Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 7495974, 15 pages
https://doi.org/10.1155/2017/7495974
Research Article

An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints

1School of Software, Central South University, Changsha 410075, China
2School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Correspondence should be addressed to Mengyao Zhu; nc.ude.uhs@oaygnemuhz

Received 18 August 2017; Accepted 10 October 2017; Published 7 November 2017

Academic Editor: Lianyong Qi

Copyright © 2017 Li Kuang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Vatsalan, Z. Sehili, P. Christen et al., Privacy-Preserving Record Linkage for Big Data: Current Approaches and Research Challenges, Handbook of Big Data Technologies, Springer International Publishing, 2017, 851–895.
  2. H. Ye, X. Cheng, M. Yuan, L. Xu, J. Gao, and C. Cheng, “A survey of security and privacy in big data,” in Proceedings of the 16th International Symposium on Communications and Information Technologies, ISCIT 2016, pp. 268–272, Qingdao, China, September 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Jakóbik, Big Data Security, Resource Management for Big Data Platforms, Springer International Publishing, 2016, 241–261. View at Publisher · View at Google Scholar
  4. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42, ACM, San Francisco, Calif, USA, May 2003. View at Publisher · View at Google Scholar
  5. M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, “SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services,” in Proceedings of the IEEE 24th International Conference on Data Engineering (ICDE '08), pp. 366–375, IEEE Press, Cancun, Mexico, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Mokbel F, C. Chow Y, and G. Aref W, “The new casper: Query processing for location services without compromising privacy,” in Proceedings of the 32nd international conference on Very large data bases, pp. 763–774, VLDB Endowment, 2006.
  7. X. Pan, J. L. Xu, and X. F. Meng, “Protecting location privacy against location-dependent attacks in mobile services,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 8, pp. 1506–1519, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. X. Zhu, H. Chi, B. Niu, W. Zhang, Z. Li, and H. Li, “MobiCache: When k-anonymity meets cache,” in Proceedings of the 2013 IEEE Global Communications Conference, GLOBECOM 2013, pp. 820–825, IEEE, Atlanta, GA, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Wang, D. Xu, X. He, C. Zhang, F. Li, and B. Xu, “L2P2: location-aware location privacy protection for location-based services,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 1996–2004, IEEE, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. T. Hashem, L. Kulik, and R. Zhang, “Countering overlapping rectangle privacy attack for moving kNN queries,” Information Systems, vol. 38, no. 3, pp. 430–453, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. B. Yao, F. Li, and X. Xiao, “Secure nearest neighbor revisited,” in Proceedings of the IEEE 29th International Conference on Data Engineering (ICDE '13), pp. 733–744, IEEE, Brisbane, Australia, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr, “Location privacy: Going beyond K-anonymity, cloaking and anonymizers,” Knowledge and Information Systems, vol. 26, no. 3, pp. 435–465, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Shokri, G. Theodorakopoulos, P. Papadimitratos, E. Kazemi, and J.-P. Hubaux, “Hiding in the mobile crowd: Location privacy through collaboration,” IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 3, pp. 266–279, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. Y. Elmehdwi, B. K. Samanthula, and W. Jiang, “Secure k-nearest neighbor query over encrypted data in outsourced environments,” in Proceedings of the 30th IEEE International Conference on Data Engineering (ICDE '14), pp. 664–675, Chicago, IL, USA, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Hu and J. Xu, “Non-exposure location anonymity,” in Proceedings of the 25th IEEE International Conference on Data Engineering, ICDE 2009, pp. 1120–1131, Shanghai, China, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. B. Gedik and L. Liu, A Customizable k-Anonymity Model for Protecting Location Privacy, Georgia Institute of Technology, 2004.
  17. C.-Y. Chow, M. F. Mokbel, and W. G. Aref, “Casper*: query processing for location services without compromising privacy,” ACM Transactions on Database Systems (TODS), vol. 34, no. 4, article 24, 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Jin and P. Papadimitratos, “Resilient privacy protection for location-based services through decentralization,” in Proceedings of the the 10th ACM Conference, pp. 253–258, Boston, Mass, USA, July 2017. View at Publisher · View at Google Scholar
