Please wait a minute...
J4  2012, Vol. 46 Issue (4): 712-718    DOI: 10.3785/j.issn.1008-973X.2012.04.020
Location privacy through anonymous chain in dynamic P2P network
XU Jian1, HUANG Xiao-xi1, GUO Ming2, JIN Zheng-ping1, ZHENG Ning1
1. College of Computer, Hangzhou Dianzi University, Hangzhou 310018, China;2. School of Computer and
Computing Science, Zhejiang University City College, Hangzhou 310015, China
Download:   PDF(0KB) HTML
Export: BibTeX | EndNote (RIS)      


An anonymous chain based privacy protection algorithm was presented to solve the problem of location privacy protecting in dynamic peer-to-peer (P2P) network. Different from the general K-anonymity method, anonymous chain was constructed to break the one-to-one correspondence between the user identity and location information during the forwarding process of query message, and the location privacy was protected with the completion of the query. The algorithm optimizes the selection of intermediate nodes according to the stability of linkage between two nodes in order to deal with the dynamic issues in P2P environment.A connectivity matrix was introduced for the chain constructing algorithm and the security of anonymous chain was proved. A simulation on a real city map for the algorithm showed the effectiveness. The results prove that anonymous chain can be constructed in different density of moving nodes and the optimal intermediate nodes selecting method obviously improves the stability of the chain.

Published: 17 May 2012
CLC:  TP 391  
Cite this article:

XU Jian, HUANG Xiao-xi, GUO Ming, JIN Zheng-ping, ZHENG Ning. Location privacy through anonymous chain in dynamic P2P network. J4, 2012, 46(4): 712-718.

URL:     OR



[1] KARIM W. Privacy implications of personal locators: why you should think twice before voluntarily availing yourself to GPS monitoring [J]. Journal of Law and Policy, 2004, 14(1): 485-515.
[2] BARKHUUS L, DEY A. Locationbased services for mobile telephony: a study of users’s privacy concerns [C] ∥Proceedings of Interact. Zurich: IOS, 2003: 709-712.
[3] GRUTESER M, GRUNWALD D. Anonymous usage of location based services through spatial and temporal cloaking [C] ∥Proceedings of Mobile systems, Applications and Services. San Francisco: ACM, 2003: 31-42.
[4] KIDO H, YANAGISAWA H. A anonymous communication technique using dummies for locationbased services[C] ∥Proceedings of ICPS. Santorini: IEEE, 2005: 88-97.
[5] GHINITA G, KALNIS P, KHOSHGOZARAN A, et a1. Private queries in location based services: anonymizers are not necessary [C] ∥Proceedings of the ACM International Conference on Management of Data. Vancouver: ACM, 2008: 121-132.
[6] BAMBA B, LIU L, PESTI P. Supporting anonymous location queries in mobile environments with privacy grid [C]∥ Proceedings of World Wide Web. Beijing: IEEE, 2008: 237-246.
[7] GEDIK B, LIU L. Protecting location privacy with personalized kanonymity: architecture and algorithms [J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-17.
[8] XU J, TANG X, HU H, et a1. Privacyconscious locationbased queries in mobile environments [J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(3): 313-326.
[9] KYRIAKOS M, YIU M. Anonymous query processing in road networks [J]. IEEE Transactions on Knowledge and Data Engineering, 2010, 22(1): 2-15.
[10] BALAJI P, LIU L. MobiMix: protecting location privacy with mix zones over road networks [C] ∥Proceedings of IEEE International Conference on Data Engineering (ICDE). Hannover: IEEE, 2011: 11-16.
[11] GHINITA G, KALNIS P, SKIADOPOULOS S. PRIVE: anonymous locationbased queries in distributed mobile systems [C]∥Proceedings of World Wide Web. Banff: ACM, 2007: 371-380.
[12] CHOW Chiyin, MOHAMED M, XUAN L. Spatial cloaking for anonymous locationbased services in mobile peertopeer environments [J]. GeoInformatica, 2011,15(2): 351-380.
[13] AMIR A, EFRAT A, MYLLYMAKI J, et al. Buddy tracking: efficient proximity detection among mobile friends [C]∥Proceedings of IEEE INFOCOM. Hong Kong: IEEE, 2004: 7-11.
[14] YIU M L, YU L H, SALTENIS S, et al. Efficient proximity detection among mobile users via selftuning policies [C]∥Proceedings of VLDB. Singapore: ACM, 2010: 13-17.
[15] HUBAUX J P, CAPKUN S, LUO J. The security and privacy of smart vehicles [J]. IEEE Security and Privacy, 2004(3): 4955.
[16] KU W S, ZIMMERMANN R, WANG H. Locationbased spatial query processing with data sharing in wireless broadcast environments [J]. IEEE Transactions on Mobile Computing, 2008, TMC 7(6): 778-791.
[17] THOMAS B. Generating networkbased moving objects [C] ∥Proceedings of International Conference on Scientific and Statistical Database Management. Berlin: IEEE, 2000: 253-256.

