite matching based approach. A theoretical bound on the matching performance under specific privacy requirements is shown. Besides passengers’ privacy, we allow drivers to set up their maximum pick-up distance in our extended scheme. The extended scheme could be applied when the number of drivers exceeds the number of passengers. Nevertheless, the global matching based scheme does not consider the interest of each individual passenger. The passengers with low privacy requirements may be matched with drivers far from them. To this end, a pricing scheme including three strategies is proposed to make up for the individual loss by allocating discounts on their riding fares. Extensive experiments on both real-world and synthetic datasets show the efficiency of our scheme.

Electronic Supplementary Material

Download File(s)
jcst-35-3-629-Highlights.pdf (274.2 KB)

References

[1]
Duan Y, Mosharraf T, Wu J, Zheng H. Optimizing carpool scheduling algorithm through partition merging. In Proc. the IEEE Int. Conf. Communication, May 2018.
[2]
Gao G, Xiao M, Zhao Z. Optimal multi-taxi dispatch for mobile taxi-hailing systems. In Proc. the 45th IEEE Int. Conf. Parallel Processing, August 2016, pp.294-303.
[3]
Shokri R, Theodorakopoulos G, le Boudec J Y, Hubaux J P. Quantifying location privacy. In Proc. the 32nd IEEE Symp. Security and Privacy, May 2011, pp.247-262.
[4]
Meyer-Lee G, Shang J, Wu J. Location-leaking through network traffic in mobile augmented reality applications. In Proc. the 37th IEEE Int. Performance Computing and Communications Conf., November 2018.
[5]

Damiani M L, Bertino E, Silvestri C. The PROBE framework for the personalized cloaking of private locations. Trans. Data Privacy, 2010, 3(2): 123-148.

[6]
Xue M, Kalnis P, Pung H K. Location diversity: Enhanced privacy protection in location based services. In Proc. the 4th Int. Symp. Location and Context Awareness, May 2009, pp.70-87.
[7]
Pham A, Dacosta I, Endignoux G, Troncoso-Pastoriza J R, Huguenin K, Hubaux J P. ORide: A privacy-preserving yet accountable ride-hailing service. In Proc. the 26th USENIX Security Symp., August 2017, pp.1235-1252.
[8]
Aïvodji U M, Huguenin K, Huguet M J, Killijian M O. SRide: A privacy-preserving ridesharing system. In Proc. the 11th ACM Conf. Security & Privacy in Wireless and Mobile Networks, June 2018, pp.40-50.
[9]

He Y, Ni J, Wang X, Niu B, Li F, Shen X. Privacypreserving partner selection for ride-sharing services. IEEE Trans. Vehicular Technology, 2018, 67(7): 5994-6005.

[10]
Khazbak Y, Fan J, Zhu S, Cao G. Preserving location privacy in ride-hailing service. In Proc. the 2008 IEEE Conf. Communications and Network Security, May 2018.
[11]

Aurenhammer F. Voronoi diagrams — A survey of a fundamental geometric data structure. ACM Computing Surveys, 1991, 23(3): 345-405.

[12]
Duan Y, Gao G, Xiao M, Wu J. A privacy-preserving order dispatch scheme for ride-hailing services. In Proc. the 16th Int. Conf. Mobile Ad-hoc and Smart Systems, November 2019.
[13]

Hadiwardoyo S A, Patra S, Calafate C T, Cano J C, Manzoni P. An intelligent transportation system application for smartphones based on vehicle position advertising and route sharing in vehicular ad-hoc networks. Journal of Computer Sci. and Tech., 2018, 33(2): 249-262.

[14]

Beresford A R, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003, 2(1): 46-55.

[15]

Liu A, Li Z X, Liu G F, Zheng K, Zhang M, Li Q, Zhang X. Privacy-preserving task assignment in spatial crowdsourcing. Journal of Computer Sci. and Tech., 2017, 32(5): 905-918.

[16]
Hoh B, Gruteser M. Protecting location privacy through path confusion. In Proc. the 1st IEEE Int. Conf. Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.194-205.
[17]

Sánchez D, Martínez S, Domingo-Ferrer J. Co-utile P2P ridesharing via decentralization and reputation management. Transportation Research Part C: Emerging Technologies, 2016, 73: 147-166.

[18]

Goel P, Kulik L, Ramamohanarao K. Optimal pick up point selection for effective ride sharing. IEEE Trans. Big Data, 2017, 3(2): 154-168.

[19]
Dai C, Yuan X, Wang C. Privacy-preserving ridesharing recommendation in geosocial networks. In Proc. the 5th Int. Conf. Computational Social Networks, August 2016, pp.193-205.
[20]

Aïvodji U M, Gambs S, Huguet M J, Killijian M O. Meeting points in ridesharing: A privacy-preserving approach. Transportation Research Part C: Emerging Technologies, 2016, 72: 239-253.

[21]

Li H, Zhu H, Du S, Liang X, Shen X S. Privacy leakage of location sharing in mobile social networks: Attacks and defense. IEEE Trans. Dependable and Secure Computing, 2018, 15(4): 646-660.

[22]

Zhang N, Zhong S, Tian L. Using blockchain to protect personal privacy in the scenario of online taxi-hailing. Int. Journal of Computers Communications Control, 2017, 12(6): 886-902.

[23]

Pham A, Dacosta I, Jacot-Guillarmod B, Huguenin K, Hajar T, Tramèr F, Gligor V, Hubaux J, P. PrivateRide: A privacy-enhanced ride-hailing service. Proceedings on Privacy Enhancing Technologies, 2017, 2017(2): 38-56.

[24]

Liang X, Li X, Lu R, Lin X, Shen X. UDP: Usage-based dynamic pricing with privacy preservation for smart grid. IEEE Trans. Smart Grid, 2013, 4(1): 141-150.

[25]
Zhuo X, Gao W, Cao G, Dai Y. Win-coupon: An incentive framework for 3G traffic offloading. In Proc. the 19th Annual IEEE Int. Conf. Network Protocols, October 2011, pp.206-215.
[26]

Gao G, Xiao M, Wu J, Huang L, Hu C. Truthful incentive mechanism for nondeterministic crowdsensing with vehicles. IEEE Trans. Mobile Computing, 2018, 17(12): 2982-2997.

[27]

Edelman B, Ostrovsky M, Schwarz M. Internet advertising and the generalized second-price auction: Selling billions of dollars worth of keywords. The American Economic Review, 2007, 97(1): 242-259.

[28]

Vickrey W. Counterspeculation, auctions, and competitive sealed tenders. The Journal of Finance, 1961, 16(1): 8-37.

[29]
Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving user location privacy in mobile data management infrastructures. In Proc. the 6th Int. Workshop on Privacy Enhancing Technologies, June 2006, pp.393-412.
Journal of Computer Science and Technology
Pages 629-646
Cite this article:
Duan Y, Gao G-J, Xiao M-J, et al. Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems. Journal of Computer Science and Technology, 2020, 35(3): 629-646. https://doi.org/10.1007/s11390-020-0256-1
Metrics & Citations  
Article History
Copyright
Return