Abstract
Location-based service (LBS) brings great benefits to individuals and society, but it also exist serious threat to users’ privacy, because LBS supplier may leak users’ location-related information. It is important to protect users’ privacy while providing LBS. However, current privacy protection and location recommendation service have the problem of timeliness. To address the problem, a location privacy preserving scheme based on Hilbert curve for LBS is proposed. Firstly, a Hilbert curve is generated from given parameters for coordinate transformation to correspond to Hilbert coordinates. Secondly, the points of users are transmitted to the location service provider (LSP) through the randomly generated point of the fog server without using such methods as K anonymous, which satisfy the demand. Then the user’s point of interest (POI) could be obtained by the weighted KNN algorithm of LSP. Finally, the user’s POI would be transmitted back to the client. Simulation results show that the proposed scheme provide location privacy with timeliness.
This work was supported in part by Guangxi Colleges and Universities Key Laboratory of Intelligent Processing of Computer Images and Graphics (No. GIIP1805) and Innovation Project of Guangxi Graduate Education (No. YCSW2018140), and Guangxi Science and Technology Plan Project (AD18216004\(\pounds \)AA18118039-2).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Casino, F., Domingo-Ferrer, J., Patsakis, C., Puig, D., Solanas, A.: A k-anonymous approach to privacy preserving collaborative filtering. J. Comput. Syst. Sci. 81(6), 1000–1011 (2015)
Chen, H., Lou, W.: On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive Mob. Comput. 16, 36–50 (2015)
Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pp. 171–178. ACM (2006)
Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 620–629. IEEE (2005)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobilea peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221–238. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_13
Hongliang, T., Zhihong, Q., Liang, X., et al.: Discrete degree WKNN location fingerprinting algorithm based on Wi-Fi. J. Harbin Inst. Technol. 49(5), 94–99 (2017)
Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_14
Liu, W., Fu, X., Deng, Z., Xu, L., Jiao, J.: Smallest enclosing circle-based fingerprint clustering and modified-WKNN matching algorithm for indoor positioning. In: 2016 International Conference on Indoor Positioning and Indoor Navigation (IPIN), pp. 1–6. IEEE (2016)
Liu, Y., Li, Z., Guo, W., Chaoxia, W.: Privacy-preserving multi-keywor ranked search over encrypted big data [keywor read keyword] (2015)
Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2012)
Meyerowitz, J., Roy Choudhury, R.: Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, pp. 345–356. ACM (2009)
Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506–1519 (2012)
Panda, M.: Performance analysis of encryption algorithms for security. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 278–284. IEEE (2016)
Pingley, A., Yu, W., Zhang, N., Fu, X., Zhao, W.: Cap: a context-aware privacy protection system for location-based services. In: 2009 29th IEEE International Conference on Distributed Computing Systems, pp. 49–57. IEEE (2009)
Pingley, A., Zhang, N., Fu, X., Choi, H.A., Subramaniam, S., Zhao, W.: Protection of query privacy for continuous location based services. In: 2011 Proceedings IEEE INFOCOM, pp. 1710–1718. IEEE (2011)
Thilina, K.M., Choi, K.W., Saquib, N., Hossain, E.: Pattern classification techniques for cooperative spectrum sensing in cognitive radio networks: SVM and W-KNN approaches. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 1260–1265. IEEE (2012)
Vu, K., Zheng, R., Gao, J.: Efficient algorithms for k-anonymous location privacy in participatory sensing. In: 2012 Proceedings IEEE INFOCOM, pp. 2399–2407. IEEE (2012)
Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2014)
Yen, L., Yan, C.H., Renu, S., Belay, A., Lin, H.P., Ye, Y.S.: A modified WKNN indoor Wi-Fi localization method with differential coordinates. In: 2017 International Conference on Applied System Innovation (ICASI), pp. 1822–1824. IEEE (2017)
Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: 2008 IEEE 24th International Conference on Data Engineering, pp. 366–375. IEEE (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhong, Y., Wang, T., Gan, C., Luo, X. (2019). The Location Privacy Preserving Scheme Based on Hilbert Curve for Indoor LBS. In: Tan, Y., Shi, Y., Niu, B. (eds) Advances in Swarm Intelligence. ICSI 2019. Lecture Notes in Computer Science(), vol 11656. Springer, Cham. https://doi.org/10.1007/978-3-030-26354-6_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-26354-6_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-26353-9
Online ISBN: 978-3-030-26354-6
eBook Packages: Computer ScienceComputer Science (R0)