Skip to main content

Study on Personalized Location Privacy Protection Algorithms for Continuous Queries in LBS

  • Conference paper
  • First Online:
  • 1513 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

Abstract

Privacy protection and quality of LBS is a pair of contradictions. How to improve quality of LBS while ensuring privacy requirements is worthy of study. In continuous queries, users may have different privacy requirements in different situations, so we propose two algorithms to address this problem, in which before satisfying privacy requirements, they expand cloaking area that contains least users according to the pyramid structure and user’s moving trend respectively. Experimental results show that, the two algorithms both satisfy user’s personalized privacy requirements, and reduce cloaking area, thus improve the query efficiency, especially the latter algorithm, where the cloaking area is nearly one sixth as large as that of the compared algorithms in the best situation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  2. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity — a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001). doi:10.1007/3-540-44702-4_1

    Chapter  Google Scholar 

  3. Wang, Y., Xu, D., He, X., Zhang, C., Li, F., Xu, B.: L2P2: location-aware location privacy protection for location-based services. In: Proceedings of IEEE INFOCOM (2012)

    Google Scholar 

  4. You, T., Peng, W., Lee, W.: Protecting moving trajectories with dummies. In: Proceedings of the 2007 International Conference on Mobile Data Management (DMD 2007) (2007)

    Google Scholar 

  5. Um, J.H., Jang, M.Y., Jo, K.J., Chan, J.W.: A new cloaking method supporting both k-anonymity and l-diversity for privacy protection in location-based service. In: International Symposium on Parallel and Distributed Processing with Applications, (2009)

    Google Scholar 

  6. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, Ser. VLDB 2006 (2006)

    Google Scholar 

  7. Wang, T., Liu, L.: Privacy-aware mobile services over road networks. In: VLDB, pp. 1042–1053 (2009)

    Google Scholar 

  8. Hossain, A.A., Hossain, A., Yoo, H.K., Chang, J.W.: H-star: Hilbert-order based star network expansion cloaking algorithm in of road networks. In: Proceedings of the IEEE 14th International Conference on Computational Science and Engineering, pp. 81–88 (2011)

    Google Scholar 

  9. Xu, T., Cai,Y.: Location anonymity in continuous location-based services. In: Proceedings of the 15th Annual ACM International Symposium on Advances in Geographic Information Systems (2007)

    Google Scholar 

  10. Mascetti, S., Bettini, C., Wang, X.S., Freni, D., Jajodia, S.: Providenthider: an algorithm to preserve historical k-anonymity in LBS. In: Proceedings of the International Conference on Mobile Data Management: Systems, Services and Middleware (2009)

    Google Scholar 

  11. Shin, H., Vaidya, J., Atluri, V., Choi, S.: Ensuring privacy and security for LBS through trajectory partitioning. In: Eleventh International Conference on Mobile Data Management (2010)

    Google Scholar 

  12. Zhang, X., Kim, G.B., Bae, H.Y.: An adaptive spatial cloaking method for privacy protection in location-based service. In: 2014 IEEE International Conference on Information and Communication Technology Convergence (ICTC), pp. 480–485 (2014)

    Google Scholar 

  13. Lin, C., Wu, G., Yu, C.W.: Protecting location privacy and query privacy: a combined clustering approach. Concurrency Comput. Pract. Experience 27(12), 3021–3043 (2015)

    Article  Google Scholar 

  14. Samet, H.: The Design and Analysis of Spatial Data Structures. Addison Wesley Longman Publishing Co. Inc., Boston (1990)

    Google Scholar 

  15. Gruteser, M., Grunwald, D.: Anonymous usage of location based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, California, pp. 31–42 (2003)

    Google Scholar 

  16. Xu, T., Cai, Y.: Feeling-based location privacy protection for location based services. In: Proceedings of ACM CCS 2009 (2009)

    Google Scholar 

  17. Brinkhoff, T.: A framework for generating network-based moving objects. GeoInformatica 6(2), 153–180 (2002)

    Article  MATH  Google Scholar 

Download references

Acknowledgements

The work was partially supported by the Natural Science Foundation of China (No. 61272403), by the Fundamental Research Funds for the Central Universities (No. 10561201474).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Gan, J., Xu, H., Xu, M., Tian, K., Zheng, Y., Zhang, Y. (2016). Study on Personalized Location Privacy Protection Algorithms for Continuous Queries in LBS. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics