The Community for Technology Leaders
RSS Icon
Issue No.10 - October (2010 vol.21)
pp: 1458-1472
Haibo Hu , Hong Kong Baptist University, Hong Kong
Jianliang Xu , Hong Kong Baptist University, Hong Kong
Protection of users' location privacy is a critical issue for location-based services. Location cloaking has been proposed to blur users' accurate locations with cloaked regions. Although various cloaking algorithms have been studied, none of the prior work has explored the impact of cloaking on the bandwidth usage of requested services. In this paper, we develop an innovative result-aware location cloaking approach, called 2PASS. Based on the notion of Voronoi cells, 2PASS minimizes the number of objects to request, and hence, the bandwidth while meeting the same privacy requirement. The core component of 2PASS is a lightweight WAG-tree index, based on which efficient and secure client and server procedures are designed. Through threat analysis and experimental results, we argue that 2PASS is robust and outperforms state-of-the-art approaches in terms of various metrics, such as query response time and bandwidth consumption. We also enclose a case study of 2PASS in a real-life application.
Mobile applications, distributed applications, security, integrity, protection.
Haibo Hu, Jianliang Xu, "2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services", IEEE Transactions on Parallel & Distributed Systems, vol.21, no. 10, pp. 1458-1472, October 2010, doi:10.1109/TPDS.2010.26
[1] S. Arora and G. Karakostas, "A $2+\epsilon$ Approximation Algorithm for the k-mst Problem," Proc. 11th Symp. Discrete Algorithms (SODA), 2000.
[2] N. Balasubramanian, A. Balasubramanian, and A. Venkataramani, "Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications," Proc. Ninth ACM/USENIX Conf. Internet Measurement, pp. 280-293, 2009.
[3] B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with Privacygrid," Proc. 17th Int'l World Wide Web Conf. (WWW '08), 2008.
[4] A. Beresford and F. Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan. 2003.
[5] M. Berg, M. Kreveld, and M. Overmars, Computational Geometry: Algorithms and Applications. Springer-Verlag, 1997.
[6] A. Blum, R. Ravi, and S. Vempala, "A Constant-Factor Approximation for the K-mst Problem," Proc. 28th Ann. ACM Symp. Theory of Computing (STOC), 1996.
[7] C. Bohm, "A Cost Model for Query Processing in High Dimensional Data Spaces," ACM Trans. Database Systems, vol. 25, no. 2, pp. 129-178, 2000.
[8] Y. Cai and T. Xu, "Design, Analysis, and Implementation of a Large-Scale Real-Time Location-Based Information Sharing System," Proc. ACM Mobisys, 2008.
[9] C.-Y. Chow, M.F. Mokbel, and X. Liu, "A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-Based Services," Proc. ACM Int'l Symp. Advances in Geographic Information Systems (GIS), pp. 171-178, 2006.
[10] J. Du, J. Xu, X. Tang, and H. Hu, "iPDA: Supporting Privacy-Preserving Location-Based Mobile Services," Proc. Eighth Int'l Conf. Mobile Data Management (MDM) (demo), 2007.
[11] N. Garg, "A 3-Approximation for the Minimum-Tree Spanning K Vertices," Proc. 37th Ann. Symp. Foundations of Computer Science (FOCS), 1996.
[12] B. Gedik and L. Liu, "Location Privacy in Mobile Systems: A Personalized Anonymization Model," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), pp. 620-629, 2005.
[13] B. Gedik and L. Liu, "Protecting Location Privacy with Personalized K-Anonymity: Architecture and Algorithms," IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.
[14] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. ACM SIGMOD, 2008.
[15] M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," Proc. ACM MobiSys, pp. 31-42, 2003.
[16] H. Hu and D. Lee, "Range Nearest Neighbor Query," IEEE Trans. Knowledge and Data Eng., vol. 18, no. 1, pp. 78-91, Jan. 2006.
[17] H. Hu, J. Xu, and D.L. Lee, "PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects," IEEE Trans. Knowledge and Data Eng., vol. 22, no. 3, pp. 404-419, Mar. 2010.
[18] Intel "Data Sheet of Intel Pxa270 Processor," http://www.phytec. com/pdf/datasheetsPXA270_DS.pdf , 2005.
[19] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Trans. Knowledge and Data Eng., vol. 19, no. 12, pp. 1719-1733, Dec. 2007.
[20] H. Kido, Y. Yanagisawa, and T. Satoh, "An Anonymous Communication Technique Using Dummies for Location-Based Services," Proc. Second Int'l Conf. Pervasive Services (ICPS), pp. 88-97, 2005.
[21] L. Liu, "Protecting Location Privacy in Mobile Computing Systems: Architecture and Algorithms (Tutorial)," Proc. ACM Mobicom '07, 2007.
[22] S. Mascetti, C. Bettini, D. Freni, X.S. Wang, and S. Jajodia, "Privacy-Aware Proximity Based Services," Proc. 10th Int'l Conf. Mobile Data Management (MDM), 2009.
[23] M.F. Mokbel, C.-Y. Chow, and W.G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 763-774, 2006.
[24] G. Myles, A. Friday, and N. Davies, "Preserving Privacy in Environments with Location-Based Applications," Pervasive Computing, vol. 2, no. 1, pp. 56-64, 2003.
[25] H. Pagey, K. Hua, and C.-S. Lin, "Caching as Privacy Enhancing Mechanism in Location Based Services," Proc. 10th Int'l Conf. Mobile Data Management (MDM), 2009.
[26] L. Pareschi, D. Riboni, and C. Bettini, "Protecting Users' Anonymity in Pervasive Computing Environments," Proc. Sixth IEEE Int'l Conf. Pervasive Computing and Comm., 2008.
[27] N. Poolsappasit and I. Ray, "Towards a Scalable Model for Location Privacy," Proc. SIGSPATIAL ACM GIS '08 Int'l Workshop Security and Privacy in GIS and LBS, 2008.
[28] R. Ravi, R. Sundaram, M.V. Marathe, D.J. Rosenkrantz, and S.S. Ravi, "Spanning Trees Short or Small," Proc. ACM-SIAM Symp. Discrete Algorithms (SODA), 1994.
[29] C. Xia, W. Hsu, and M.L. Lee, "Erknn: Efficient Reverse K-Nearest Neighbors Retrieval with Local knn-Distance Estimation," Proc. Conf. Information and Knowledge Management (CIKM), 2005.
[30] J. Xu, X. Tang, H. Hu, and J. Du, "Privacy-Conscious Location-Based Queries in Mobile Environments," IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 3, pp. 313-326, Mar. 2010.
[31] T. Xu and Y. Cai, "Exploring Historical Location Data for Anonymity Preservation in Location-Based Services," Proc. IEEE Infocom, 2008.
[32] T. Xu and Y. Cai, "Location Cloaking for Safety Protection of Ad Hoc Networks," Proc. IEEE Infocom, 2009.
[33] T. You, W. Peng, and W. Lee, "Protect Moving Trajectories with Dummies," Proc. Int'l Workshop Privacy-Aware Location-Based Mobile Services, 2007.
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool