AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (2.3 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services

College of Information Engineering, Taiyuan University of Technology, Taiyuan 030024, China
Department of Computer Science, the University of North Carolina at Charlotte, Charlotte, NC 28223, USA.
Samsung Research America, Mountain View, CA 94043, USA.
School of Computer Science, Beijing Institute of Technology, Beijing 100081, China.
Show Author Information

Abstract

Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real-life scenarios. In this paper, we introduce a new location privacy problem: Location-aware Location Privacy Protection (L2P2) problem, where users can define dynamic and diverse privacy requirements for different locations. The goal of the L2P2 problem is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user. In this paper, we formalize two versions of the L2P2 problem, and propose several efficient heuristics to provide such location-aware location privacy protection for mobile users. Through extensive simulations over large synthetic and real-life datasets, we confirm the effectiveness and efficiency of the proposed L2P2 algorithms.

References

[1]
Heussner K. M., Google, Apple track users’ location information, but why? http://abcnews.go.com/Technology/, April 29, 2011.
[2]
Guo B., Wang Z., Yu Z., Wang Y., Yen N., Huang R., and Zhou X., Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm, ACM Computing Surveys, vol. 48, no. 1, p. 7, 2015.
[3]
Su X., Tong H., and Ji P., Activity recognition with smartphone sensors, Tsinghua Science and Technology, vol. 19, no. 3, pp. 235-249, 2014.
[4]
Wang Y., Li F., and Dahlberg T., Energy-efficient topology control for three-dimensional sensor networks, International Journal of Sensor Networks, vol. 4, nos. 1&2, pp. 68-78, 2008
[5]
Wang Y., Song W.-Z., Wang W., Li X.-Y., and Dahlberg T., LEARN: Localized energy aware restricted neighborhood routing for ad hoc networks, in Proc. of IEEE SECON, 2006.
[6]
Zhu Y., Zhang C., Li F., and Wang Y., Geo-Social: Routing with location and social metrics in mobile opportunistic networks, in Proc. of IEEE ICC, 2015.
[7]
Beresford A. R. and Stajano F., Location privacy in pervasive computing, IEEE Pervasive Computing, vol. 2, pp. 46-55, 2003.
[8]
Gruteser M. and Grunwald D., Anonymous usage of location-based services through spatial and temporal cloaking, in Proc. of ACM MobiSys, 2003.
[9]
Xu T. and Cai Y., Feeling-based location privacy protection for location-based services, in Proc. of ACM CCS ’09, 2009.
[10]
Brinkhoff T., A framework for generating network-based moving objects, GeoInformatica, vol. 6, pp. 153-180, 2002.
[11]
Yuan J., Zheng Y., Zhang C., Xie W., Xie X., Sun G., and Huang Y., T-Drive: Driving directions based on taxi trajectories, in Proc. of ACM SIGSPATIAL GIS, 2010.
[12]
Yuan J., Zheng Y., Xie X., and Sun G., Driving with knowledge from the physical world, in Proc. of ACM KDD, 2011.
[13]
Wang Y., Xu D., He X., Zhang C., Li F., and Xu B., L2P2: Location-aware location privacy protection for location-based services, in Proc. of IEEE INFOCOM, 2012.
[14]
Bettini C., Wang X. S., and Jajodia S., Protecting privacy against location-based personal identification, in Proc. of 2nd VLDB Workshop on Secure Data Management, 2005.
[15]
Kido H., Yanagisawa Y., and Satoh T., An anonymous communication technique using dummies for location-based services, in Proc. of IEEE Int’l Conf. on Pervasive Services (ICPS), 2005.
[16]
Duckham M. and Kulik L., A formal model of obfuscation and negotiation for location privacy, in Proc. of Int’l Conf. on Pervasive Comp., 2005.
[17]
Cheng R., Zhang Y., Bertino E., and Prabhakar S., Preserving user location privacy in mobile data management infrastructures, in Proc. of the 6th Workshop on Privacy Enhancing Technologies, 2006.
[18]
Chow C.-Y., Mokbel M. F., and Liu X., A peer-to-peer spatial cloaking algorithm for anonymous location-based service, in Proc. of ACM Intl Symp. on Advances in Geographic Information Systems (GIS), 2006.
[19]
Gruteser M. and Hoh B., On the anonymity of periodic location samples, in Proc. of the 2nd Intl Conf. on Security in Pervasive Computing, 2005.
[20]
Hoh B. and Gruteser M., Protecting location privacy through path confusion, in Proc. of SECURECOMM, 2005.
[21]
Hoh B., Gruteser M., Xiong H., and Alrabady A., Preserving privacy in GPS traces via uncertainty aware path cloaking, in Proc. of ACM CCS, 2007.
[22]
Mokbel M. F., Chow C.-Y., and Aref W. G., The new casper: Query processing for location services without compromising privacy, in Proc. of VLDB, 2006.
[23]
Duckham M. and Lars K., Location privacy and location-aware computing, in Dynamic & Mobile GIS: Investigating Change in Space and Time. CRC Press, 2006, pp. 34-51.
[24]
Krumm J., A survey of computational location privacy, Personal Ubiquitous Computing, vol. 13, pp. 391-399, 2009.
[25]
Gedik B. and Liu L., Location privacy in mobile systems: A personalized anonymization model, in Proc. of IEEE ICDCS, 2005.
[26]
Gedik B. and Liu L., Protecting location privacy with personalized k-anonymity: Architecture and algorithms, IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008.
[27]
Samet H., The Design and Analysis of Spatial Data Structures. Addison-Wesley Longman Publishing Co., Inc., 1990.
[28]
Shokri R., Theodorakopoulos G., Boudec J.-Y. Le, and Hubaux J.-P., Quantifying location privacy, in Proc. of IEEE Symp. on Security and Privacy (S&P), 2011.
[29]
Shokr R., Theodorakopoulos G., Troncoso C., Hubaux J.-P., and Boudec J.-Y. Le, Protecting location privacy: Optimal strategy against localization attacks, in Proc. of ACM CCS, 2012.
[30]
Jung T. and Li X.-Y., Search me if you can: Privacy preserving location query service, in Proc. IEEE INFOCOM, 2013.
Tsinghua Science and Technology
Pages 243-259
Cite this article:
Wang Y, Xu D, Li F. Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services. Tsinghua Science and Technology, 2016, 21(3): 243-259. https://doi.org/10.1109/TST.2016.7488736

528

Views

18

Downloads

23

Crossref

N/A

Web of Science

32

Scopus

5

CSCD

Altmetrics

Received: 05 January 2016
Accepted: 22 February 2016
Published: 13 June 2016
© The author(s) 2016
Return