A fast privacy-preserving framework for continuous location-based queries in road networks

نویسندگان

  • Yong Wang
  • Yun Xia
  • Jie Hou
  • Shi-meng Gao
  • Xiao Nie
  • Qi Wang
چکیده

The prevalence of location based services (LBS) gives rise to personal privacy concerns as users share their locations and queries to obtain desired services. For continuous queries where users report their locations periodically, attackers can infer more about users' privacy by analyzing the correlations of their snapshot samples. Traditional privacy-preserving solutions designed in Euclidean space can be hardly applied to the road network environment because of their ignorance of network topological properties. In this paper, we propose a novel continuous query privacy-preserving framework in road networks. Our framework is based on the concepts of k-anonymity and l-diversity. To achieve the quality of service, the distance limitation is taken into account. We build an Snet hierarchy based on the density of users, history traces, and road network topologies to accelerate the cloaking process performed at the anonymization server. Two types of cloaking algorithms, for a single user and a batch of users, are designed. The security analysis shows that our framework is robust to typical attacks. We evaluate our framework from the aspects of privacy-preserving ability, quality of service, and system performance, which indicates that our framework can provide good privacy protection while ensuring users' quality of

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

Offline Approaches for Preserving Privacy of Trajectories on the Road Networks

The new communication and knowledge transactions systems are opening endeavours with a fast pace. As a consequence the flow of information rather than its database is unboundedly increasing. The Location Based Services(LBS), Radio Frequency Identification devices (RFIDs) are few of the mainstream systems for this flow these days. But they also get limited due to some hindering factors at the us...

متن کامل

Privacy-preserving nearest neighbor queries using geographical features of cellular networks

Although location-based services (LBSes), such as nearest neighbor query, have become popular, privacy remains a challenging issue for users. Many privacy preserving techniques have been proposed, but their complexity, insufficiency, and time consumption make them unattractive to users, who prefer accuracy and quickness. To address this limitation, we introduce a framework to protect user priva...

متن کامل

Evaluating k Nearest Neighbor Query on Road Networks with no Information Leakage

The development of positioning technologies and pervasiveness of mobile devices make an upsurge of interest in location based services (LBS). The k nearest neighbor(kNN) query in road networks is an important query type in LBS and has many real life applications, such as map service. However, such query requires the client to disclose sensitive location information to the LBS. The only existing...

متن کامل

Shortest Path Computation with No Information Leakage

Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing metho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 53  شماره 

صفحات  -

تاریخ انتشار 2015