Research Article  Open Access
Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage
Abstract
As cloud computing services and locationaware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC^{∗}) and a densitybased space filling curve (DSC) to improve the security of SHC; they can partially violate the distancepreserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC^{∗} and DSC are more secure than SHC, and DSC achieves the best index generation performance.
1. Introduction
The widespread use of locationaware devices promotes the development of various successful locationbased services [1], and the amount of spatial information has grown at an exceptional speed over the past decade. This enormous spatial information should be maintained and processed by powerful data management system, which exceeds the capabilities of small business and individuals. Cloud computing adaptively allocates the resources and effectively reduces the manipulating and maintaining expenses for data owner (DO). Therefore, data outsourcing becomes a prevailing pattern and has earned widespread attentions from academia [2]. In this pattern, DO delegates the management of its data to a thirdparty cloud storage provider (SP), which maintains the data of DO and responses to the queries of authorized user (AU). However, as the data is outsourced to SP, DO cannot know where the data is stored and thus loses the direct control over the fate of their data. Therefore, protecting location privacy of outsourced spatial data is a big challenge with the development of spatial data outsourcing and locationbased services [3].
In spatial data outsourcing pattern, spatial queries such as nearest neighbor (KNN) or range queries are commonly issued by AU; in order to perform spatial queries, AU needs to share the location of the query point (query window) with SP [4]. However, the AU’s location is highly sensitive information that, once compromised, can lead to various threats of privacy disclosure. For instance, malicious SP might sell commercially valuable information to the DO’s rivals or can speculate the users’ state of health based on the users’ spatial queries.
For the privacy preserving of spatial data outsourcing, one simple solution is that DO first applies conventional encryption (e.g., AES) to the data locally and then outsources the encrypted data to SP. However, once the data is encrypted, traditional plaintext query techniques become invalid, and the AU cannot query or use the encrypted data effectively. This solution is inefficient for queries that only require a small fraction of the data. Applying computable encryption techniques [5, 6] will result in limitations when processing spatial queries. For example, if AU needs to find nearest neighbor points of interest (POIs) to the query point , although computable encryption techniques can calculate the encrypted Euclid distances between encrypted point and each POI, it cannot sort these encrypted distances in ascending or descending order. Therefore, these encrypted distances should be sent back to AU who can decrypt them and find the top results. By analyzing the process, we know that, in order to get correct query result, SP needs to compute the encrypted distances and send them back to AU, so the computation and communication complexity for SP is , where is the size of the outsourced dataset. As data explodes nowadays, this straightforward approach is not applicable in such scenario. Meanwhile, privacy information retrieval (PIR) [7] assures that no information about AU queries will be exposed to the untrusted SP; thus, it can achieve strong privacypreserving level. But it will result in massive computation and communication cost and is not suitable for spatial data outsourcing.
To guarantee that DO and AU can query encrypted spatial data effectively while protecting the location privacy of outsourced spatial data, Hilbert curve is employed to transform the locations of both AU and POIs [8–12]. However, standard Hilbert curve (SHC) builds indexes of POIs using the same granularity in the spatial domain. If POIs densely distribute, its indexes generated by SHC will contain a lot of index values without the corresponding POIs; we call these values null value segments, which is easy for malicious SP to analyze and speculate the distribution of POIs in the transformed space. It will increase the location privacy disclosure risk of the outsourced spatial data. In this paper, we propose two index generation methods for outsourced spatial data and analyze the security and efficiency of these methods quantitatively. Our major contributions are summarized as follows.(1)We propose an index modification method for SHC (SHC^{∗}) to improve its security, while a densitybased spacefilling curve (DSC) is also proposed for efficiency concerns.(2)A metric for measuring the privacy disclosure risk of the spatial transformation methods (e.g., SHC) is proposed, namely, indistinguishability . Additionally, we formally define an attack model for these spatial transformation methods; this model quantifies the attacker’s background knowledge and applies a modified general attack method to reconstruct the original spatial dataset.(3)The evaluation results conducted on realworld datasets show that our spatial transformation methods can achieve better security than SHC.
The remainder of this paper is organized as follows. Section 2 reviews related work. Section 3 proposes our spatial transformation methods. Section 4 presents the indistinguishability and attack model for security analysis. An empirical evaluation is presented in Section 5. Section 6 concludes and discusses future research directions.
2. Related Work
2.1. Spatial Query Privacy Protection
Confidentiality has been addressed in the context of spatial queries. Mobile users issue spatial queries (e.g., range or KNN queries), which are answered by the service provider (e.g., Google Maps). Users do not want to reveal their exact location to the SP. In order to protect the spatial query privacy, the user location should be first generalized by a trusted location anonymizer [13], which processes the query and generates the anonymizing spatial region instead of the exact user location. Much of the work regarding spatial query privacy protection derives from anonymity model which is first proposed by Sweeny in database [14]. Gruteser and Grunwald [15] first proposed location anonymity on the basis of this model to protect the spatial query privacy. Based on location anonymity, Gedik and Liu [16] proposed a scalable architecture which supports location anonymity for a wide range of mobile clients with contextsensitive privacy requirements. Bamba et al. [17] proposed a framework for supporting anonymous locationbased queries, which divides the geographical area of interest into grid cells and achieves anonymity by the grid.
Taking the anonymization policy into consideration, Deutsch et al. [18] proposed policyaware location anonymity, which could defend against more realistic policyaware attackers. As most of the location anonymity algorithms cannot effectively prevent locationdependent attacks when users’ locations are continuously updated, Pan et al. [19] proposed an incremental cliquebased cloaking algorithm to solve this problem. In addition to the location anonymity, a number of other query privacypreserving methods were proposed. For example, Beresford and Stajano [20] introduced the mix zone to map the problem of spatial query privacy onto that of anonymous communication. By building mix zones at road network, Palanisamy and Liu [21] present a framework to protect location privacy of mobile users travelling on road networks.
The spatial query privacypreserving methods hide the query users’ location from the SP but do not protect the data being queried. Therefore, it is orthogonal to our problem.
2.2. Spatial Data Outsourcing Privacy Protection
Hacigümüs et al. [22] first introduced the idea of outsourcing database services to a thirdparty service provider. Then, they provided a solution for outsourced data privacy protection, by constructing index based on encrypted data and additional bucketing information, to support encrypted data query [23]. Later, aiming at onedimensional numeric values, Agrawal et al. [24] have proposed an orderpreserving encryption scheme (OPES) which supports efficient processing of queries at the SP. Afterwards, Huang et al. [25] have presented an outsourced data privacypreserving approach which supports fuzzy query of encrypted string. All the above approaches are suitable for string or onedimensional numeric values and they cannot be directly applied to privacy protection of spatial data.
Wong et al. [26] have studied KNN computation of encrypted tuples stored at untrusted SP and propose a method supporting SP to calculate the relative distance between two encrypted data points. As virtual dimension has been introduced, this method cannot build up index of encrypted data points efficiently. Therefore, when dealing with query request, SP needs to traverse all encrypted data points, which leads to relatively poor query efficiency.
In order to support query services on outsourced private spatial data, some researchers have employed space filling curves to transform POIs, which can support range and KNN query in the transformed space. In practice, SHC is applied in most circumstances. By using SHC, Ni et al. [8] have reduced extra work load due to setting users’ parameters. Meanwhile, the computation and communication cost of range query has been reduced since the clustering and distancepreserving properties of SHC are superior. Khoshgozaran et al. [9] use SHC to map data points and query request to Hilbert transformed space and enable query services on encrypted spatial data. In addition, they introduce dual Hilbert curve technique, which improves the accuracy and efficiency of query. Ku et al. [10] study the query integrity assurance scheme. Based on SHC, the data points are encrypted with a symmetric key and indexed by Hilbert value. The original database and a sample of it are encrypted with different space encryption keys. Then the two encrypted datasets are combined and stored at SP for integrity verification.
According to the current research, SHC does not take the distribution of POIs into consideration when transforming the original space. In fact, it divides the space using the same granularity and generates Hilbert values so as to construct the indexes of POIs. In order to guarantee the security and query efficiency, a large enough curve order is needed to make sure that there are not two POIs with the same Hilbert value. Khoshgozaran et al. [9] pointed out that without the knowledge of Hilbert curve parameters, malicious SP can still find out the dense area of POIs in the transformed space by analyzing the number of POIs with the same or similar Hilbert values, which increases the location privacy disclosure risk of outsourced spatial data.
3. Spatial Transformation Methods
In order to protect the location privacy of spatial data, we need to transform the original locations of POIs. An ideal space transformation method should be a oneway function, which is easy to compute but difficult to invert. Meanwhile, to maintain the query efficiency of encrypted spatial data, the space transformation method should respect the spatial proximity of the original space. In this section, we first introduce the standard Hilbert curve, which is a representative spatial transformation method. Then, we propose two improved spatial transformation methods, which achieve better security than SHC.
