Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 7164126, 16 pages
http://dx.doi.org/10.1155/2016/7164126
Research Article

LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

1State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China
2Institute of Computer Science, University of Göttingen, Göttingen, Germany
3School of Data and Computer Science, Sun Yat-Sen University, Guangzhou 510006, China
4School of Computer Science & Tecnology, Beijing Information Science & Technology University, Beijing 100192, China

Received 3 December 2015; Accepted 2 June 2016

Academic Editor: Juan C. Cano

Copyright © 2016 Ming Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. http://www.dianping.com/.
  2. Y. Zheng, L. Wang, R. Zhang, X. Xie, and W.-Y. Ma, “GeoLife: Managing and understanding your past life over maps,” in Proceedings of the 9th International Conference on Mobile Data Management (MDM '08), pp. 211–212, IEEE, Beijing, China, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. “Advertise with promoted tweets twitter for business,” https://business.twitter.com/en/help/overview/what-are-promoted-tweets.html.
  4. N. Patel, “The 10 billion rule: location, location, location,” http://www.strategyanalytics.com/default.aspx?mod=reportabstractviewer&a0=6355.
  5. W. Karim, “The privacy implications of personal locators: why you should think twice before voluntarily availing yourself to GPS monitoring,” Washington University Journal of Law & Policy, vol. 14, pp. 485–515, 2004. View at Google Scholar
  6. L. Sweeney, “k-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. J. Meyerowitz and R. Roy Choudhury, “Hiding stars with fireworks: location privacy through camouflage,” in Proceedings of the 15th Annual ACM International Conference on Mobile Computing and Networking (MobiCom '09), pp. 345–356, Beijing, China, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. H. Kido, Y. Yanagisawa, and T. Satoh, “Protection of location privacy using dummies for location-based services,” in Proceedings of the 21st International Conference on Data Engineering Workshops (ICDEW '05), p. 1248, Tokyo, Japan, April 2005. View at Publisher · View at Google Scholar
  9. M. Gruteser and X. Liu, “Protecting privacy in continuous location-tracking applications,” IEEE Security & Privacy, vol. 2, no. 2, pp. 28–34, 2004. View at Publisher · View at Google Scholar · View at Scopus
  10. A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 46–55, 2003. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile systems, Applications and Services (MobiSys '03), pp. 31–42, ACM, San Francisco, Calif, USA, May 2003. View at Publisher · View at Google Scholar
  12. B. Gedik and L. Liu, “Location privacy in mobile systems: a personalized anonymization model,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05), pp. 620–629, IEEE, Columbus, Ohio, USA, June 2005. View at Scopus
  13. M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new Casper: query processing for location services without compromising privacy,” in Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB '06), pp. 763–774, 2006.
  14. R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, “Preserving user location privacy in mobile data management infrastructures,” in Privacy Enhancing Technologies: 6th International Workshop, PET 2006, Cambridge, UK, June 28–30, 2006, Revised Selected Papers, vol. 4258 of Lecture Notes in Computer Science, pp. 393–412, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  15. B. Gedik and L. Liu, “Location privacy in mobile systems: a personalized anonymization model,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05), pp. 620–629, June 2005. View at Scopus
  16. G. Ghinita, P. Kalnis, and S. Skiadopoulos, “Mobi- hide: a mobilea peer-to-peer system for anonymous location-based queries,” in Advances in Spatial and Temporal Databases: 10th International Symposium, SSTD 2007, Boston, MA, USA, July 16–18, 2007. Proceedings, Lecture Notes in Computer Science, pp. 221–238, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  17. C.-Y. Chow, M. F. Mokbel, and X. Liu, “A peer-to-peer spatial cloaking algorithm for anonymous location-based service,” in Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (ACM-GIS '06), pp. 171–178, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Li, S. Salinas, A. Thapa, and P. Li, “n-CD: a geometric approach to preserving location privacy in location-based services,” in Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE INFOCOM '13), pp. 3012–3020, Turin, Italy, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Espinoza, P. Persson, A. Sandin, H. Nyström, E. Cacciatore, and M. Bylund, “Geonotes: social and navigational aspects of location-based information systems,” in Proceedings of the International Symposium on Ubiquitous Computing (Ubicomp '01), Atlanta, Ga, USA, September-October 2001.
  20. D. Yang, X. Fang, and G. Xue, “Truthful incentive mechanisms for k-anonymity location privacy,” in Proceedings of the IEEE INFOCOM, pp. 2994–3002, Turin, Italy, April 2013. View at Publisher · View at Google Scholar
  21. X. Liu, H. Zhao, M. Pan, H. Yue, X. Li, and Y. Fang, “Traffic-aware multiple mix zone placement for protecting location privacy,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 972–980, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Gong, X. Chen, K. Xing, D.-H. Shin, M. Zhang, and J. Zhang, “Personalized location privacy in mobile networks: a social group utility approach,” in Proceedings of the 34th IEEE Annual Conference on Computer Communications and Networks (INFOCOM '15), pp. 1008–1016, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, “Preserving privacy in GPS traces via uncertainty-aware path cloaking,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 161–171, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  24. Z. Zhu and G. Cao, “APPLAUS: a privacy-preserving location proof updating system for location-based services,” in Proceedings of the 30th IEEE International Conference on Computer Communications (IEEE INFOCOM 2011), pp. 1889–1897, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. P. Galdames and Y. Cai, “Efficient processing of location-cloaked queries,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 2480–2488, IEEE, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. Y. Wang, D. Xu, X. He, C. Zhang, F. Li, and B. Xu, “L2P2: Location-aware location privacy protection for location-based services,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 1996–2004, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  27. K. Vu, R. Zheng, and J. Gao, “Efficient algorithms for K-anonymous location privacy in participatory sensing,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 2399–2407, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  28. G. Xue, X. Zhao, and L. Li, “Checking in without worries: location privacy in location based social networks,” in Proceedings of the Conference on Computer Communications (INFOCOM '13), Turin, Italy, August 2013.
  29. X.-Y. Li and T. Jung, “Search me if you can: privacy-preserving location query service,” in Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE INFOCOM '13), pp. 2760–2768, Turin, Italy, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  30. W. Wei, F. Xu, and Q. Li, “MobiShare: flexible privacy-preserving location sharing in mobile online social networks,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 2616–2620, IEEE, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. B. Doer, M. Fouz, and T. Friedrich, “Why rumors spread so quickly in social networks,” Communications of the ACM, vol. 55, no. 6, p. 70, 2012. View at Publisher · View at Google Scholar
  32. M. Zhang, J.-G. Luo, L. Zhao, and S.-Q. Yang, “A peer-to-peer network for live media streaming using a push-pull approach,” in Proceedings of the 13th Annual ACM International Conference on Multimedia (MULTIMEDIA '05), pp. 287–290, ACM, Singapore, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  33. R. Unni and R. Harmon, “Perceived effectiveness of push vs. pull mobile location based advertising,” Journal of Interactive Advertising, vol. 7, no. 2, pp. 28–40, 2007. View at Publisher · View at Google Scholar
  34. M. Piórkowski, N. Sarafijanovic-Djukic, and M. Grossglauser, “A parsimonious model of mobile partitioned networks with clustering,” in Proceedings of the 1st International Conference on Communication Systems and Networks and Workshops (COMSNETS '09), pp. 1–10, Bangalore, India, January 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. http://www.nytimes.com/2014/12/11/nyregion/plan-approved-for-wi-fi-at-new-york-citys-pay-phones.html?r=0/.
  36. L. Duan, T. Kubo, K. Sugiyama, J. Huang, T. Hasegawa, and J. Walrand, “Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 1701–1709, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  37. L. Duan, T. Kubo, K. Sugiyama, J. Huang, T. Hasegawa, and J. Walrand, “Motivating smartphone collaboration in data acquisition and distributed computing,” IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2320–2333, 2014. View at Publisher · View at Google Scholar · View at Scopus
  38. C. Lochert, B. Scheuermann, C. Wewetzer, A. Luebke, and M. Mauve, “Data aggregation and roadside unit placement for a vanet traffic information system,” in Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking (VANET '08), pp. 58–65, ACM, San Francisco, Calif, USA, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  39. S. Amini, J. Lindqvist, J. Hong, J. Lin, E. Toch, and N. Sadeh, “Caché: caching location-enhanced content to improve user privacy,” in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 197–210, ACM, 2011. View at Publisher · View at Google Scholar
  40. Mitzenmacher and Upfal, Probability and Computing: Randomized Algorithms and Probabilistic Analysis, Cambridge University Press, Cambridge, UK, 2005.