[1] ZHAO Jian-jun, WANG Yi, YANG Li-bin. Threat assessment method based on time series forecast[J]. J4, 2014, 48(3): 398-403.
[2] CUI Guang-mang, ZHAO Ju-feng,FENG Hua-jun, XU Zhi-hai,LI Qi, CHEN Yue-ting. Construction of fast simulation model for degraded image by inhomogeneous medium[J]. J4, 2014, 48(2): 303-311.
[3] ZHANG Tian-yu, FENG Hua-jun, XU Zhi-hai, LI Qi, CHEN Yue-ting. Sharpness metric based on histogram of strong edge width[J]. J4, 2014, 48(2): 312-320.
[4] LIU Zhong, CHEN Wei-hai, WU Xing-ming, ZOU Yu-hua, WANG Jian-hua. Salient region detection based on stereo vision[J]. J4, 2014, 48(2): 354-359.
[5] WANG Xiang-bing,TONG Shui-guang,ZHONG Wei,ZHANG Jian. Study on  scheme design technique for hydraulic excavator's structure performance based on extension reuse[J]. J4, 2013, 47(11): 1992-2002.
[6] WANG Jin, LU Guo-dong, ZHANG Yun-long. Quantification-I theory based IGA and its application[J]. J4, 2013, 47(10): 1697-1704.
[7] LIU Yu, WANG Guo-jin. Designing  developable surface pencil through  given curve as its common asymptotic curve[J]. J4, 2013, 47(7): 1246-1252.
[8] HU Gen-sheng, BAO Wen-xia, LIANG Dong, ZHANG Wei. Fusion of panchromatic image and multi-spectral image based on
SVR and Bayesian method 
[J]. J4, 2013, 47(7): 1258-1266.
[9] WU Jin-liang, HUANG Hai-bin, LIU Li-gang. Texture details preserving seamless image composition[J]. J4, 2013, 47(6): 951-956.
[10] CHEN Xiao-hong,WANG Wei-dong. A HDTV video de-noising algorithm based on spatial-temporal filtering[J]. J4, 2013, 47(5): 853-859.
[11] ZHU Fan , LI Yue, JIANG Kai, YE Shu-ming, ZHENG Xiao-xiang. Decoding of rat’s primary motor cortex by partial least square[J]. J4, 2013, 47(5): 901-905.
[12] WU Ning, CHEN Qiu-xiao, ZHOU Ling, WAN Li. Multi-level method of optimizing vector graphs converted from remote sensing images[J]. J4, 2013, 47(4): 581-587.
[13] JI Yu, SHEN Ji-zhong, SHI Jin-he. Automatic ocular artifact removal based on blind source separation[J]. J4, 2013, 47(3): 415-421.
[14] WANG Xiang, DING Yong. Full reference image quality assessment based on Gabor filter[J]. J4, 2013, 47(3): 422-430.
[15] TONG Shui-guang, WANG Xiang-bing, ZHONG Wei, ZHANG Jian. Dynamic optimization design for rigid landing leg of crane
based on BP-HGA
[J]. J4, 2013, 47(1): 122-130.