Privacy Preserving Moving KNN Queries

نویسندگان

  • Tanzima Hashem
  • Lars Kulik
  • Rui Zhang
چکیده

We present a novel approach that protects trajectory privacy of users who access locationbased services through a moving k nearest neighbor (MkNN) query. An MkNN query continuously returns the k nearest data objects for a moving user (query point). Simply updating a user’s imprecise location such as a region instead of the exact position to a locationbased service provider (LSP) cannot ensure privacy of the user for an MkNN query: continuous disclosure of regions enables the LSP to follow a user’s trajectory. We identify the problem of trajectory privacy that arises from the overlap of consecutive regions while requesting an MkNN query and provide the first solution to this problem. Our approach allows a user to specify the confidence level that represents a bound of how much more the user may need to travel than the actual kth nearest data object. By hiding a user’s required confidence level and the required number of nearest data objects from an LSP, we develop a technique to prevent the LSP from tracking the user’s trajectory for MkNN queries. We propose an efficient algorithm for the LSP to find k nearest data objects for a region with a user’s specified confidence level, which is an essential component to evaluate an MkNN query in a privacy preserving manner; this algorithm is at least two times faster than the state-of-the-art algorithm. Extensive experimental studies validate the effectiveness of our trajectory privacy protection technique and the efficiency of our algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location Based Authentication of KNN Queries with Location and Query Privacy

In mobile communication, spatial queries pose a serious threat to user location privacy because the location of a query may reveal sensitive information about the mobile user. In this paper, study approximate k nearest neighbor (kNN) queries where the mobile user queries the location-based service (LBS) provider about approximate k nearest points of interest (POIs) on the basis of his current l...

متن کامل

Mining Multiple Private Databases using a Privacy Preserving kNN Classifier

Data mining technologies are popular for identifying interesting patterns and trends in large amounts of data. With the advent of high speed networks and easily available storage, many organizations are able to collect large amounts of data. On one hand, these organizations would like to mine their data to understand and discover interesting patterns; on the other hand, many legal and commercia...

متن کامل

Mining Multiple Private Databases using a Privacy Preserving kNN Classifier

Data mining technologies are popular for identifying interesting patterns and trends in large amounts of data. With the advent of high speed networks and easily available storage, many organizations are able to collect large amounts of data. On one hand, these organizations would like to mine their data to understand and discover interesting patterns; on the other hand, many legal and commercia...

متن کامل

Constructing an Effective and Secure Query Services with Rsap Data Perturbation in the Cloud

Now a day’s cloud is more popular because in cloud users host the data and upload a large contained data. It has large databases to database service providers so database service providers maintain the services of range query services. In clouding process some users have a sensitive private data in that situation user’s can’t move the data for hosting until we provide security, confidentiality,...

متن کامل

Confidential and Efficient Query Services in the Cloud Using K-NN with R-Tree and Rasp Data Perturbation

With the development of services computing and cloud computing, it has become possible to outsource large databases to database service providers and let the providers maintain the rangequery service. However, some data might be sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. We propose the Random Space Encryptio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1104.2756  شماره 

صفحات  -

تاریخ انتشار 2011