Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016 (2016), Article ID 6182769, 9 pages
http://dx.doi.org/10.1155/2016/6182769
Research Article

A Privacy-Preserving Location-Based System for Continuous Spatial Queries

Information Communication Engineering, Wonkwang University, Iksan-shi, Republic of Korea

Received 21 June 2016; Accepted 25 September 2016

Academic Editor: Chang Xu

Copyright © 2016 Doohee Song and Kwangjin Park. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Park and P. Valduriez, “A hierarchical grid index (HGI), spatial queries in wireless data broadcasting,” Distributed and Parallel Databases, vol. 31, no. 3, pp. 413–446, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Li, R. Chen, J. Xu, Q. Huang, H. Hu, and B. Choi, “Geo-social K-cover group queries for collaborative spatial computing,” IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 10, pp. 2729–2742, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. K. Park, “An efficient scalable spatial data search for location-aware mobile services,” Information Science and Engineering, vol. 31, no. 1, pp. 165–178, 2015. View at Google Scholar
  4. D. Song and K. Park, “A partial index for distributed broadcasting in wireless mobile networks,” Information Sciences, vol. 348, no. 20, pp. 142–152, 2016. View at Publisher · View at Google Scholar
  5. X. Yi, R. Paulet, E. Bertino, and V. Varadharajan, “Practical k nearest neighbor queries with location privacy,” in Proceedings of the 30th IEEE International Conference on Data Engineering (ICDE '14), pp. 640–651, IEEE, Chicago, Ill, USA, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. B. Bamba, L. Liu, P. Pesti, and T. Wang, “Supporting anonymous location queries in mobile environments with PrivacyGrid,” in Proceedings of the International Conference on World Wide Web (WWW '08), pp. 237–246, Beijing, China, April 2008. View at Publisher · View at Google Scholar
  7. B. Gedik and L. Liu, “A customizable k-anonymity model for protecting location privacy,” in Proceedings of the International Conference on Distributed Computing Systems (ICDCS '05), pp. 620–629, June 2005.
  8. B. Gedik and L. Liu, “Protecting location privacy with personalized k-anonymity: architecture and algorithms,” IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1–18, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719–1733, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: query processing for location services without compromising privacy,” in Proceedings of the International Conference on Very Large Data Bases, pp. 763–774, August 2006.
  11. T. Xu and Y. Cai, “Exploring historical location data for anonymity preservation in location-based services,” in Proceedings of the IEEE International Conference on INFOCOM, pp. 547–555, April 2008.
  12. L. Yao, C. Lin, G. Liu, F. Deng, and G. Wu, “Location anonymity based on fake queries in continuous location-based services,” in Proceedings of the 7th International Conference on Availability, Reliability and Security (ARES '12), pp. 375–382, Prague, Czech Republic, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. T. Xu and Y. Cai, “Location anonymity in continuous location-based services,” in Proceedings of the 15th ACM International Symposium on Advances in Geographic Information Systems (GIS '07), pp. 300–307, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. C.-Y. Chow and M. F. Mokbel, “Enabling private continuous queries for revealed user locations,” in Proceedings of the International Conference on Spatial Temporal Databases, pp. 258–273, July 2007.
  15. D. Song, J. Sim, K. Park, and M. Song, “A privacy-preserving continuous location monitoring system for location-based services,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 815613, 10 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Kim, Y. Kim, and J. Chang, “A grid-based cloaking area creation scheme for continuous LBS queries in distributed systems,” Journal of Convergence, vol. 4, no. 1, pp. 23–30, 2013. View at Google Scholar
  17. S. Gambs, M.-O. Killijian, and M. N. del Prado Cortez, “De-anonymization attack on geolocated data,” Journal of Computer and System Sciences, vol. 80, no. 8, pp. 1597–1614, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. H. Liu, H. Darabi, P. Banerjee, and J. Liu, “Survey of wireless indoor positioning techniques and systems,” IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, vol. 37, no. 6, pp. 1067–1080, 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. L. Petrou, G. Larkou, C. Laoudias, D. Zeinalipour-Yazti, and C. G. Panayiotou, “Demonstration abstract: crowdsourced indoor localization and navigation with anyplace,” in Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN '14), pp. 331–332, IEEE, Berlin, Germany, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Hippocratic databases,” in Proceedings of the International Conference on Very Large Data Bases, pp. 143–154, August 2002.
  21. H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in Proceedings of the 2nd International Conference on Pervasive Services (ICPS '05), pp. 88–97, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, “Private information retrieval,” in Proceedings of the 1995 IEEE 36th Annual Symposium on Foundations of Computer Science, pp. 41–50, Milwaukee, Wis, USA, October 1995. View at Scopus
  23. R. Paulet, M. G. Kaosar, X. Yi, and E. Bertino, “Privacy-preserving and content-protecting location based queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1200–1210, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: anonymizers are not necessary,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '08), pp. 121–132, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. B. Palanisamy and L. Liu, “MobiMix: Protecting location privacy with mix-zones over road networks,” in Proceedings of the 2011 IEEE 27th International Conference on Data Engineering (ICDE '11), pp. 494–505, Hannover, Germany, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. R. Schlegel, C.-Y. Chow, Q. Huang, and D. S. Wong, “User-defined privacy grid system for continuous location-based services,” IEEE Transactions on Mobile Computing, vol. 14, no. 10, pp. 2158–2172, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. Y. Elmehdwi, B. K. Samanthula, and W. Jiang, “Secure k-nearest neighbor query over encrypted data in outsourced environments,” in Proceedings of the 30th IEEE International Conference on Data Engineering (ICDE '14), pp. 664–675, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. S. Wang, X. Ding, R. H. Deng, and F. Bao, “Private information retrieval using trusted hardware,” in Proceedings of the International Conference on Computer Security, pp. 49–64, September 2006.
  29. B. Yao, F. Li, and X. Xiao, “Secure nearest neighbor revisited,” in Proceedings of the 29th International Conference on Data Engineering (ICDE '13), pp. 733–744, Brisbane, Australia, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  30. M. L. Yiu, C. Jensen, X. Huang, and H. Lu, “SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services,” in Proceedings of the IEEE 24th International Conference on Data Engineering (ICDE '08), pp. 366–375, Cancun, Mexico, April 2008. View at Publisher · View at Google Scholar · View at Scopus