Table of Contents Author Guidelines Submit a Manuscript
Discrete Dynamics in Nature and Society
Volume 2017, Article ID 6814832, 11 pages
https://doi.org/10.1155/2017/6814832
Research Article

Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service

1College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
2Heilongjiang Province Electronic Information Products Supervision Inspection Institute, Harbin 150090, China

Correspondence should be addressed to Jiaxing Qu; nc.vog.ctsn@xjq

Received 14 December 2016; Revised 26 February 2017; Accepted 16 March 2017; Published 8 May 2017

Academic Editor: Filippo Cacace

Copyright © 2017 Jiaxing Qu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. N. Khan, M. L. Mat Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: a survey,” Future Generation Computer Systems, vol. 29, no. 5, pp. 1278–1299, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: a survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Sweeney, “k-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at Scopus
  4. I.-T. Lien, Y.-H. Lin, J.-R. Shieh, and J.-L. Wu, “A novel privacy preserving location-based service protocol with secret circular shift for k-NN search,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 863–873, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. B. Niu, Q. Li, X. Zhu et al., “Achieving k-anonymity in privacy-aware location-based services,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '14), Toronto, Canada, April-May 2014.
  6. W. Yao, P. Ye, and X. Li, “An effective privacy-preserving algorithm based on logistic map and rubik's cube transformation,” Discrete Dynamics in Nature and Society, vol. 2014, Article ID 178585, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, “Enhancing privacy through caching in location-based services,” in Proceedings of the 34th IEEE Annual Conference on Computer Communications (IEEE INFOCOM '15), pp. 1017–1025, IEEE, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719–1733, 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference Mobile Systems, Applications, and Services (MobiSys ’03), pp. 31–42, San Francisco, Calif, USA, May 2003. View at Publisher · View at Google Scholar
  10. S. R. Eddy, “Hidden Markov models,” Current Opinion in Structural Biology, vol. 6, no. 3, pp. 361–365, 1996. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Korczyński and A. Duda, “Markov chain fingerprinting to classify encrypted traffic,” in Proceedings of the 33rd IEEE Conference on Computer Communications (IEEE INFOCOM '14), pp. 781–789, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. H. Zhang, Z. Zhou, L. Ye, and X. Du, “Towards privacy preserving publishing of set-valued data on hybrid cloud,” IEEE Transactions on Cloud Computing, 2015. View at Publisher · View at Google Scholar
  13. Z. Zhou, H. Zhang, X. Du, P. Li, and X. Yu, “Prometheus: privacy-aware data retrieval on hybrid cloud,” in Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE INFOCOM '13), pp. 2643–2651, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf, Computational Geometry: Algorithms and Applications, Springer, 2nd edition, 2000.
  15. H. Gao, J. Tang, and H. Liu, “Exploring social-historical ties on location-based social networks,” in Proceedings of the 6th International AAAI Conference on Weblogs and Social Media (ICWSM '12), pp. 114–121, Dublin, Ireland, June 2012. View at Scopus
  16. H. Zhang, Z. Xu, Z. Zhou, J. Shi, and X. Du, “CLPP: context-aware location privacy protection for location-based social network,” in Proceedings of the IEEE International Conference on Communications (ICC '15), pp. 1164–1169, IEEE, London, UK, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. A. Y. Xue, R. Zhang, Y. Zheng, X. Xie, J. Huang, and Z. Xu, “Destination prediction by sub-trajectory synthesis and privacy protection against such prediction,” in Proceedings of the 29th International Conference on Data Engineering (ICDE '13), pp. 254–265, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Lin, L. Xu, Y. Mu, and W. Wu, “A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing,” Future Generation Computer Systems, vol. 52, article no. 2655, pp. 125–136, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. I. Bilogrevic, M. Jadliwala, P. Kumar et al., “Meetings through the cloud: privacy-preserving scheduling on mobile devices,” Journal of Systems and Software, vol. 84, no. 11, pp. 1910–1927, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. D. Biswas and K. Vidyasankar, “Privacy preserving and transactional advertising for mobile services,” Computing, vol. 96, no. 7, pp. 613–630, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Chen, G. Wang, and W. Jia, “A trust model using implicit call behavioral graph for mobile cloud computing,” in Cyberspace Safety and Security, pp. 387–402, Springer, 2013. View at Google Scholar
  22. R. Cáceres, L. Cox, H. Lim, A. Shakimov, and A. Varshavsky, “Virtual individual servers as privacy-preserving proxies for mobile devices,” in Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds, pp. 37–42, IEEE, Barcelona, Spain, August 2009. View at Publisher · View at Google Scholar
  23. R. Paulet, M. G. Kaosar, X. Yi, and E. Bertino, “Privacy-preserving and content-protecting location based queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1200–1210, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. H. Lin, J. Shao, C. Zhang, and Y. Fang, “CAM: cloud-assisted privacy preserving mobile health monitoring,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 985–997, 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. R. Lu, X. Lin, and X. Shen, “SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 3, pp. 614–624, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. K. P. N. Puttaswamy and B. Y. Zhao, “Preserving privacy in location-based mobile social applications,” in Proceedings of the 11th Workshop on Mobile Computing Systems and Applications (HotMobile '10), pp. 1–6, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. A. N. Khan, M. L. M. Kiah, S. A. Madani, A. U. R. Khan, and M. Ali, “Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing,” The Journal of Supercomputing, vol. 66, no. 3, pp. 1687–1706, 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. W. Wei, F. Xu, and Q. Li, “MobiShare: flexible privacy-preserving location sharing in mobile online social networks,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 2616–2620, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  29. W. Jia, H. Zhu, Z. Cao, L. Wei, and X. Lin, “SDSM: a secure data service mechanism in mobile cloud computing,” in Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS '11), pp. 1060–1065, IEEE, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  30. J. Shao, R. Lu, and X. Lin, “FINE: a fine-grained privacy-preserving location-based service framework for mobile devices,” in Proceedings of the IEEE INFOCOM, pp. 244–252, IEEE, Ontario, Canada, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Li, S. Yu, N. Cao, and W. Lou, “Privacy-preserving distributed profile matching in proximity-based mobile social networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 5, pp. 2024–2033, 2013. View at Publisher · View at Google Scholar · View at Scopus