Please wait a minute...
Journal of ZheJiang University (Engineering Science)  2020, Vol. 54 Issue (12): 2437-2444    DOI: 10.3785/j.issn.1008-973X.2020.12.019
    
Location-aware privacy protection scheme in continuous location-based service
Lei ZHENG(),Jun-xing ZHANG*()
College of Computer Science, Inner Mongolia University, Hohhot 010021, China
Download: HTML     PDF(883KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

A location-aware anonymous selection algorithm (LaSA) based on local cache was proposed in order to enhance the protection of users′ privacy in location-based service (LBS). Anonymous zones were constructed without relying on the trusted third-party (TTP) server, using historical track information and cache information. The Markov prediction model was used to select the possible query location in the future continuous location service query. The anonymous region was constructed to cover the region inspected by user based on predicted location, cache contribution, and data freshness. Results show that the proposed LaSA solution can provide a higher cache hit rate reduce the number of user service requests, and ensure the security of user′s location data with comparison with the existing schemes.



Key wordslocation-based service (LBS)      location privacy      caching-based solution      trajectory sensing      Markov model     
Received: 16 December 2019      Published: 31 December 2020
CLC:  TN 918.9  
Corresponding Authors: Jun-xing ZHANG     E-mail: zhenglei@mail.imu.edu.cn;junxing@imu.edu.cn
Cite this article:

Lei ZHENG,Jun-xing ZHANG. Location-aware privacy protection scheme in continuous location-based service. Journal of ZheJiang University (Engineering Science), 2020, 54(12): 2437-2444.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2020.12.019     OR     http://www.zjujournals.com/eng/Y2020/V54/I12/2437


面向连续位置服务的位置感知隐私保护方案

为了增强在位置服务(LBS)中对用户个人隐私的保护,提出基于本地缓存的位置感知匿名选择算法(LaSA). 利用历史轨迹信息和缓存信息,以不依赖可信第三方(TTP)服务器的方式构建匿名区域. 在连续位置服务查询中,利用马尔可夫预测模型对未来可能查询的位置进行预判. 根据预测位置、缓存贡献度和数据新鲜度构建匿名区域,以覆盖用户所查真实区域. 结果表明,与已有方案相比,所提出的LaSA隐私保护方案能提供更高的缓存命中率,减少用户服务请求次数,保证用户位置数据的安全.


