Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 751845, 7 pages
http://dx.doi.org/10.1155/2014/751845
Research Article

Privacy-Preserving Location-Based Query Using Location Indexes and Parallel Searching in Distributed Networks

School of Computer and Electronics and Information, Guangxi University, Nanning, Guangxi 530004, China

Received 5 January 2014; Accepted 26 February 2014; Published 25 March 2014

Academic Editors: T. Cao, M. Ivanovic, and F. Yu

Copyright © 2014 Cheng Zhong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. P. Baugh and J. Guo, “Location privacy in mobile computing environments,” in Ubiquitous Intelligence and Computing, J. Ma, H. Jin, L. T. Yang, and J. J. P. Tsai, Eds., vol. 4159 of Lecture Notes in Computer Science, pp. 936–945, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  2. A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 46–55, 2003. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Pfitamann and M. Köhntopp, “Anonymity, unobservability, and pseudonymity—a proposal for terminology,” in Designing Privacy Enhancing Technologies, vol. 2009 of Lecture Notes in Computer Science, pp. 1–9, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar
  4. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, pp. 31–42, San Francisco, Calif, USA, May 2003.
  5. H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in Proceedings of the 2nd International Conference on Pervasive Services (ICPS '05), pp. 88–97, Santorini, Greece, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. B. Gedik and L. Liu, “Protecting location privacy with personalized k-anonymity: architecture and algorithms,” IEEE Transactions on Mobile Computing, vol. 27, no. 1, pp. 1–18, 2008. View at Google Scholar
  7. C.-Y. Chow, M. F. Mokbel, and X. Liu, “A peer-to-peer spatial cloaking algorithm for anonymous location-based service,” in Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (ACM-GIS '06), pp. 171–178, Arlington, Va, USA, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Ghinita, P. Kalnis, and S. Skiadopoulos, “PRIVE: anonymous location-based queries in distributed mobile systems,” in Proceedings of the 16th International World Wide Web Conference (WWW '07), pp. 371–380, Banff, Canada, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. G. Ghinita, P. Kalnis, and S. Skiadopoulos, “MobiHide: a mobilea peer-to-peer system for anonymous location-based queries,” in Advances in Spatial and Temporal Databases, vol. 4605 of Lecture Notes in Computer Science, pp. 221–238, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  10. G. Zhong and U. Hengartner, “A distributed k-anonymity protocol for location privacy,” in Proceedings of the 7th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom '09), pp. 1–10, Galveston, Tex, USA, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Proceedings of the 3rd International Conference on Pervasive Computing, pp. 152–170, Munich, Germany, May 2005. View at Scopus
  12. M. F. Mokbel, “Towards privacy-aware location- based database servers,” in Proceedings of the of 22nd International Conference on Data Engineering Workshops, p. 93, Atlanta, Ga, USA, April 2006. View at Publisher · View at Google Scholar
  13. M. F. Mokbel, C. Y. Chow, and W. G. Aref, “The new casper: query processing for location services without compromising privacy,” in Proceedings of the of the 32nd International Conference on Very Large Data Bases, pp. 763–774, Seoul, Republic of Korea, September 2006.
  14. A. Khoshgozaran and C. Shahabi, “Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy,” in Advances in Spatial and Temporal Databases, vol. 4605 of Lecture Notes in Computer Science, pp. 239–257, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  15. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: anonymizers are not necessary,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 121–132, Vancouver, Canada, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. R. D. Pietro and A. Viejo, “Location privacy and resilience in wireless sensor networks querying,” Computer Communications, vol. 34, no. 3, pp. 515–523, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Raj, N. Li, D. Liu, M. Wright, and S. K. Das, “Using data mules to preserve source location privacy in Wireless Sensor Networks,” Pervasive and Mobile Computing, 2012. View at Publisher · View at Google Scholar
  18. B. Zhao, D. Wang, Z. Shao, J. Cao, and J. Su, “Privacy aware publishing of successive location information in sensor networks,” Future Generation Computer Systems, vol. 28, no. 6, pp. 913–922, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Pingley, W. Yu, N. Zhang, X. Fu, and W. Zhao, “A context-aware scheme for privacy-preserving location-based services,” Computer Networks, vol. 56, no. 11, pp. 2551–2568, 2012. View at Google Scholar
  20. Z. Tan, “A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments,” Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1839–1846, 2012. View at Google Scholar
  21. Y. Xi, L. Schwiebert, and W. Shi, “Privacy preserving shortest path routing with an application to navigation,” Pervasive and Mobile Computing, 2013. View at Publisher · View at Google Scholar
  22. R. Chen, B. C. M. Fung, N. Mohammed, B. C. Desai, and K. Wang, “Privacy-preserving trajectory data publishing by local suppression,” Information Sciences, vol. 231, no. 1, pp. 83–97, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. W. J. Buchanan, Z. Kwecka, and E. Ekonomou, “A privacy preserving method using privacy enhancing techniques for location based services,” Mobile Networks and Applications, vol. 18, no. 5, pp. 728–737, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. A. E. Cicek, M. E. Nergiz, and Y. Saygin, “Ensuring location diversity in privacy-preserving spatio-temporal data publishing,” The VLDB Journal, 2013. View at Publisher · View at Google Scholar
  25. X. Y. Li and T. Jung, “Search me if you can: privacy- preserving location query service,” in Proceedings of the 32nd IEEE International Conference on Computer Communications (IEEE INFOCOM '13), pp. 2760–2768, Turin, Italy, April 2013.
  26. R. Dewri and R. Thurimella, “Exploiting service similarity for privacy in location-based search queries,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 374–383.