Skip to main content

Privacy Preservation Using Multiple Mix Zones

  • Chapter
  • First Online:
Location Privacy Protection in Mobile Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

In this chapter, we investigate the optimal multiple mix zones placement problem for location privacy preservation. We model the area covered by location-based services as a graph, where all vertices (POIs) are considered as candidates for mix zone deployment. In order to protect mobile users from side information based inferential attacks, we propose to use pairwise vertex association to characterize the linkability of the POIs along a user’s trajectory on the map. To achieve maximum privacy preservation, we formulate the optimization problem with the objective of maximizing the overall discontinuity of all possible trajectories on the road network and subject to deployment cost, traffic density, and differentiated privacy priority constraints. For each road segment and intersection, the traffic density effect in terms of entropy is also taken into account. We design three heuristic algorithms corresponding to different traffic scenarios and privacy preservation levels as practical and efficient solutions to the NP-hard optimization problem. Through extensive simulations based on realistic mobile user data traces, we demonstrate that our solution yields satisfactory performance in reducing the success rate of inferential attacks. The mathematical modeling and performance results presented in this chapter offer both theoretical and practical guidance to multiple mix zones placement in mobile networks for protecting users’ location privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arulselvan, A., Commander, C., Elefteriadou, L., Pardalos, P.: Detecting critical nodes in sparse graphs. Comput. Oper. Res. 36(7), 2193–2200 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  2. Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Proceeding of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT) (2003)

    Google Scholar 

  3. Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)

    Article  Google Scholar 

  4. Beresford, A., Stajano, F.: Mix zones: User privacy in location-aware services. In: Proceeding of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW), pp. 127–131 (2004)

    Google Scholar 

  5. Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Proceeding of the 6th Workshop on Privacy Enhancing Technologies (PETs), pp. 393–412 (2006)

    Google Scholar 

  6. Cormen, T.: Introduction to algorithms. The MIT press, Cambridge (2001)

    Google Scholar 

  7. Dahl, M., Delaune, S., Steel, G.: Formal analysis of privacy for vehicular mix-zones. In: Proceeding of the 15th European conference on Research in computer security (ESORICS), pp. 55–70 (2010)

    Google Scholar 

  8. Freudiger, J., Raya, M., Félegyházi, M., Papadimitratos, P., Hubaux, J.: Mix-zones for location privacy in vehicular networks. In: Proceeding of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS) (2007)

    Google Scholar 

  9. Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: Proceeding of the 9th International Symposium on Privacy Enhancing Technologies (PETS), pp. 216–234 (2009)

    Google Scholar 

  10. Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceeding of the International Conference on Distributed Computing Systems (ICDCS), pp. 620–629 (2005)

    Google Scholar 

  11. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceeding of the International Conference on Mobile Systems, Applications and Services (MobiSys), pp. 31–42 (2003)

    Google Scholar 

  12. Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Silent cascade: Enhancing location privacy without communication qos degradation. In: Proceeding of the International Conference on Security in Pervasive Computing (SPC), pp. 165–180 (2006)

    Google Scholar 

  13. IBM: IBM ILOG CPLEX optimizer. http://www-01.ibm.com/software/integration/optimization/cplex-optimizer/ (2012)

  14. Kotz, D., Henderson, T., Abyzov, I.: CRAWDAD data set dartmouth/campus (v. 2004–12-18). Downloaded from http://www.crawdad.org/dartmouth/campus (2004)

  15. Lee, B., Oh, J., Yu, H., Kim, J.: Protecting location privacy using location semantics. In: Proceeding of the 17th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 1289–1297. ACM (2011)

    Google Scholar 

  16. Ma, C.Y., Yau, D.K., Yip, N.K., Rao, N.S.: Privacy vulnerability of published anonymous mobility traces. In: Proceeding of the International Conference on Mobile Computing and Networking (MobiCom) (2010)

    Google Scholar 

  17. Palanisamy, B., Liu, L.: MobiMix: Protecting location privacy with mix-zones over road networks. In: Proceeding of the International Conference on Data Engineering (ICDE), pp. 494–505 (2011)

    Google Scholar 

  18. Schiller, J., Voisard, A.: Location-based services. Morgan Kaufmann, San Francisco (2004)

    Google Scholar 

  19. Shin, H., Vaidya, J., Atluri, V., Choi, S.: Ensuring privacy and security for LBS through trajectory partitioning. In: Proceeding of the International Conference on Mobile Data Management (MDM), pp. 224–226. IEEE (2010)

    Google Scholar 

  20. Shokri, R., Troncoso, C., Diaz, C., Freudiger, J., Hubaux, J.: Unraveling an old cloak: k-anonymity for location privacy. In: Proceeding of the 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115–118. ACM (2010)

    Google Scholar 

  21. The 10 Billion Rule: Location, Location, Location. http://www.strategyanalytics.com (2011)

  22. Terrovitis, M., Mamoulis, N.: Privacy preservation in the publication of trajectories. In: Proceeding of the International Conference on Mobile Data Management (MDM), pp. 65–72 (2008)

    Google Scholar 

  23. Wang, T., Liu, L.: Privacy-aware mobile services over road networks. Proc. of the VLDB Endowment 2(1), 1042–1053 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinxin Liu .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Liu, X., Li, X. (2013). Privacy Preservation Using Multiple Mix Zones. In: Location Privacy Protection in Mobile Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-9074-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-9074-6_2

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-9073-9

  • Online ISBN: 978-1-4614-9074-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics