Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2016, Article ID 3821593, 8 pages
http://dx.doi.org/10.1155/2016/3821593
Research Article

Secure Mix-Zones for Privacy Protection of Road Network Location Based Services Users

1Department of Electronics & Communication Engineering, I.T.S. Engineering College, Greater Noida 201308, India
2Dr. A.P.J. Abdul Kalam Technical University (AKTU), Lucknow 226021, India
3Department of Electronics & Communication Engineering, Jamia Millia Islamia, New Delhi 110025, India

Received 30 November 2015; Accepted 21 March 2016

Academic Editor: Eduardo da Silva

Copyright © 2016 Rubina S. Zuberi and Syed N. Ahmad. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, “Analysing unlinkability and anonymity using the applied pi calculus,” in Proceedings of the 23rd Computer Security Foundations Symposium (CSF '10), pp. 107–121, Edinburgh, Scotland, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. H. Takabi, J. B. D. Joshi, and H. A. Karimi, “A collaborative k-anonymity approach for location privacy in location-based services,” in Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom '09), pp. 1–9, Washington, DC, USA, November 2009. View at Publisher · View at Google Scholar
  3. M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Proceedings of International Conference of Pervasive Computing (LNCS '05), pp. 152–170, Munich, Germany, May 2005. View at Scopus
  4. C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati, “Location privacy protection through obfuscation-based techniques,” in Data and Applications Security XXI, S. Barker and G.-J. Ahn, Eds., vol. 4602 of Lecture Notes in Computer Science, pp. 47–60, 2007. View at Publisher · View at Google Scholar
  5. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42, San Francisco, Calif, USA, May 2003.
  6. M. F. Mokbel, C. Y. Chow, and W. G. Aref, “The new casper: query processing for location services without compromising privacy,” in Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB '06), pp. 763–774, ACM, Seoul, Republic of Korea, September 2006.
  7. C. Bettini, S. Mascetti, X. S. Wang, and S. Jajodia, “Anonymity in location-based services: Towards a general framework,” in Proceedings of the International Conference on Mobile Data Management, pp. 69–76, IEEE, Mannheim, Germany, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. C. Y. Chow and M. F. Mokbel, “Enabling private continuous queries for revealed user locations,” in Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases (SSTD '07), pp. 258–275, 2007.
  9. A. Gkoulalas-Divanis, V. S. Verykios, and M. F. Mokbel, “Identifying unsafe routes for network-based trajectory privacy,” in Proceedings of the SIAM International Conference on Data Mining (SDM '09), SIGKDD, 2009. View at Publisher · View at Google Scholar
  10. P. Zacharouli, A. Gkoulalas-Divanis, and V. S. Verykios, “A K-anonymity model for spatiotemporal data,” in Proceedings of the IEEE Workshop on Spatio-Temporal Data Mining (STDM '07), pp. 555–564, SIGKDD, Istanbul, Turkey, April 2007.
  11. A. Gkoulalas-Divanis and V. S. Verykios, “A free terrain model for trajectory K-anonymity,” in Database and Expert Systems Applications: 19th International Conference, DEXA 2008, Turin, Italy, September 1–5, 2008. Proceedings, vol. 5181 of Lecture Notes in Computer Science, pp. 49–56, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  12. C.-Y. Chow and M. F. Mokbel, “Trajectory privacy in location-based services and data publication,” ACM SIGKDD Explorations Newsletter, vol. 13, no. 1, pp. 19–29, 2011. View at Publisher · View at Google Scholar
  13. H. Shin, J. Vaidya, V. Atluri, and S. Choi, “Ensuring privacy and security for LBS through trajectory partitioning,” in Proceedings of the 11th International Conference on Mobile Data Management (MDM '10), pp. 224–226, IEEE, Kansas City, Mo, USA, May 2010. View at Publisher · View at Google Scholar
  14. N. Pelekis, E. Frentzos, N. Giatrakos, and Y. Theodoridis, “HERMES: aggregative LBS via a trajectory DB engine,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '08), pp. 1255–1258, ACM, Vancouver, Canada, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. Tao, D. Papadias, and J. Sun, “The TPR-tree: an optimized spatio-temporal access method for predictive queries,” in Proceedings of the 29th International Conference on Very Large Data Bases (VLDB '03), vol. 29, pp. 790–801, Berlin, Germany, 2003.
  16. Y. Tao, D. Papadias, and Q. Shen, “Continuous nearest neighbor search,” in Proceedings of the 28th International Conference on Very Large Data Bases, pp. 287–298, Hong Kong, August 2002.
  17. H. Shin, J. Vaidya, V. Atluri, and S. Choi, “Ensuring privacy and security for LBS through trajectory partitioning,” in Proceedings of the 11th IEEE International Conference on Mobile Data Management (MDM '10), pp. 224–226, Kansas City, Mo, USA, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 46–55, 2003. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Freudiger, R. Shokri, and J.-P. Hubaux, “On the optimal placement of mix zones,” in Privacy Enhancing Technologies, I. Goldberg and M. J. Atallah, Eds., vol. 5672 of Lecture Notes in Computer Science, pp. 216–234, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  20. X. Liu, H. Zhao, M. Pan, H. Yue, X. Li, and Y. Fang, “Traffic-aware multiple mix zone placement for protecting location privacy,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 972–980, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. B. Palanisamy, L. Liu, K. Lee, A. Singh, and Y. Tang, “Location privacy with road network mix-zones,” in Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN '12), pp. 124–131, IEEE, Chengdu, China, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, “Privacy in inter-vehicular networks: why simple pseudonym change is not enough,” in Proceedings of the 7th International Conference on Wireless On-demand Network Systems and Services (WONS '10), pp. 176–183, IEEE, Kranjska Gora, Slovenia, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. R. S. Zuberi, B. Lall, and S. N. Ahmad, “Privacy protection through k-anonymity in Location-based Services,” IETE Technical Review, vol. 29, no. 3, pp. 196–201, 2012. View at Google Scholar
  24. A. Gkoulalas-Divanis, P. Kalnis, and V. S. Verykios, “Providing k-anonymity in location based services,” ACM SIGKDD Explorations Newsletter, vol. 12, no. 1, pp. 3–10, 2010. View at Publisher · View at Google Scholar
  25. H. Othman, H. Hashim, and J.-L. Ab Manan, “Privacy preservation in Location-Based Services (LBS) through trusted computing technology,” in Proceedings of the 9th Malaysia International Conference on Communications (MICC '09), pp. 736–741, IEEE, Kuala Lumpur, Malaysia, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. C. Díaz, S. Seys, J. Claessens, and B. Preneel, “Towards measuring anonymity,” in Privacy Enhancing Technologies, R. Dingledine and P. Syverson, Eds., vol. 2482 of Lecture Notes in Computer Science, Springer, Heidelberg, Germany, 2003. View at Publisher · View at Google Scholar
  27. A. Solanas and A. M. Ballesté, “Privacy protection in location-based services through a public-key privacy homomorphism,” in Public Key Infrastructure, pp. 362–368, Springer, Berlin, Germany, 2007. View at Google Scholar
  28. M. E. Hellman and J. Raviv, “Probability of error, equivocation, and the Chernoff bound,” IEEE Transactions on Information Theory, vol. IT-16, pp. 368–372, 1970. View at Google Scholar · View at MathSciNet
  29. Safespot Project, 2006–2010, http://www.safespot-eu.org/.
  30. G. VinothChakkaravarthy, R. Lavanya, and P. Alli, “Communication efficient distributed decentralized key management framework for message authentication in vanet,” in Advances in Communication, Network, and Computing, pp. 405–408, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  31. R. S. Zuberi and S. N. Ahmad, “Detection of road intersections using history trajectory data for evolving mix-zones,” International Journal on Advanced Computer Theory and Engineering, vol. 3, no. 1, pp. 28–32, 2014. View at Google Scholar
  32. K. Emara, “Location privacy in vehicular networks,” in Proceedings of the IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '13), pp. 1–2, IEEE, Madrid, Spain, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  33. P. Pesti, B. Bamba, M. Doo, L. Liu, B. Palanisamy, and M. Weber, GTMobiSIM: A Mobile Trace Generator for Road Networks, College of Computing, Georgia Institute of Technology, 2009, http://code.google.com/p/gt-mobisim/.
  34. U.S. Geological Survey, http://www.usgs.gov.
  35. TIGER Maps, http://www.census.gov/geo/www/tiger/.
  36. N. Alexiou, M. Laganà, S. Gisdakis, M. Khodaei, and P. Papadimitratos, “Vespa: vehicular security and privacy-preserving architecture,” in Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13), ACM, Budapest, Hungary, April 2013.