3.1. Standard Hilbert Curve (SHC)
Space filling curves [27] have the above features and can be applied in spatial data transformation to protect location privacy for outsourced spatial data. Space filling curve passes through every partition of a closed space and has no intersection with itself. In this way, each point in multidimensional space will be mapped as a value to onedimensional space. curve [28], Gray curve [29], and Hilbert curve are all space filling curves, which can be used for space transformation.
Compared to curve and Gray curve, Hilbert curve is widely applied due to its superior clustering and distancepreserving properties [11, 28–30, 34]. Similar to [11], we use to denote Hilbert curve with order in dimensional space, where and . In this way, dimensional integer space can be mapped to a onedimensional integer set , which means that, for any POI in dimensional space, there is a function satisfying , where . As one partitioned region may contain multiple POIs, different POIs may have the same index value for a given Hilbert curve.
Since the main goal of this paper is to protect the location privacy of POIs, we focus on the spatial transformations in twodimensional space. Figure 1(a) illustrates the process of transforming a twodimensional space into Hilbert values. All POIs are traversed by a second order Hilbert curve and are indexed based on the sequence they are visited by the curve. So, in this example the POIs , , , and are represented by their Hilbert values 7, 9, 3, and 13, respectively. Figure 1(b) depicts Hilbert curve with order 1, 2, 4, and 6. From the figure we can see that the larger the order is, the more finegrained the Hilbert curve is.
(a)
(b)
3.2. Index Modification Method for SHC (SHC^{∗})
As realworld spatial datasets show aggregate distribution, the POIs’ indexes generated by SHC contain many null value segments, which increase the privacy disclosure risk. Malicious SP has the whole indexes and may passively obtain some mappings between the POIs and indexes. By scanning the indexes, the attacker can easily find the continuous segments and null value segments. He can focus on this information and apply his background knowledge to estimate the location of unknown POIs.
We study the distribution characteristics of the indexes generated by SHC. And the distribution of the indexes is depicted in Figure 2.
(a) NA
(b) NE
(c) SF
In Figure 2, the left picture represents the original dataset and the corresponding histogram represents the visualization of POIs’ indexes. In histogram, the black lines represent the continuous segments and the gray parts denote the null value segments. If we compress these gray parts, the distribution of the indexes will become equilibrium. So it will be more difficult for the attackers to analyze, and the privacy disclosure risk will decrease. Based on this concept, we present an index modification algorithm to improve the security of SHC, denoted as SHC^{∗}.
In Algorithm 1, based on the POIs’ indexes generated by SHC and user parameter max gap , which denotes the max gap value between two indexes in the modified POIs’ indexes , we compare the difference between two neighbor indexes; if the difference is beyond the max gap , then the latter index should be modified using the forward index and . The modified POIs’ indexes should be updated with the new tuple, which contains the index and encrypted POI. The time complexity of this algorithm is , where represents the cardinality of .

After applying Algorithm 1 to modify the POIs’ indexes, the length of gray parts in Figure 2 will decrease dramatically, and the outsourced spatial datasets are more difficult for the malicious SP to attack.
3.3. DensityBased Space Filling Curve (DSC)
As SHC^{∗} starts executing after the indexes have been generated by SHC, SHC^{∗} takes more time to generate the POIs’ indexes. Inspired by the idea that SHC can partition and transform the original space, we propose a densitybased space filling curve (DSC), which takes the distribution of POIs into consideration. DSC partitions the spatial domain according to the capacity, which is the maximum number of POIs a partitioned region contains, denoted as . It uses fractal rules of Hilbert curve to determine the visiting sequence of each partitioned region.
Two steps are involved in the DSC generation. According to the capacity, the spatial domain is partitioned by quad tree structure [31]. And the generated partitioned regions will be represented as quad tree nodes. Based on the curve orientation, starting point, and scaling factor given by DO, each partitioned region is traversed sequentially in accordance with the fractal rules of Hilbert curve, then the sequence number of each partitioned region is generated, and we call this number DSC value, which is used to build indexes of POIs.
Quad TreeBased Space Partition. In DSC, the spatial domain is partitioned by quad tree structure. The granularity is decided by capacity , which means that, under current partition, if the number of POIs in region exceeds , we should continue to partition , until the number of POIs in each partitioned region does not exceed . Figure 3 shows the different partitions using various . From Figure 3 we can see that the smaller the is, the more finegrained the partition is.
(a)
(b)
(c)
DSC partitions the space and generates quad tree nodes corresponding to partitioned regions on the basis of POI dataset and capacity.
Index Generation for DSC. After partitioning spatial domain and generating quad tree nodes, it is necessary to generate the leaf nodes’ DSC value and intermediate nodes’ subcurve orientation and starting point according to the preset curve orientation and starting point of DSC, shown in Algorithm 2. Meanwhile, the index value of each POI is set the same as the DSC value of the partitioned region that the POI belongs to. This algorithm employs Hilbert curve fractal rules shown in Figure 4.

There are eight types of Hilbert curve fractal rules. Sequence number of subregion is assigned by the number in the quad. According to the rules in Figure 4, each subregion can be further partitioned to generate curves with higher order.
In Algorithm 2, is the subcurve orientation of node , is the subcurve starting point of node , is a stack which stores quad tree nodes, is the DSC value of node , and is the th child node of . Algorithm 2 depthfirst traverses quad tree according to preset curve orientation and starting point and generates index value of each partitioned region based on the visiting sequence of leaf nodes. From the root node, we set the orientation and starting point of each intermediate node level by level according to the fractal rules in Figure 4 (lines 6–9). and represent the subcurve orientation and starting point of node ’s th child node, respectively.
Assuming the size of POI dataset is . On average, Algorithm 2 needs to visit nodes, and each node will be visited only once. So the complexity of Algorithm 2 is .
4. Security Analysis
In this section, we first analyze the security of SHC and propose indistinguishability for measuring the privacy disclosure risk of the space filling curves. Then we formally define the attack model, which quantifies the attacker’s background knowledge and measures the security of space filling curves.
4.1. Privacy Disclosure Risk
As we know, malicious SP can identify the dense area of POIs in the transformed space by analyzing the number of POIs with similar or the same index values. In order to prevent multiple POIs from allocating the same index value, we need to increase the curve order of SHC. In practice, POIs densely distribute in most cases, and applying SHC to generate indexes of POIs may introduce many null value segments. In this way, malicious SP can analyze these null value segments and then find out the dense areas in the transformed space. Although using dummy values to reduce the null value segments [9] can explicitly eliminate these segments, by analyzing the query log, malicious SP can still discover the index values with low query frequency and then confirm the dummy values. In order to quantify the privacy disclosure risk, we employ the idea of information entropy and define indistinguishability as follows: where represents the length of a null value segment in the POIs’ indexes; represents the number of null value segments; represents the length of a continuous segment in the POIs’ indexes; represents the number of continuous segments; represents the total length of the POIs’ indexes. Indistinguishability measures how null value segments and continuous segments affect the privacy disclosure risk. It is difficult for malicious SP to analyze the uniformly distributed indexes. According to the characteristics of information entropy, we learn that the more unevenly the null value segments and continuous segments distribute, the lower the indistinguishability is, and thus the higher the privacy disclosure risk is.
4.2. Attack Model
Because malicious SP may analyze the encrypted spatial data to estimate the original locations, DO wants to know the security level of spatial transformation methods. The malicious SP may obtain some background knowledge, for example, a subset of mappings between the original dataset and transformed dataset . Then, he can employ some attack methods to estimate the original locations of the objects in and get the estimated dataset . We use estimation distortion [4] to measure the average error between the original dataset and the estimated dataset as follows: where represents the Euclidean distance between and . Obviously, a high value means that the spatial transformation method is difficult to attack. The estimation distortion could be used to measure the security level of a spatial transformation method.
We assume the attacker may obtain prior background knowledge of the outsourced spatial dataset. For example, an attacker may know some mappings between original locations and corresponding indexes. Due to the superior clustering and distancepreserving properties of SHC, the attacker can estimate the original locations of the indexes by the known mappings. For the sake of discussion, we assume that the attacker passively knows the following information.(1)A subset of POIs, , where is the location of POI.(2)The corresponding subset of POIs’ indexes, , where is the index of location .
As the attacker can only obtain and in a passive manner, he cannot actively choose them as he wishes. Although the attacker knows the POIs’ indexes in , he does not know the location of any POI in . So the attacker tries to estimate the original location of each index in . The spatial transformation method should make this estimation with a high value.
Yiu et al. [4] define the general attack model and propose a heuristicbased general attack method that allows the attacker to estimate a reasonable approximation of the original location, by exploiting his limited knowledge of the known mappings. Similarly, for an index , we define its feature vector over as follows: where represents the absolute difference between and . As we know, there are null value segments in the POIs’ indexes , and the clustering and distancepreserving performance of SHC is superior. Thus, the attacker should not compute the absolute difference for each index . For index , the attacker will only compute the absolute difference for the indexes close to and these indexes should be continuous. These indexes constitute a subset of , denoted as , which varies with . So the feature vector of index should be revised as follows: where represents a subset of , and . For a location in the original spatial domain, its feature vector is where represents a subset of , and this subset is corresponding with . By choosing the candidate location and then comparing the coherent pattern of feature vectors and , the attacker can identify the original location of index with low estimation error. For the direct comparison, the feature vectors should be normalized by their magnitudes, and we use dissimilarity [4] to measure the difference between and as follows: where is the Manhattan distance. So the attacker can estimate the original location of index as , which is the candidate location with the smallest dissimilarity value,
Obviously, the computation of results in an infinite number of candidate locations in the original spatial domain. We assume the attacker employs a randomized numerical method to obtain an approximation of within acceptable time. By estimating each index , the attacker can obtain an estimated dataset ,
In Section 5, we empirically study the security level of SHC, SHC^{∗}, and DSC by applying the above modified general attack model.
5. Evaluation Results
We evaluate the performance and security of SHC, SHC^{∗}, and DSC using four real spatial datasets [32]: North East USA (NE: 123, 593 POIs), San Joaquin County (TG: 18, 263 POIs), San Francisco (SF: 174, 956 POIs), and North America (NA: 175, 813 POIs). These datasets match well the private spatial data outsourcing mentioned in Section 1. The domain of each dataset is normalized to the unit square and the experiments are carried out on Intel i52400 3.1 Ghz with 8 GB RAM. The start point, curve orientation, and curve scale factor are preset to , D1, and 1, respectively.
5.1. Parameter Selection
When applying SHC or DSC to transform the spatial domain, each partitioned region will be allocated with a value. POI is assigned the same value as the partitioned region that it belongs to, and this value can be employed to build index of the POI set. When two POIs are in the same partitioned region, they will be assigned the same value. Let represent the average number of POIs with the same index value; using SHC and DSC for indexing POIs, we measure for each value of and in all datasets. Ideally we want to be infinitely close to 1, meaning that there are not two POIs with the same index value.
SHC^{∗} has the same as SHC, so we only study the relationship between curve parameters and for SHC and DSC to guarantee that the following experiments are conducted under the same conditions. Figure 5 shows the of SHC for different curve order . The of SHC drops drastically as curve order increases. When , approaches 1 in NE, TG, and SF, but NA needs . Figure 6 depicts the of DSC for different capacity . The of DSC rises slowly as capacity increases. When , . So we apply this setting to SHC (SHC^{∗} applies the same setting as SHC) and DSC in the remaining experiments.
As a user parameter, the max gap for SHC^{∗} could take any value. We study the relationship between indistinguishability and for SHC^{∗} and find out that the indistinguishability of SHC^{∗} remains steady when and drops when . For the sake of discussion in this paper, we set in the following experiments, which effectively compress the null value segments and reduce the computation overhead.
5.2. Index Generation Comparison
The computation cost of index generation is an important metric for evaluating the spatial transformation methods. We set for SHC, SHC^{∗}, and DSC and compare their efficiency of generating index in different datasets. EDHO [33] and BIA [34] are index generation algorithms for SHC, while IGD proposed in this paper is the index generation algorithm for DSC. Because SHC^{∗} starts executing after EDHO or BIA, we use SHC^{∗}E and SHC^{∗}B to denote the different sequences of execution, respectively. The experiment is performed for 100 times and the index generation time (ms) is averaged.
Table 1 shows the index generation time of SHC, SHC^{∗}, and DSC over different datasets. BIA generates index faster than EDHO, and SHC^{∗}B is faster than SHC^{∗}E, but they are all slower than IGD. Because SHC^{∗}E is consist of EDHO and SHC^{∗}, it takes a little more time than EDHO. And the explanation for the result of SHC^{∗}B is similar with SHC^{∗}E. On average, the time cost by IGD is only 49.2%, 64.5% of that by EDHO and BIA, respectively. Sine DSC takes the distribution of POI dataset into consideration and chooses different curve orders in regions with different density, which enables sparse POI regions to use relatively low curve order and thus improves the computation efficiency.

