A Trajectory Privacy Preserving Method in Peer-to-Peer LBS System

Article Preview

Abstract:

The wide application of Location-Based Service (LBS) makes location privacy and trajectory privacy receive much attention in recent years. The basic idea of current privacy preserving methods in LBS is cutting the relationship of user’s consecutive locations. This paper propose LOCMIX, a trajectory privacy protecting method which is based on neighbor node’s forwarding query in a P2P LBS system. Choose the user who have sufficient power to forward queries to LBS as the forwarding node of user u. The forwarding node must be as close to user u as possible. Then the k-Anonymity Spatial Region (k-ASR) was constructed with the forwarding node and the k-1 users whose Hilbert value is less than (or more than) the forwarding node. The experiments show that LOCMIX has good load balancing property and protect trajectory privacy effectively against the “center-of-k-ASR” attack and the correlation attack.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

571-575

Citation:

Online since:

October 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sweeney L. K-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-based System, 2002, 10(5): 557-570.

DOI: 10.1142/s0218488502001648

Google Scholar

[2] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, 2003, 31-42.

DOI: 10.1145/1066116.1189037

Google Scholar

[3] Beresford A R, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003, 2(1): 46-55.

DOI: 10.1109/mprv.2003.1186725

Google Scholar

[4] Huang L, Matsuura K, Yamane H. Enhancing wireless location privacy using silent period. In: Proceedings of the IEEE Wireless Communications and Networking Conference, 2005, 1187-1192.

DOI: 10.1109/wcnc.2005.1424677

Google Scholar

[5] Huang L, Yamane L, Mastsuura K, Sezaki K. Silent Cascade: enhancing location privacy without communication QoS degradation. In: Proceedings of the Third International Conference on Security in Pervasive Computing, LNCS 3934, Springer Verlag, 2006, 165-180.

DOI: 10.1007/11734666_13

Google Scholar

[6] Mokbel M F, Chow C -Y, Aref W G. The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, 2006, 763-774.

DOI: 10.1145/1620585.1620591

Google Scholar

[7] Chow C Y, Mokbel M F, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the 14th annual ACM International Symposium on Advances in Geographic Information Systems, 2006, 171-178.

DOI: 10.1145/1183471.1183500

Google Scholar

[8] Gabriel G, Panos K, Spiros S. Prive: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th international conference on World Wide Web, 2007, 371-380.

DOI: 10.1145/1242572.1242623

Google Scholar

[9] Gabrial G, Panos K, Spiros S. MOBIHIDE: a mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of the 10th international symposium on Advances in Spatial and Temporal Databases, 2007, 221-238.

DOI: 10.1007/978-3-540-73540-3_13

Google Scholar

[10] Gabriel G, Panos K, Ali K, et al. Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, 2008, 121-132.

DOI: 10.1145/1376616.1376631

Google Scholar