关键词: 位置服务(LBS),  位置隐私,  缓存策略,  路径感知,  马尔可夫模型 
Fig.1 LaSA scheme architecture
Fig.2 Privacy protection strategy in LaSA scheme
参数 取值
Nt 12 024
x1y1)/ km (0,0)
x2y2)/ km (30,26)
Re/网格 2
k 3~20
τ 0.1~1.0
ε 0~0.5
Tab.1 Experimental parameter settings
Fig.3 Influence of anonymity on privacy
Fig.4 Influence of prediction and coverage on cache hit rate
[1]   LUO E, BHUIYAN M Z A, WANG G, et al Privacy protector: privacy-protected patient data collection in IoT-based healthcare systems[J]. IEEE Communications Magazine, 2018, 56 (2): 163- 168
doi: 10.1109/MCOM.2018.1700364
[2]   LIU Q, WANG G, LI F, et al Preserving privacy with probabilistic indistinguishability in weighted social networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2017, 28 (5): 1417- 1429
doi: 10.1109/TPDS.2016.2615020
[3]   LI L, LU R, HUANG C EPLQ: efficient privacy-preserving location-based query over outsourced encrypted data[J]. IEEE Internet of Things Journal, 2016, 3 (2): 206- 218
doi: 10.1109/JIOT.2015.2469605
[4]   AMAGATA D, HARA T A general framework for MaxRS and MaxCRS monitoring in spatial data streams[J]. ACM Transactions on Spatial Algorithms and Systems, 2017, 3 (1): 1- 34
[5]   JUNGGAB S, DONGHYUN K, ALAM B M Z, et al Privacy enhanced location sharing for mobile online social networks[J]. IEEE Transactions on Sustainable Computing, 2018, 5 (2): 279- 290
[6]   NIU B, GAO S, LI F, et al. Protection of location privacy in continuous LBSs against adversaries with background information [C]// ICNC. Kauai: IEEE, 2016: 1-6.
[7]   LIU H, LI X, LI H, et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services [C]// INFOCOM. Atlanta: IEEE, 2017: 1-9.
[8]   SCHLEGEL R, CHOW C Y, HUANG Q, et al User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015, 14 (10): 2158- 2172
[9]   ZHU X, CHI H, NIU B, et al. MobiCache: when k-anonymity meets cache [C]// Globecom. Atlanta: IEEE, 2013: 820-825.
[10]   REZA S, GEORGE T, PANOS P Hiding in the mobile crowd: locationprivacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11 (3): 266- 279
doi: 10.1109/TDSC.2013.57
[11]   ZHANG S, LIU Q, WANG G. A caching-based privacy-preserving scheme for continuous location-based services [C]//SpaCCS. Zhangjiajie: Springer, 2016: 73-82.
[12]   PINGLEY A, ZHANG N, FU X, et al. Protection of query privacy for continuous location based services [C]// INFOCOM. Shanghai: IEEE, 2011: 1710-1718.
[13]   LIAO D, SUN G, LI H, et al The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems[J]. Cluster Computing, 2017, 20 (2): 1- 15
[14]   WANG X, PANDE A, ZHU J, et al STAMP: enabling privacy-preserving location proofs for mobile users[J]. IEEE/ACM Transactions on Networking, 2016, 24 (6): 3276- 3289
doi: 10.1109/TNET.2016.2515119
[15]   胡德敏, 郑霞 基于Space Twist的k-匿名增量近邻查询位置隐私保护算法[J]. 计算机应用研究, 2016, (8): 2402- 2404
HU De-min, ZHENG Xia Space twist-based k-anonymity incremental nearest neighbor query algorithm for location privacy protection[J]. Application Research of Computers, 2016, (8): 2402- 2404
doi: 10.3969/j.issn.1001-3695.2016.08.035
[16]   HWANG R H, HSUEH Y L, WU J J, et al SocialHide: a generic distributed framework for location privacy protection[J]. Journal of Network and Computer Applications, 2016, 76 (9): 87- 100
[17]   NIU B, ZHU X, LI W, et al. EPcloak: an efficient and privacy-preserving spatial cloaking scheme for LBSs [C]// IEEE International Conference on Mobile Ad Hoc and Sensor Systems. Philadelphia: IEEE, 2014: 398-406.
[18]   ZHANG S, WANG G, LIU Q, et al. A trajectory privacy-preserving scheme based on dual-K mechanism for continuous location-based services [C]// IEEE ISPA / IUCC. Guangzhou: IEEE, 2017: 406-419.
[19]   SHUHEI H, DAICHI A, TAKAHIRO H, et al Dummy generation based on user-movement estimation for location privacy protection[J]. IEEE Access, 2018, 6: 22958- 22969
doi: 10.1109/ACCESS.2018.2829898
[20]   GONG X, CHEN X, XING K, et al. Personalized location privacy in mobile networks: a social group utility approach [C]// INFOCOM. Hong Kong: IEEE, 2015: 1008-1016.
[21]   NATESAN G, LIU J. An adaptive learning model for k-anonymity location privacy protection [C]// COMPSAC. Taichung: IEEE, 2015: 10-16.
[22]   HWANG R H, HSUEH Y L, CHUNG H W A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014, 7 (2): 126- 139
doi: 10.1109/TSC.2013.55
[23]   ZHANG S, WANG G, LIU Q, et al A trajectory privacy-preserving scheme based on query exchange in mobile social networks[J]. Soft Computing, 2017, 22 (18): 6121- 6133
[24]   JUNG K, JO S, SEOG P. A game theoretic approach for collaborative caching techniques in privacy preserving location-based services [C]// BIGCOMP. Jeju: IEEE, 2015: 59–62.
[25]   PENG T, LIU Q, MENG D, et al Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017, 387: 165- 179
doi: 10.1016/j.ins.2016.08.010
[26]   ZHANG S, CHOO K K R, LIU Q, et al Enhancing privacy through uniform grid and caching in location-based services[J]. Future Generation Computer Systems, 2017, 86 (9): 881- 892
[27]   NIU B, LI Q, ZHU X, et al. Enhancing privacy through caching in location-based services [C]// INFOCOM. Hong Kong: IEEE, 2015: 1017-1025.
[28]   李璐璐, 华佳烽, 万盛, 等 基于高效信息缓存的位置隐私保护方案[J]. 通信学报, 2017, 38 (6): 148- 157
LI Lu-lu, HUA Jia-feng, WAN Sheng, et al Achieving efficient location privacy protection based on cache[J]. Journal on Communications, 2017, 38 (6): 148- 157
[1] Xiao PAN,Yun-dan YANG,Xin YAO,Lei WU,Shu-hai WANG. Personalized potential route recommendation based on hidden Markov model[J]. Journal of ZheJiang University (Engineering Science), 2020, 54(9): 1736-1745.
[2] Tai-bo CHEN,Cui-fang ZHANG. Keyword recognition based on twice fusion of Posteriorgram and filler model[J]. Journal of ZheJiang University (Engineering Science), 2020, 54(6): 1170-1176.
[3] JIA Wen-chao, HU Rong-gui, SHI Fan, XU Cheng-xi. Injection vulnerability threat detection method with multi-feature correlation[J]. Journal of ZheJiang University (Engineering Science), 2018, 52(3): 524-530.
[4] XU Jian, HUANG Xiao-xi, GUO Ming, JIN Zheng-ping, ZHENG Ning. Location privacy through anonymous chain in dynamic P2P network[J]. Journal of ZheJiang University (Engineering Science), 2012, 46(4): 712-718.
[5] XU Jian,XU Ming,LIN Xin,ZHENG Ning. Location privacy protection through anonymous cells in road network[J]. Journal of ZheJiang University (Engineering Science), 2011, 45(3): 429-434.
[6] WANG Hua, YING Jing, JIANG Chao. Proactive self-adaptation of software based on inspecting uncertainty[J]. Journal of ZheJiang University (Engineering Science), 2010, 44(2): 213-219.