  19. H. Jadallah and Z. Al Aghbari, “Aman: Spatial cloaking for privacy-aware location-based queries in the cloud,” in Proceedings of the International Conference on Internet of Things and Cloud Computing, ICC 2016, New York, NY, USA, March 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. F.-Y. Tai, J.-K. Song, Y.-C. Tsai, and H.-P. Tsai, “Cloaking sensitive patterns Td preserve location privacy for LBS applications,” in Proceedings of the 3rd IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016, Nantou, Taiwan, May 2016. View at Publisher · View at Google Scholar · View at Scopus
  21. X. Chen and J. Pang, “Measuring query privacy in location-based services,” in Proceedings of the the second ACM conference, pp. 49–60, San Antonio, Tex, USA, Feburary 2012. View at Publisher · View at Google Scholar
  22. M. Li, Z. Qin, and C. Wang, “Sensitive semantics-aware personality cloaking on road-network environment,” International Journal of Security and Its Applications, vol. 8, no. 1, pp. 133–146, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Huang, Z. Huo, and X.-F. Meng, “Coprivacy: a collaborative location privacy-preserving method without cloaking region,” Chinese Journal of Computers, vol. 34, no. 10, pp. 1976–1985, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. Cai and G. Xu, Cloaking with Footprints to Provide Location Privacy Protection in Location-Based Services, U.S. Patent, 2017.
  25. C. Li and B. Palanisamy, “De-anonymizable location cloaking for privacy-controlled mobile systems,” in Proceedings of the International Conference on Network and System Security, pp. 449–458, Springer, Cham, Switzerland. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in Proceedings of the 2nd International Conference on Pervasive Services (ICPS '05), pp. 88–97, IEEE Press, Santorini, Greece, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  27. H. Kido, Y. Yanagisawa, and T. Satoh, “Protection of location privacy using dummies for location-based services,” in Proceedings of the 21st International Conference on Data Engineering Workshops (ICDEW '05), p. 1248, Tokyo, Japan, April 2005. View at Publisher · View at Google Scholar
  28. M. Guo, N. Pissinou, and S. S. Iyengar, “Pseudonym-based anonymity zone generation for mobile service with strong adversary model,” in Proceedings of the 2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015, pp. 335–340, Las Vegas, NV, USA, January 2015. View at Publisher · View at Google Scholar · View at Scopus
  29. B. Palanisamy and L. Liu, “Attack-resilient mix-zones over road networks: Architecture and algorithms,” IEEE Transactions on Mobile Computing, vol. 14, no. 3, pp. 495–508, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. B. Niu, Z. Zhang, X. Li, and H. Li, “Privacy-area aware dummy generation algorithms for location-based services,” in Proceedings of the1st IEEE International Conference on Communications, ICC ( '14), pp. 957–962, Sydney, Australia, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. S. Papadopoulos, S. Bakiras, and D. Papadias, “Nearest neighbor search with strong location privacy,” in Proceedings of the VLDB Endowment, pp. 619–629. View at Scopus
  32. K. Mouratidis and M. L. Yiu, “Shortest path computation with no information leakage,” in Proceedings of the VLDB Endowment, pp. 692–703. View at Scopus
  33. Z. Liao, L. Kong, X. Wang et al., “A visual analytics approach for detecting and understanding anomalous resident behaviors in smart healthcare,” Applied Sciences (Switzerland), vol. 7, no. 3, article no. 254, 2017. View at Publisher · View at Google Scholar · View at Scopus
  34. A. Khoshgozaran and C. Shahabi, “Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy,” Advances in Spatial and Temporal Databases, pp. 239–257, 2007. View at Google Scholar
  35. R. Paulet, M. G. Kaosar, X. Yi, and E. Bertino, “Privacy-preserving and content-protecting location based queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1200–1210, 2014. View at Publisher · View at Google Scholar · View at Scopus
  36. R. Lu, X. Lin, Z. Shi, and J. Shao, “PLAM: A privacy-preserving framework for local-area mobile social networks,” in Proceedings of the 33rd IEEE Conference on Computer Communications, IEEE INFOCOM 2014, pp. 763–771, Canada, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  37. Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. 98, no. 1, pp. 190–200, 2015. View at Publisher · View at Google Scholar · View at Scopus
  38. R. Verde, F. A. T. Carvalho, and Y. Lechevallier, A Dynamical Clustering Algorithm for Multi-Nominal Data, Data Analysis, Classification, and Related Methods, Springer, Berlin, Germany, 2000. View at Publisher · View at Google Scholar