5.3. Indistinguishability Comparison
We apply the parameter setting in Section 5.1 and calculate the indistinguishability of these spatial transformation methods when building POIs’ indexes. Because only index values corresponding to POIs are used as POIs’ indexes, which are continuous segments, we could sequentially scan the POIs’ indexes and find out the gaps between the continuous segments, and these gaps are null value segments. Table 2 shows the indistinguishability of SHC, SHC^{∗}, and DSC for different datasets.

The indistinguishability of SHC^{∗} and DSC is significantly higher than that of SHC in all datasets. On average, SHC^{∗} and DSC are 68.4% and 64.9% higher than SHC, respectively. It implies that SHC^{∗} and DSC can maintain a very low privacy disclosure risk. By analyzing the characteristics of these spatial transformation methods, we can learn that, when SHC builds index on real spatial dataset, there will be a large amount of null value segments, and the average length of the continuous segments is quite different from that of null value segments. While DSC partitions the spatial domain according to the density, the number and length of null value segments will be far less than those of SHC, and the null value segments and continuous segments distribute equilibrium, making indistinguishability of DSC greatly larger than that of SHC.
In order to compare the distributions of null value segments and continuous segments when employing different spatial transformation methods, we illustrate the POIs’ indexes built by SHC, SHC^{∗}, and DSC in Figure 7, where (a.1), (b.1), (c.1), and (d.1) denote the NE, TG, SF, and NA datasets, respectively. And 2, 3, and 4 represent POIs’ indexes built by SHC, SHC^{∗}, and DSC, respectively. As described in Section 3.2, the black lines of the histogram represent the continuous segments and the gray parts denote the null value segments. We can see that the length of the gray parts decreases dramatically after applying Algorithm 1 to modify the POI’s indexes built by SHC. Because SHC^{∗} compresses null value segments, the total length of null value segments is far less than SHC, and the distribution of null value segments and continuous segments is much more equilibrium than SHC, which makes indistinguishability of SHC^{∗} much larger than that of SHC, leading to lower privacy disclosure risk. From this figure, we also find out that the distributions of the POIs’ indexes built by SHC^{∗} and DSC are similar, and that is why the indistinguishability of SHC^{∗} is similar to that of DSC.
5.4. Attacks against SHC, SHC^{∗}, and DSC
We apply the parameter setting in Section 5.1 and set the ratio of known set to 1% based on the assumption that the attackers obtain limited background knowledge and the number of neighbor reference POIs to 15 which is the best value for POI estimation in our experiments. The attack method described in Section 4 is applied to reconstruct the original datasets.
Figure 8 depicts the estimated datasets reconstructed by the attack method over the POIs’ indexes generated by SHC, SHC^{∗}, and DSC, where a, b, c, and d denote the NE, TG, SF, and NA datasets, respectively, while 1, 2, 3, and 4 represent the original datasets, the estimated datasets over SHC, the estimated datasets over SHC^{∗}, and the estimated datasets over DSC, respectively. From Figure 8, we can easily find out that the POIs’ indexes generated by SHC^{∗} and DSC are more difficult to attack, because the estimated datasets are less similar to the original datasets. On the contrary, the estimated datasets reconstructed over the indexes built by SHC retain more details. It means that SHC^{∗} and DSC are more secure than SHC.
For further analysis, we calculate the estimation distortion of SHC, SHC^{∗}, and DSC, and Table 3 shows the estimation distortion of SHC, SHC^{∗}, and DSC for all datasets.

Because the estimation distortion represents the average error between the original and estimated datasets, larger metric value means more secure method. In Table 3, we can see that the estimation distortion of SHC is smaller than that of SHC^{∗} and DSC, and the estimation distortion of DSC is slightly smaller than that of SHC^{∗}. It means that SHC^{∗} and DSC are more secure than SHC. As the clustering and distancepreserving performance of SHC is superior, the estimated datasets are more close to the original datasets, and the estimation distortion value is smaller. SHC^{∗} and DSC compress the null value segments, the distancepreserving property is somewhat violated, and malicious SP cannot speculate the location distribution of the original datasets by simply analyzing the POIs indexes, so SHC^{∗} and DSC are more secure.
