ABSTRACT
As the use of mobile devices increases, a location-based service (LBS) becomes increasingly popular because it provides more convenient context-aware services. However, LBS introduces problematic issues for location privacy due to the nature of the service. Location privacy protection methods based on k-anonymity and l-diversity have been proposed to provide anonymized use of LBS. However, the k-anonymity and l-diversity methods still can endanger the user's privacy because location semantic information could easily be breached while using LBS. This paper presents a novel location privacy protection technique, which protects the location semantics from an adversary. In our scheme, location semantics are first learned from location data. Then, the trusted-anonymization server performs the anonymization using the location semantic information by cloaking with semantically heterogeneous locations. Thus, the location semantic information is kept secure as the cloaking is done with semantically heterogeneous locations and the true location information is not delivered to the LBS applications. This paper proposes algorithms for learning location semantics and achieving semantically secure cloaking.
- B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with privacygrid. In Proceeding of the 17th International Conference on World Wide Web (WWW), 2008. Google ScholarDigital Library
- T. Brinkhoff. A framework for generating network-based moving objects. GeoInformatica, 6(2):153--180, 2002. Google ScholarDigital Library
- R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar. Preserving user location privacy in mobile data management infrastructures. In Privacy Enhancing Technologies (PET), 2006. Google ScholarDigital Library
- C.-Y. Chow, M. F. Mokbel, and X. Liu. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of the ACM International Symposium on Advances in Geographic Information Systems (GIS), 2006. Google ScholarDigital Library
- M. Damiani, E. Bertino, and C. Silvestri. The PROBE Framework for the Personalized Cloaking of Private Locations. Transactions on Data Privacy, 3(2):123--148, 2010. Google ScholarDigital Library
- B. Gedik. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In IEEE International Conference on Distributed Computing Systems (ICDCS), 2005. Google ScholarDigital Library
- G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008. Google ScholarDigital Library
- G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: anonymous location-based queries in distributed mobile systems. In Proceedings of the International Conference on World Wide Web (WWW), 2007. Google ScholarDigital Library
- M. C. González, C. a. Hidalgo, and A.-L. Barabási. Understanding individual human mobility patterns. Nature, 453(7196):779--82, June 2008.Google ScholarCross Ref
- M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the International Conference on Mobile Systems, Applications and Services (MobiSys), 2003. Google ScholarDigital Library
- M. M. Haklay and P. Weber. Streetmap: User-generated street maps. IEEE Pervasive Computing, 7:12--18, 2008. Google ScholarDigital Library
- J. Han and M. Kamber. Data mining: concepts and techniques. Morgan Kaufmann, 2006. Google ScholarDigital Library
- H. Hu and J. Xu. Non-Exposure Location Anonymity. In IEEE International Conference on Data Engineering (ICDE), 2009. Google ScholarDigital Library
- P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Transactions on Knowledge and Data Engineering (TKDE), 19(12):1719--1733, 2007. Google ScholarDigital Library
- N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In IEEE International Conference on Data Engineering (ICDE), 2007.Google ScholarCross Ref
- Q. Li, Y. Zheng, X. Xie, Y. Chen, W. Liu, and W.-Y. Ma. Mining user similarity based on location history. In Proceedings of the ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS), 2008. Google ScholarDigital Library
- H. Ling and K. Okada. An efficient Earth Mover's Distance algorithm for robust histogram comparison. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 29(5):840--853, 2007. Google ScholarDigital Library
- F. Liu, K. a. Hua, and Y. Cai. Query l-diversity in Location-Based Services. In International Conference on Mobile Data Management: Systems, Services and Middleware (MDM), 2009. Google ScholarDigital Library
- A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. l-diversity: Privacy Beyond k-Anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):1--52, 2007. Google ScholarDigital Library
- M. Mokbel, C. Chow, and W. Aref. The New Casper: Query Processing for Location Services without compromising privacy. In Proceedings of the International Conference on Very large data bases (VLDB), 2006. Google ScholarDigital Library
- O. Pele and M. Werman. Fast and robust earth mover's distances. In IEEE International Conference on Computer Vision (ICCV), 2009.Google ScholarCross Ref
- Y. Rubner, C. Tomasi, and L. Guibas. The earth mover's distance as a metric for image retrieval. International Journal of Computer Vision (IJCV), 40(2):99--121, 2000. Google ScholarDigital Library
- L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems, 10(5):557--570, 2002. Google ScholarDigital Library
- T. Wang and L. Liu. Privacy-aware mobile services over road networks. Proceedings of the VLDB Endowment, 2(1):1042--1053, 2009. Google ScholarDigital Library
- Z. Xiao, J. Xu, and X. Meng. p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services. In International Conference on Mobile Data Management Workshops (MDMW), 2008. Google ScholarDigital Library
- T. Xu and Y. Cai. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services. In IEEE International Conference on Computer Communications (INFOCOM), 2008.Google Scholar
- T. Xu and Y. Cai. Feeling-based location privacy protection for location-based services. Proceedings of the ACM conference on Computer and communications security (CCS), 2009. Google ScholarDigital Library
- M. Xue, P. Kalnis, and H. Pung. Location Diversity: Enhanced Privacy Protection in Location Based Services. Location and Context Awareness (LoCA), pages 70--87, 2009. Google ScholarDigital Library
- M. Yiu, C. Jensen, X. Huang, and H. Lu. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In IEEE International Conference on Data Engineering (ICDE), 2008. Google ScholarDigital Library
- V. W. Zheng, Y. Zheng, X. Xie, and Q. Yang. Collaborative location and activity recommendations with GPS history data. In Proceedings of the International Conference on World Wide Web (WWW), 2010. Google ScholarDigital Library
- Y. Zheng, L. Zhang, X. Xie, and W.-Y. Ma. Mining interesting locations and travel sequences from GPS trajectories. In Proceedings of the International Conference on World Wide Web (WWW), 2009. Google ScholarDigital Library
Index Terms
- Protecting location privacy using location semantics
Recommendations
Feeling-based location privacy protection for location-based services
CCS '09: Proceedings of the 16th ACM conference on Computer and communications securityAnonymous location information may be correlated with restricted spaces such as home and office for subject re-identification. This makes it a great challenge to provide location privacy protection for users of location-based services. Existing work ...
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An ...
Using location semantics to realize personalized road network location privacy protection
AbstractWith the rapid development of location-based services in the field of mobile network applications, users enjoy the convenience of location-based services on one side, and they are exposed to the risk of privacy disclosure on the other side. ...
Comments