AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (516.4 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Privacy Quantification Model Based on the Bayes Conditional Risk in Location-Based Services

Department of Computer Science and Technology, the Shaanxi Province Key Laboratory of Computer Network, Xi’an Jiaotong University, Xi’an 710049, China.
School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730070, China.
Show Author Information

Abstract

The widespread use of Location-Based Services (LBSs), which allows untrusted service providers to collect large quantities of information regarding users’ locations, has raised serious privacy concerns. In response to these issues, a variety of LBS Privacy Protection Mechanisms (LPPMs) have been recently proposed. However, evaluating these LPPMs remains problematic because of the absence of a generic adversarial model for most existing privacy metrics. In particular, the relationships between these metrics have not been examined in depth under a common adversarial model, leading to a possible selection of the inappropriate metric, which runs the risk of wrongly evaluating LPPMs. In this paper, we address these issues by proposing a privacy quantification model, which is based on Bayes conditional privacy, to specify a general adversarial model. This model employs a general definition of conditional privacy regarding the adversary’s estimation error to compare the different LBS privacy metrics. Moreover, we present a theoretical analysis for specifying how to connect our metric with other popular LBS privacy metrics. We show that our privacy quantification model permits interpretation and comparison of various popular LBS privacy metrics under a common perspective. Our results contribute to a better understanding of how privacy properties can be measured, as well as to the better selection of the most appropriate metric for any given LBS application.

References

[1]
M. Gruteser and D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in Proc. the First Int’l Conf. on Mobile Systems, Application, and Services, San Francisco, USA, 2003, pp. 31-42.
[2]
M. F. Mokbel, C. Y. Chow, and W. G. Aref, The new Casper: Query processing for location services without compromising privacy, in Proc. the 32nd Int’l Conf. on Very Large Data Bases, Seoul, Korea, 2006, pp. 763-774.
[3]
X. Pan, J. L. Xu, and X. F. Meng, Protecting location privacy against location-dependent attacks in mobile services, IEEE Transaction on Knowledge and Data Engineering, vol. 24, no. 8, pp. 1506-1519, 2012.
[4]
X. J. Zhang, X. L. Gui, Z. C. Feng, F. Tian, S. Yu, and J. Q. Zhao, A quantifying framework of query privacy in location-based service, (in Chinese), Journal of Xi’an Jiaotong University, vol. 48, no. 2, pp. 8-13, 2014.
[5]
T. Xu and Y. Cai, Feeling-based location privacy protection for location-based services, in Proc. the 16th ACM Conf. on Computer and Communications Security, Chicago, USA, 2009, pp. 348-357.
[6]
B. Hoh and M. Gruteser, Protecting location privacy through path confusion, in Proc. the First Int’l Conf. on Security and Privacy for Emerging Areas in Communications Networks, Boppard, Germany, 2005, pp. 194-205.
[7]
L. Sweeney, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based System, vol. 10, no. 5, pp. 557-570, 2002.
[8]
M. Q. Xue, P. Kalnis, and H. K. Pung, Location diversity: Enhanced privacy protection in location based services, in Proc. the 4th Symposium on Location and Context Awareness, Tokyo, Japan, 2009, pp. 70-87.
[9]
R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, and J.-P. Hubaux, Unraveling an old cloak: k-anonymity for location privacy, in Proc. the 2010 ACM Workshop on Privacy in the Electronic Society, Chicago, USA, 2010, pp. 115-118.
[10]
D. Riboni, L. Pareschi, C. Bettini, and S. Jajodia, Preserving anonymity of recurrent location-based queries, in Proc. the 16th Int’l Symposium on Temporal Representation and Reasoning, Bressanone, Italy, 2009, pp. 62-69.
[11]
J. Freudiger, R. Shokri, and J.-P. Hubaux, Evaluating the privacy risk of location-based services, in Proc. the 15th Int’l Con. on Financial Cryptography and Data Security, Gros Islet, Saint Lucia, 2012, pp. 31-46.
[12]
D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer, From t-closeness-like privacy to postrandomization via information theory, IEEE Trans. on Knowledge and Data Engineering, vol. 22, no. 11, pp. 1623-1636, 2010.
[13]
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking, IEEE Trans. on Mobile Computing, vol. 9, no. 8, pp. 1089-1107, 2010.
[14]
R. Shokri, G. Theodorakopoulos, J.-Y. L. Boudec, and J.-P. Hubaux, Quantifying location privacy, in Proc. the 32nd IEEE Symposium on Security and Privacy (SP), Oakland, USA, 2011, pp. 247-262.
[15]
C. Dwork, Difference privacy, in Proc. the International Colloquium on Automata, Languages and Programming, Venice, Italy, 2006, pp. 1-12.
[16]
R. Dewri, Local differential perturbations: Location privacy under approximate knowledge attackers, IEEE Transactions on Mobile Computing, vol. 12, no. 12, pp. 2360-2372, 2013.
[17]
M. E. Andrés and N. E. Bordenabe, Geo-indistinguishability: Differential privacy for location-based system, in Proc. the 20th ACM Conf. on Computer and Communications Security, Berlin, Germany, 2013, pp. 901-914.
[18]
K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, and C. Palamidessi, Broadening the scope of differential privacy using metric, in Proc. the Privacy Enhancing Technologies, Bloomingto, USA, 2013, pp. 82-102.
[19]
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. L. Boudec, Protecting location privacy: Optimal strategy against localization attacks, in Proc. the 19th ACM Conf. on Computer and Communication Security, Raleigh, USA, 2012, pp. 617-626.
[20]
D. Rebollo-Monedero, J. Parra-Arnau, C. Diaz, and J. Forné, On the measure of privacy as an attacker’s estimation error, International Journal of Information Security, vol. 12, pp. 129-149, 2013.
[21]
A. Pingley, N. Zhang, X. W. Fu, H.-A. Choi, S. Subramaniam, and W. Zhao, Protection of query privacy for continuous location based services, in Proc. the 30th IEEE Communications Society Conf. on Computer Communications, Shanghai, China, 2011, pp. 1710-1718.
Tsinghua Science and Technology
Pages 452-462
Cite this article:
Zhang X, Gui X, Tian F, et al. Privacy Quantification Model Based on the Bayes Conditional Risk in Location-Based Services. Tsinghua Science and Technology, 2014, 19(5): 452-462. https://doi.org/10.1109/TST.2014.6919821

529

Views

9

Downloads

9

Crossref

N/A

Web of Science

15

Scopus

0

CSCD

Altmetrics

Received: 26 April 2014
Revised: 14 July 2014
Accepted: 13 August 2014
Published: 13 October 2014
© The Author(s) 2014
Return