Protecting Location Privacy against Location-Dependent Attacks in Mobile Services

被引:147
作者
Pan, Xiao [1 ,2 ]
Xu, Jianliang [3 ]
Meng, Xiaofeng [1 ]
机构
[1] Renmin Univ China, Sch Informat, Beijing, Peoples R China
[2] Shijiazhuang Tiedao Univ, Sch Econ & Management, Shijiazhuang, Peoples R China
[3] Hong Kong Baptist Univ, Dept Comp Sci, Kln, Hong Kong, Peoples R China
关键词
Location privacy; mobile data management; location-based services; ANONYMITY;
D O I
10.1109/TKDE.2011.105
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy protection has recently received considerable attention in location-based services. A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. In this paper, we consider the scenario where different location-based query requests are continuously issued by mobile users while they are moving. We show that most of the existing k-anonymity location cloaking algorithms are concerned with snapshot user locations only and cannot effectively prevent location-dependent attacks when users' locations are continuously updated. Therefore, adopting both the location k-anonymity and cloaking granularity as privacy metrics, we propose a new incremental clique-based cloaking algorithm, called ICliqueCloak, to defend against location-dependent attacks. The main idea is to incrementally maintain maximal cliques needed for location cloaking in an undirected graph that takes into consideration the effect of continuous location updates. Thus, a qualified clique can be quickly identified and used to generate the cloaked region when a new request arrives. The efficiency and effectiveness of the proposed ICliqueCloak algorithm are validated by a series of carefully designed experiments. The experimental results also show that the price paid for defending against location-dependent attacks is small.
引用
收藏
页码:1506 / 1519
页数:14
相关论文
共 39 条
[11]  
Bharath K., 2008, P 20 INT C SCI STAT
[12]  
CHENG R, 2006, P PRIV ENH TECHN WOR
[13]  
Chow C-Y, 2007, P 10 INT C ADV SPAT
[14]  
Du J., 2007, P C MOB DAT MAN MDM
[15]  
European Parliament and Council, 2002, OFFICIAL J EUROPEAN, P37
[16]   Location privacy in mobile systems: A personalized anonymization model [J].
Gedik, B ;
Liu, L .
25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, :620-629
[17]  
GHINITA G, 2009, P 17 ACM SIGSPATIAL
[18]  
Gidofalvi G., 2007, P INT C MOB DAT MAN
[19]  
Gkoulalas-Divanis A., 2009, P SIAM INT C DAT MIN
[20]  
Gkoulalas-Divanis A., 2008, SIGKDD Explorations, V10, P40