Abstract
The development of location-based services has brought not only conveniences to users’ daily life but also great concerns about users’ location privacy. Thus, privacy aware query processing that handles cloaked regions has become an important part in preserving user privacy. However, the state-of-the-art private query processors only focus on handling rectangular cloaked regions, while lacking an efficient and scalable algorithm for other complicated cloaked region shapes, such as polygon and circle. Motivated by that issue, we introduce a new location privacy aware nearest-neighbor query processor that provides efficient processing of complicated polygonal and circular cloaked regions, by proposing the Vertices Reduction Paradigm and the Group Execution Agent. In the Vertices Reduction Paradigm, we also provide a new tuning parameter to achieve trade-off between answer optimality and system scalability. Finally, experimental results show that our new query processing algorithm outperforms previous works in terms of both processing time and system scalability.
Chapter PDF
References
Douglas, D.H., Peucker, T.K.: Algorithms for the Reduction of The number of Points required to represent a Digitized Line Or its Caricature. In: Cartographica: The Intl. Journal for Geographic Information and Geovisualization, pp. 112–122. Univ. of Toronto Press (1973)
Beckman, N., Kriegel, H., Schneider, R., Seeger, B.: The R*-tree: an efficient and robust access method for points and rectangles. In: SIGMOD, pp. 322–331 (1990)
Dang, T.K., Phan, T.N., Ngo, C.N., Ngo, N.N.M.: An open design privacy-enhancing platform supporting location-based applications. In: ICUIMC, pp. 1–10 (2012)
Hu, H., Lee, D.L.: Range Nearest-Neighbor Query. IEEE TKDE 18(1), 78–91 (2006)
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE TKDE 19(12), 1719–1733 (2007)
Ardagna, C.A., Cremonini, M., Damiani, E., Vimercati, S.D.C., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: DBSec, pp. 47–60 (2007)
Truong, Q.C., Truong, T.A., Dang, T.K.: The Memorizing Algorithm: Protecting User Privacy in Location-Based Services using Historical Services Information. IJMCMC 2(4), 65–86 (2010)
Chow, C., Mokbel, M.F., Aref, W.G.: Casper*: Query processing for location services without compromising privacy. ACM TODS, 1–48 (2009)
Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: PerCom, pp. 243–251 (2005)
Dang, T.K., Truong, T.A.: Anonymizing but Deteriorating Location Databases. POLIBITS 46, 73–81 (2012)
Truong, A.T., Dang, T.K., Küng, J.: On Guaranteeing k-Anonymity in Location Databases. In: Hameurlain, A., Liddle, S.W., Schewe, K.-D., Zhou, X. (eds.) DEXA 2011, Part I. LNCS, vol. 6860, pp. 280–287. Springer, Heidelberg (2011)
Damiani, M.L., Bertino, E., Silvestri, C.: The PROBE Framework for the Personalized Cloaking of Private Locations. TDP 3(2), 123–148 (2010)
Le, T.T.B., Dang, T.K.: Semantic-Aware Obfuscation for Location Privacy at Database Level. In: Mustofa, K., Neunold, E., Tjoa, A M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 111–120. Springer, Heidelberg (2013)
To, Q.C., Dang, T.K., Küng, J.: Bob-Tree: An Efficient B + -Tree Based Index Structure for Geographic-Aware Obfuscation. In: Nguyen, N.T., Kim, C.-G., Janiak, A. (eds.) ACIIDS 2011. LNCS (LNAI), vol. 6591, pp. 109–118. Springer, Heidelberg (2011)
To, Q.C., Dang, T.K., Küng, J.: A Hilbert-based Framework for Preserving Privacy in Location-based Services. In: IJIIDS (2013)
Phan, T.N., Dang, T.K.: A Novel Trajectory Privacy-Preserving Future Time Index Structure in Moving Object Databases. In: ICCCI, pp. 124–134 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ngo, C.N., Dang, T.K. (2013). On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds) Information and Communication Technology. ICT-EurAsia 2013. Lecture Notes in Computer Science, vol 7804. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36818-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-36818-9_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36817-2
Online ISBN: 978-3-642-36818-9
eBook Packages: Computer ScienceComputer Science (R0)