The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2010 vol.21)
pp: 313-326
Jianliang Xu , Hong Kong Baptist University, Hong Kong
Haibo Hu , Hong Kong Baptist University, Hong Kong
Jing Du , Hong Kong Baptist University, Hong Kong
ABSTRACT
In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing paradigm brings great convenience for information access, it also raises concerns over potential intrusion into user location privacy. To protect location privacy, one typical approach is to cloak user locations into spatial regions based on user-specified privacy requirements, and to transform location-based queries into region-based queries. In this paper, we identify and address three new issues concerning this location cloaking approach. First, we study the representation of cloaking regions and show that a circular region generally leads to a small result size for region-based queries. Second, we develop a mobility-aware location cloaking technique to resist trace analysis attacks. Two cloaking algorithms, namely MaxAccu_Cloak and MinComm_Cloak, are designed based on different performance objectives. Finally, we develop an efficient polynomial algorithm for evaluating circular-region-based kNN queries. Two query processing modes, namely bulk and progressive, are presented to return query results either all at once or in an incremental manner. Experimental results show that our proposed mobility-aware cloaking algorithms significantly improve the quality of location cloaking in terms of an entropy measure without compromising much on query latency or communication cost. Moreover, the progressive query processing mode achieves a shorter response time than the bulk mode by parallelizing the query evaluation and result transmission.
INDEX TERMS
Location-based services, location privacy, query processing, mobile computing.
CITATION
Jianliang Xu, Haibo Hu, Jing Du, "Privacy-Conscious Location-Based Queries in Mobile Environments", IEEE Transactions on Parallel & Distributed Systems, vol.21, no. 3, pp. 313-326, March 2010, doi:10.1109/TPDS.2009.65
REFERENCES
[1] B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with Privacygrid," Proc. Int'l World Wide Web Conf. (WWW), 2008.
[2] C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia, "Anonymity in Location-Based Services: Towards a General Framework," Proc. Eighth Int'l Conf. Mobile Data Management (MDM), May 2007.
[3] S. Berchtold, C. Böhm, D.A. Keim, F. Krebs, and H.-P. Kriegel, "On Optimizing Nearest Neighbor Queries in High-Dimensional Data Spaces," Proc. Int'l Conf. Database Theory (ICDT), 2001.
[4] A.R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
[5] R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, "Preserving User Location Privacy in Mobile Data Management Infrastructures," Proc. Privacy Enhancing Technology Workshop, June 2006.
[6] C.-Y. Chow, M.F. Mokbel, and X. Liu, "A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-Based Services," Proc. ACM Int'l Symp. Advances in Geographic Information Systems (GIS), 2006.
[7] J. Du, J. Xu, X. Tang, and H. Hu, "iPDA: Supporting Privacy-Preserving Location-Based Mobile Services (Demonstration)," Proc. Eighth Int'l Conf. Mobile Data Management (MDM), May 2007.
[8] G. Myles, A. Friday, and N. Davies, "Preserving Privacy in Environments with Location-Based Applications," IEEE Pervasive Computing, vol. 2, no. 1, pp. 56-64, Jan.-Mar. 2003.
[9] G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Prive: Anonymous Location-Based Queries in Distributed Mobile Systems," Proc. Int'l World Wide Web Conf. (WWW '07), pp. 371-380, 2007.
[10] M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," Proc. ACM MobiSys, 2003.
[11] B. Gedik and L. Liu, "A Customizable k-Anonymity Model for Protecting Location Privacy," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2005.
[12] B. Gedik and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms," IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.
[13] A. Guttman, "R-Trees: A Dynamic Index Structure for Spatial Searching," Proc. ACM SIGMOD, 1984.
[14] G.R. Hjaltason and H. Samet, "Distance Browsing in Spatial Databases," ACM Trans. Database Systems, vol. 24, no. 2, pp. 265-318, 1999.
[15] H. Hu and D. Lee, "Range Nearest Neighbor Queries," IEEE Trans. Knowledge and Data Eng., vol. 18, no. 1, pp. 78-91, Jan. 2006.
[16] H. Hu and J. Xu, "Non-Exposure Location Anonymity," Proc. IEEE Int'l Conf. Data Eng. (ICDE), 2009.
[17] B.D. Hughes, Random Walks and Random Environments. Oxford Univ. Press, 1996.
[18] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preserving Anonymity in Location Based Services," technical report, School of Computing, The Nat'l Univ. of Singapore, 2006.
[19] H. Kido, Y. Yanagisawa, and T. Satoh, "An Anonymous Communication Technique Using Dummies for Location-Based Services," Proc. Int'l Conf. Pervasive Services (ICPS), 2005.
[20] M.F. Mokbel, C.-Y. Chow, and W.G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy," Proc. Int'l Conf. Very Large Data Bases (VLDB), 2006.
[21] X. Pan, J. Xu, and X. Meng, "Protecting Location Privacy against Location-Dependent Attack in Mobile Services," Proc. ACM Conf. Information and Knowledge Management (CIKM), 2008.
[22] D. Reid, "An Algorithm for Tracking Multiple Targets," IEEE Trans. Automatic Control, vol. 24, no. 6, pp. 843-854, Dec. 1979.
[23] N. Roussopoulos, S. Kelley, and F. Vincent, "Nearest Neighbor Queries," Proc. ACM SIGMOD, 1995.
[24] The R-Tree Portal, http:/www.rtreeportal.org/, 2009.
[25] B. Schilit, J. Hong, and M. Gruteser, "Wireless Location Privacy Protection," Computer, vol. 36, no. 12, pp. 135-137, Dec. 2003.
[26] T. Xu and Y. Cai, "Exploring Historical Location Data for Anonymity Preservation in Location-Based Services," Proc. IEEE INFOCOM, 2008.
[27] M. Youssef, V. Atluri, and N.R. Adam, "Preserving Mobile Customer Privacy: An Access Control System for Moving Objects and Custom Profiles," Proc. Sixth Int'l Conf. Mobile Data Management (MDM), 2005.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool