Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2896387.2896445acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Aman: Spatial Cloaking for Privacy-Aware Location-Based Queries in the Cloud

Published: 22 March 2016 Publication History

Abstract

People nowadays rely heavily on technology and prefer being provided with personalized services. Location Based Services (LBS) are one of those highly popular services. Users provide their location information in some query to the LBS server, which in turn processes the query and returns personalized results. The major concern when dealing with these services is the privacy issue. Mainly, there are two privacy issues, the user's identity and the user's location. Not securing such information could result in some threats to the user. To preserve the user's privacy, researchers have proposed spatial cloaking to blur the user's location by a trusted location anonymizer server. Existing methods suffer from high communication cost due to the large number of communication rounds between the user's device and the cloud server to answer the query. In this paper, we propose an efficient k-anonymity algorithm, called Aman, to compute the cloaked area with minimal number of communication rounds between the user and the cloud server. Unlike existing methods in which the server starts the search from the root, or the leafs, of the indexing structure, Aman algorithm reduces the search time by starting the search at an intermediate estimated level of the indexing structure that is as close as possible to the queried location. To preserve the user's privacy, Aman uses k-anonymity cloaking to hide the user's location. The experimental results using synthetic and real datasets show that Aman outperforms other state-of-the-art approaches.

References

[1]
S. Wang, and S.S. Wang. "In-Device Spatial Cloaking for Mobile Users Privacy Assisted by the Cloud", In Proc. Of the 11th International Conference on Mobile Data Management, pp. 381--386, 2010.
[2]
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. "The new casper: query processing for location services without compromising privacy". In Proc. of the 32nd International Conference on Very Large Data Bases, pages 763--774. VLDB Endowment, 2006.
[3]
K. Shin, X. Ju, Z. Chen, and X. Hu, "Privacy protection for users of location-based services," Wireless Communications, IEEE, vol. 19, no. 1, pp. 30--39, 2012.
[4]
H. Lee, B.-S. Oh, H.-i. Kim, and J. Chang, "Grid-based cloaking area creation scheme supporting continuous location-based services," in Proc. of ACM SAC 2012.
[5]
X. Zhu, H. Chi, B. Niu, W. Zhang, Z. Li, and H. Li, "Mobicache: When k-anonymity meets cache," in Proc. of IEEE GLOBECOM 2013.
[6]
B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, "Achieving k-anonymity in privacy-aware location-based services," in Proc. of IEEE INFOCOM 2014.
[7]
B. Gedik and L. Liu, "Protecting location privacy with personalized kanonymity: Architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1--18, Jan. 2008.
[8]
G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Mobihide: A mobilea peerto-peer system for anonymous location-based queries," in Proc. of ACM SSTD 2007.
[9]
H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in Proc. of IEEE ICPS, pp. 88--97, 2005.
[10]
I. Bilogrevic, M. Jadliwala, K. Kalkan, J.-P. Hubaux, and I. Aad, "Privacy in mobile computing for location-sharing-based services," in Proc. of ACM PETS 2011.
[11]
Q. Li and G. Cao, "Providing efficient privacy-aware incentives for mobile sensing," in Proc. of IEEE ICDCS 2014.
[12]
B. Niu, Q. Li, X. Zhu, and H. Li, "A Fine-Grained Spatial Cloaking Scheme for Privacy-Aware Users in Location-Based Services," in Proc. of 24th ICCCN, 2014.
[13]
http://everywarelab.di.unimi.it/lbs-datasim
[14]
B. Veal, K. Li, D. lowenthal, "New methods for passive estimation of TCP round-trip times", Proceedings of the 6th international conference on Passive and Active Network Measurement, 2005.

Cited By

View all
  • (2020)Using location semantics to realize personalized road network location privacy protectionEURASIP Journal on Wireless Communications and Networking10.1186/s13638-019-1618-72020:1Online publication date: 14-Jan-2020
  • (2019)Query optimization mechanisms in the cloud environments: A systematic studyInternational Journal of Communication Systems10.1002/dac.394032:8Online publication date: 12-Mar-2019
  • (2018)Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing ServicesIEEE Transactions on Vehicular Technology10.1109/TVT.2018.286886967:11(11084-11097)Online publication date: Nov-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICC '16: Proceedings of the International Conference on Internet of things and Cloud Computing
March 2016
535 pages
ISBN:9781450340632
DOI:10.1145/2896387
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Location based service
  2. cloud computing
  3. k-anonymity based querying
  4. privacy-aware query processing
  5. quad-tree based cloaking

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICC '16

Acceptance Rates

Overall Acceptance Rate 213 of 590 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Using location semantics to realize personalized road network location privacy protectionEURASIP Journal on Wireless Communications and Networking10.1186/s13638-019-1618-72020:1Online publication date: 14-Jan-2020
  • (2019)Query optimization mechanisms in the cloud environments: A systematic studyInternational Journal of Communication Systems10.1002/dac.394032:8Online publication date: 12-Mar-2019
  • (2018)Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing ServicesIEEE Transactions on Vehicular Technology10.1109/TVT.2018.286886967:11(11084-11097)Online publication date: Nov-2018
  • (2017)A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacksPLOS ONE10.1371/journal.pone.018223212:8(e0182232)Online publication date: 2-Aug-2017
  • (2017)An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information ConstraintsSecurity and Communication Networks10.1155/2017/74959742017Online publication date: 1-Jan-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media