Skip to main content

Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

  • 1786 Accesses

Abstract

It is very important for LBS popularization and application to study personalized location privacy preservation algorithms based on road networks for the mobile users. This paper proposes the Prediction Group by L algorithm (i.e., PL) in which the road networks is represented as a weighted graph, and the value of the weight of each edge is equal to its selection rate; the edges of the graph are sorted by the depth-first search algorithm, and grouped by the privacy degree of user where the group is used as the anonymous edge set (i.e., AES) to realize the location privacy preservation. The experimental results show that PL has high success rate of privacy. Additionally, it is able to provide higher quality personalized location privacy preservation because the AES generated by this algorithm is more approached to the privacy requirements of users than some other typical algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mokbel, M.F.: Privacy in location-based services: state-of -the-art and research directions. In: Proceedings of the 8th International Conference on Mobile Data Management, p. 228 (2007)

    Google Scholar 

  2. Pedreschi, D., Bonchi, F., Turini, F., Verykios, V.S., Atzori, M., Malin, B., Moelans, B., Saygin, Y.: Privacy protection: regulations and technologies, opportunities and threats. In: Giannotti, F., Pedreschi, D. (eds.) Mobility, Data Mining And Privacy, pp. 101–119. Springer, Berlin (2008)

    Chapter  Google Scholar 

  3. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  4. Gruteser, M., Grunwald, D.: Anonymous usage of location- based services through spatial and temporal cloaking. In: Proceedings of the first International Conference on Mobile Systems, Applications, and Services. San Francisco, CA, USA, pp. 163–168 (2003)

    Google Scholar 

  5. Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Wang, T., Liu, L.: Privacy-aware mobile services over road networks. Proc. VLDB Endow. 2(1), 1042–1053 (2009)

    Article  Google Scholar 

  7. Mouratidis, K., Yiu, M.L.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. TKDE 22(1), 2–15 (2010)

    Article  Google Scholar 

  8. Xue, J., Liu, X., Yang, X., et al.: A location privacy preserving approach on road networks. Chin. J. Comput. 34(5), 865–878 (2011). (In Chinese)

    Article  Google Scholar 

  9. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, pp. 763–774 (2006)

    Google Scholar 

  10. Hong-Yun, X., Jun, X., Gong, Y.-J., Meng-Zhen, X.: Algorithms to generate location privacy area based on location privacy protection with spatial cloaking. J. S. Chin. Univ. Technol. (Nat. Sci. Ed.) 42(1), 97–103 (2014). (in Chinese)

    Google Scholar 

  11. Machanavajjhala, A., Gehrke, J., et al.: L-diversity: privacy beyond k-anonymity. In: Proceedings of 22nd International Conference on Data Engineering, Atlanta, Georgia, USA, pp. 24–36 (2006)

    Google Scholar 

  12. Baum, L.E., Petrie, T.: Statistical inference for probabilistic functions of finite state Markov chains. Ann. Math. Stat. 37(6), 1554–1563 (1966)

    Article  MathSciNet  MATH  Google Scholar 

  13. Brinkhoff, T.: A framework for generating network-based moving objects. GeoInfomatica 6(2), 153–180 (2002)

    Article  MATH  Google Scholar 

  14. Pan, X., Xiao, Z., Meng, X.: Survey of location privacy-preserving. J. Front. Comput. Sci. Technol. 1(3), 268–281 (2007). (In Chinese)

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by the Natural Science Foundation of China (No. 61272403), by the Fundamental Research Funds for the Central Universities (No. 10561201474). We also appreciate Yaohui Zheng and Kai Tian for their kindly help of the experimental analysis and programming.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Xu, H., Yang, J., Zhang, Y., Xu, M., Gan, J. (2015). Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics