Abstract
In this chapter, we investigate the optimal multiple mix zones placement problem for location privacy preservation. We model the area covered by location-based services as a graph, where all vertices (POIs) are considered as candidates for mix zone deployment. In order to protect mobile users from side information based inferential attacks, we propose to use pairwise vertex association to characterize the linkability of the POIs along a user’s trajectory on the map. To achieve maximum privacy preservation, we formulate the optimization problem with the objective of maximizing the overall discontinuity of all possible trajectories on the road network and subject to deployment cost, traffic density, and differentiated privacy priority constraints. For each road segment and intersection, the traffic density effect in terms of entropy is also taken into account. We design three heuristic algorithms corresponding to different traffic scenarios and privacy preservation levels as practical and efficient solutions to the NP-hard optimization problem. Through extensive simulations based on realistic mobile user data traces, we demonstrate that our solution yields satisfactory performance in reducing the success rate of inferential attacks. The mathematical modeling and performance results presented in this chapter offer both theoretical and practical guidance to multiple mix zones placement in mobile networks for protecting users’ location privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arulselvan, A., Commander, C., Elefteriadou, L., Pardalos, P.: Detecting critical nodes in sparse graphs. Comput. Oper. Res. 36(7), 2193–2200 (2009)
Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Proceeding of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT) (2003)
Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)
Beresford, A., Stajano, F.: Mix zones: User privacy in location-aware services. In: Proceeding of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW), pp. 127–131 (2004)
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Proceeding of the 6th Workshop on Privacy Enhancing Technologies (PETs), pp. 393–412 (2006)
Cormen, T.: Introduction to algorithms. The MIT press, Cambridge (2001)
Dahl, M., Delaune, S., Steel, G.: Formal analysis of privacy for vehicular mix-zones. In: Proceeding of the 15th European conference on Research in computer security (ESORICS), pp. 55–70 (2010)
Freudiger, J., Raya, M., Félegyházi, M., Papadimitratos, P., Hubaux, J.: Mix-zones for location privacy in vehicular networks. In: Proceeding of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS) (2007)
Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: Proceeding of the 9th International Symposium on Privacy Enhancing Technologies (PETS), pp. 216–234 (2009)
Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceeding of the International Conference on Distributed Computing Systems (ICDCS), pp. 620–629 (2005)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceeding of the International Conference on Mobile Systems, Applications and Services (MobiSys), pp. 31–42 (2003)
Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Silent cascade: Enhancing location privacy without communication qos degradation. In: Proceeding of the International Conference on Security in Pervasive Computing (SPC), pp. 165–180 (2006)
IBM: IBM ILOG CPLEX optimizer. http://www-01.ibm.com/software/integration/optimization/cplex-optimizer/ (2012)
Kotz, D., Henderson, T., Abyzov, I.: CRAWDAD data set dartmouth/campus (v. 2004–12-18). Downloaded from http://www.crawdad.org/dartmouth/campus (2004)
Lee, B., Oh, J., Yu, H., Kim, J.: Protecting location privacy using location semantics. In: Proceeding of the 17th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 1289–1297. ACM (2011)
Ma, C.Y., Yau, D.K., Yip, N.K., Rao, N.S.: Privacy vulnerability of published anonymous mobility traces. In: Proceeding of the International Conference on Mobile Computing and Networking (MobiCom) (2010)
Palanisamy, B., Liu, L.: MobiMix: Protecting location privacy with mix-zones over road networks. In: Proceeding of the International Conference on Data Engineering (ICDE), pp. 494–505 (2011)
Schiller, J., Voisard, A.: Location-based services. Morgan Kaufmann, San Francisco (2004)
Shin, H., Vaidya, J., Atluri, V., Choi, S.: Ensuring privacy and security for LBS through trajectory partitioning. In: Proceeding of the International Conference on Mobile Data Management (MDM), pp. 224–226. IEEE (2010)
Shokri, R., Troncoso, C., Diaz, C., Freudiger, J., Hubaux, J.: Unraveling an old cloak: k-anonymity for location privacy. In: Proceeding of the 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115–118. ACM (2010)
The 10 Billion Rule: Location, Location, Location. http://www.strategyanalytics.com (2011)
Terrovitis, M., Mamoulis, N.: Privacy preservation in the publication of trajectories. In: Proceeding of the International Conference on Mobile Data Management (MDM), pp. 65–72 (2008)
Wang, T., Liu, L.: Privacy-aware mobile services over road networks. Proc. of the VLDB Endowment 2(1), 1042–1053 (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Liu, X., Li, X. (2013). Privacy Preservation Using Multiple Mix Zones. In: Location Privacy Protection in Mobile Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-9074-6_2
Download citation
DOI: https://doi.org/10.1007/978-1-4614-9074-6_2
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-9073-9
Online ISBN: 978-1-4614-9074-6
eBook Packages: Computer ScienceComputer Science (R0)