6. Conclusion
In this paper, we propose SHC^{∗} and DSC for the index generation of outsourced spatial data and propose the indistinguishability for measuring the privacy disclosure risk of spatial transformation methods. The attack model is also defined, in the experiments, the estimated datasets are visualized for explicitly studying, and the estimation distortion shows that SHC^{∗} and DSC are more secure than SHC. The proposed methods can partially violate the distancepreserving property of SHC, so as to achieve better security. The index generation time shows that DSC is more efficient than SHC and SHC^{∗}, so DSC achieves good security and efficiency performance. In the future, we will further conduct the security analysis of more spatial transformation methods and propose more effective metrics for the quantification of security.
Appendix
Figures 9 and 10 show the different space partitions over dataset TG of SHC and DSC, respectively. The blue line represents the space filling curves. We can see that SHC partitions the spatial domain using the unified granularity, while DSC partitions the spatial domain according to the density of POIs. For convenience of observation, we set for SHC and set for DSC.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work was supported in part by NSFC under Grant no. 61172090, Research Fund for the Doctoral Program of Higher Education of China under Grant no. 20120201110013, Scientific and Technological Project in Shaanxi Province under Grant nos. 2012 K0630 and 2014JQ8322, Basic Science Research Fund in Xi’an Jiaotong University (nos. XJJ2014049 and XKJC2014008), and Shaanxi Science and Technology Innovation Project (2013SZS16Z01/P01/K01). The authors also gratefully acknowledge the helpful suggestions of the reviewers.
References
 J. An, X. Gui, W. Zhang, J. Jiang, and J. Yang, “Research on social relations cognitive model of mobile nodes in Internet of Things,” Journal of Network and Computer Applications, vol. 36, no. 2, pp. 799–810, 2013. View at: Publisher Site  Google Scholar
 L. Hu, W. Ku, S. Bakiras, and C. Shahabi, “Spatial query integrity with voronoi neighbors,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 4, pp. 863–876, 2013. View at: Publisher Site  Google Scholar
 W. S. Ku, L. Hu, C. Shahabi, and H. X. Wang, “Query integrity assurance of locationbased services accessing outsourced spatial databases,” in Proceedings of the 11th International Symposium on Spatial and Temporal Databases, pp. 80–97, Aalborg, Denmark, 2009. View at: Google Scholar
 M. L. Yiu, G. Ghinita, C. S. Jensen, and P. Kalnis, “Enabling search services on outsourced private spatial data,” The VLDB Journal, vol. 19, no. 3, pp. 363–384, 2010. View at: Publisher Site  Google Scholar
 R. Huang, X. Gui, S. Yu, and W. Zhuang, “Privacypreserving computable encryption scheme of Cloud Computing,” Chinese Journal of Computers, vol. 34, no. 12, pp. 2391–2402, 2011. View at: Publisher Site  Google Scholar
 P. Indyk and D. Woodruff, “Polylogarithmic private approximations and efficient matching,” in Proceedings of the 3rd Theory of Cryptography Conference, pp. 245–264, New York, NY, USA, 2006. View at: Google Scholar
 B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, “Private information retrieval,” Journal of the ACM, vol. 45, no. 6, pp. 965–982, 1998. View at: Publisher Site  Google Scholar  MathSciNet
 W. Ni, J. Zheng, and Z. Chong, “HilAnchor: location privacy protection in the presence of users' preferences,” Journal of Computer Science and Technology, vol. 27, no. 2, pp. 413–427, 2012. View at: Publisher Site  Google Scholar
 A. Khoshgozaran, H. ShiraniMehr, and C. Shahabi, “Blind evaluation of location based queries using space transformation to preserve location privacy,” GeoInformatica, vol. 17, no. 4, pp. 599–634, 2013. View at: Publisher Site  Google Scholar
 W. S. Ku, L. Hu, C. Shahabi, and H. X. Wang, “A query integrity assurance scheme for accessing outsourced spatial databases,” Geoinformatica, vol. 17, no. 1, pp. 97–124, 2013. View at: Publisher Site  Google Scholar
 B. Moon, H. V. Jagadish, C. Faloutsos, and J. H. Saltz, “Analysis of the clustering properties of the Hilbert spacefilling curve,” IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 1, pp. 124–141, 2001. View at: Publisher Site  Google Scholar
 A. Khoshgozaran and C. Shahabi, “Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy,” in Proceedings of the 10th International Symposium on Spatial and Temporal Databases, pp. 239–257, Boston, Mass, USA, 2007. View at: Google Scholar
