Collaborative trajectory privacy preserving scheme in location-based services

被引:134
作者
Peng, Tao [1 ]
Liu, Qin [2 ]
Meng, Dacheng [1 ]
Wang, Guojun [1 ,3 ]
机构
[1] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Hunan Univ, Sch Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
K-anonymity; Location-based service (LBS); Location privacy; Trajectory privacy preserving; Continuous query; ENCRYPTION SCHEME; FRAMEWORK;
D O I
10.1016/j.ins.2016.08.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services (LBSs) have been gaining considerable popularity and are becoming the fastest growing activity-related services that people use in their daily life. While users benefit from LBSs, the collection and analysis of participators' location data and trajectory information may jeopardize their privacy. Existing proposals focus mostly on snapshot queries. However, privacy preservation in continuous LBSs is more challenging than in snapshot queries because adversaries could use the spatial and temporal correlations on the user trajectory to infer the user's private information. In this paper, we propose the collaborative trajectory privacy preserving (CTPP) scheme for continuous queries, in which trajectory privacy is guaranteed by caching-aware collaboration between users, without the need for any fully trusted entities. The main idea of our scheme is to obfuscate the actual trajectory of a user by issuing fake queries to confuse the LBS adversary. We first present a multi-hop caching-aware cloaking algorithm to collect valuable information from multi hop peers based on collaborative caching. Then, we describe a collaborative privacy preserving querying algorithm that issues a fake query to confuse the location service provider (LSP). Extensive experimental results verify the effectiveness and efficiency of our scheme in terms of processing time and communication cost. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:165 / 179
页数:15
相关论文
共 32 条
[1]  
[Anonymous], P INT C COMP COMM IN
[2]  
[Anonymous], P INT C COMP COMM IN
[3]  
[Anonymous], WIRELESS COMMUN IEEE
[4]  
[Anonymous], GEOINFORMATICA, DOI DOI 10.1007/s10707-009-0099-y
[5]   An Obfuscation-Based Approach for Protecting Location Privacy [J].
Ardagna, Claudio A. ;
Cremonini, Marco ;
di Vimercati, Sabrina De Capitani ;
Samarati, Pierangela .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :13-27
[6]   A framework for generating network-based moving objects [J].
Brinkhoff, T .
GEOINFORMATICA, 2002, 6 (02) :153-180
[7]   Analysis-preserving protection of user privacy against information leakage of social-network Likes [J].
Buccafurri, Francesco ;
Fotia, Lidia ;
Lax, Gianluca ;
Saraswat, Vishal .
INFORMATION SCIENCES, 2016, 328 :340-358
[8]   Privacy-preserving trajectory data publishing by local suppression [J].
Chen, Rui ;
Fung, Benjamin C. M. ;
Mohammed, Noman ;
Desai, Bipin C. ;
Wang, Ke .
INFORMATION SCIENCES, 2013, 231 :83-97
[9]  
Chow CY, 2007, LECT NOTES COMPUT SC, V4605, P258
[10]  
Chow Chi-Yin., 2006, P 14 ANN ACM INT S A, P171, DOI DOI 10.1145/1183471.1183500