 P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing locationbased identity inference in anonymous spatial queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719–1733, 2007. View at: Publisher Site  Google Scholar
 L. Sweeney, “$k$anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, vol. 10, no. 5, pp. 557–570, 2002. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 M. Gruteser and D. Grunwald, “Anonymous usage of locationbased services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Application, and Services, pp. 31–42, San Francisco, Calif, USA, 2003. View at: Google Scholar
 B. Gedik and L. Liu, “Protecting location privacy with personalized kanonymity: architecture and algorithms,” IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1–18, 2008. View at: Publisher Site  Google Scholar
 B. Bamba, L. Liu, P. Pesti, and T. Wang, “Supporting anonymous location queries in mobile environments with privacygrid,” in Proceedings of the 17th International Conference on World Wide Web (WWW '08), pp. 237–246, Beijing, China, April 2008. View at: Publisher Site  Google Scholar
 A. Deutsch, R. Hull, A. Vyas, and K. K. Zhao, “Policyaware sender anonymity in location based services,” in Proceedings of the 26th IEEE International Conference on Data Engineering (ICDE '10), pp. 133–144, Long Beach, Calif, USA, March 2010. View at: Publisher Site  Google Scholar
 X. Pan, J. L. Xu, and X. F. Meng, “Protecting location privacy against locationdependent attacks in mobile services,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 8, pp. 1506–1519, 2012. View at: Publisher Site  Google Scholar
 A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 46–55, 2003. View at: Publisher Site  Google Scholar
 B. Palanisamy and L. Liu, “MobiMix: protecting location privacy with mixzones over road networks,” in Proceedings of the IEEE 27th International Conference on Data Engineering, pp. 494–505, Hannover, Germany, April 2011. View at: Publisher Site  Google Scholar
 H. Hacigümüs, B. Iyer, and S. Mehrotra, “Providing database as a service,” in Proceedings of the 18th International Conference on Data Engineering, pp. 29–38, San Jose, Calif, USA, 2002. View at: Google Scholar
 H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over encrypted data in the databaseserviceprovider model,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '02), pp. 216–227, Madison, Wis, USA, June 2002. View at: Publisher Site  Google Scholar
 R. Agrawal, J. Kiernan, R. Srikant, and Y. R. Xu, “Order preserving encryption for numeric data,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '04), pp. 563–574, ACM, Paris, France, June 2004. View at: Google Scholar
 R. W. Huang, X. L. Gui, S. Yu, and W. Zhuang, “Study of privacypreserving framework for cloud storage,” Computer Science and Information Systems, vol. 8, no. 3, pp. 801–819, 2011. View at: Google Scholar
 W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, “Secure kNN computation on encrypted databases,” in Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMODPODS '09), pp. 139–152, Providence, RI, USA, July 2009. View at: Publisher Site  Google Scholar
 H. Sagan, SpaceFilling Curves, Springer, Berlin, Germany, 1994. View at: Publisher Site  MathSciNet
 J. A. Orenstein, “Spatial query processing in an objectoriented database system,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 326–336, Washington, DC, USA, 1986. View at: Google Scholar
 H. V. Jagadish, “Linear clustering of objects with multiple attributes,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 332–342, Atlantic City, NJ, USA, May 1990. View at: Google Scholar
 J. K. Lawder and P. J. H. King, “Querying multidimensional data indexed using the Hilbert spacefilling curve,” SIGMOD Record, vol. 30, no. 1, pp. 19–24, 2001. View at: Google Scholar
 H. Samet, “The quadtree and related hierarchical data structures,” ACM Computing Surveys, vol. 16, no. 2, pp. 187–260, 1984. View at: Google Scholar  MathSciNet
 “Real Datasets for Spatial Databases: Road Networks and Points of Interest [EB/OL],” http://www.cs.utah.edu/~lifeifei/SpatialDataset.htm. View at: Google Scholar
 X. Liu and G. Schrack, “Encoding and decoding the Hilbert order,” Software: Practice and Experience, vol. 26, no. 12, pp. 1335–1346, 1996. View at: Google Scholar
 C. Faloutsos and S. Roseman, “Fractals for secondary key retrieval,” in Proceedings of the 8ht ACM SIGACTSIGMODSIGART Symposium on Principles of Database Systems, pp. 247–252, Philadelphia, Pa, USA, March 1989. View at: Google Scholar
Copyright
Copyright © 2014 Feng Tian et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.