Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 7391982, 15 pages
https://doi.org/10.1155/2017/7391982
Research Article

Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location-Based Service Queries

1Department of Information and Telecommunications Engineering, Ming Chuan University, Taoyuan, Taiwan
2Department of Information and Computer Engineering, Chung Yuan Christian University, Taoyuan, Taiwan

Correspondence should be addressed to Ming-Hour Yang; wt.ude.ucyc@gnayhm

Received 9 February 2017; Revised 6 July 2017; Accepted 10 August 2017; Published 28 September 2017

Academic Editor: Christos Goumopoulos

Copyright © 2017 Jia-Ning Luo and Ming-Hour Yang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C.-Y. Chow, M. F. Mokbel, and X. Liu, “A peer-to-peer spatial cloaking algorithm for anonymous location-based service,” in Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (ACM-GIS '06), pp. 171–178, ACM, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. C.-Y. Chow, M. F. Mokbel, and X. Liu, “Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments,” GeoInformatica, vol. 15, no. 2, pp. 351–380, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. B. Niu, X. Zhu, Q. Li, J. Chen, and H. Li, “A novel attack to spatial cloaking schemes in location-based services,” Future Generation Computer Systems, vol. 49, pp. 125–132, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Pfitzmann and M. Köhntopp, “Anonymity, unobservability, and pseudonymity—a proposal for terminology,” in Proceedings of International Workshop on Design Issues in Anonymity and Unobservability Berkeley, vol. 2009, pp. 1–9, Springer, Berlin, Germany. View at Publisher · View at Google Scholar
  5. T. Rodden, A. Friday, H. Muller, and A. Dix, “A lightweight approach to managing privacy in location-based services,” Technical Report Equator-02-058, University of Nottingham, Lancaster University, University of Bristol, 2002. View at Google Scholar
  6. C. A. Ardagna, M. Cremonini, S. De Capitani Di Vimercati, and P. Samarati, “An obfuscation-based approach for protecting location privacy,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 13–27, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. M. L. Damiani, E. Bertino, and C. Silvestri, “Protecting location privacy against spatial inferences: the PROBE approach,” in in Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, pp. 32–41, 2009.
  8. M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Proceedings of International Conference of Pervasive Computing, pp. 152–170, May 2005. View at Scopus
  9. D. C. Howe and H. Nissenbaum, “TrackMeNot: resisting surveillance in web search,” in Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, pp. 417–436, 2009. View at Google Scholar
  10. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719–1733, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. J.-H. Um, H.-D. Kim, and J.-W. Chang, “An advanced cloaking algorithm using Hilbert curves for anonymous location based service,” in Proceedings of the 2nd International Conference on Social Computing, pp. 1093–1098, Minneapolis, MN, USA, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. C. Zhang and Y. Huang, “Cloaking locations for anonymous location based services: a hybrid approach,” GeoInformatica, vol. 13, no. 2, pp. 159–182, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. C.-P. Wu, C.-C. Huang, J.-L. Huang, and C.-L. Hu, “On preserving location privacy in mobile environments,” in Proceedings of the 2011 9th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011, pp. 490–495, Seattle, WA, USA, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. T. Xu and Y. Cai, “Exploring historical location data for anonymity preservation in location-based services,” in Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM '08), pp. 547–555, IEEE, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. P. Shankar, V. Ganapathy, and L. Iftode, “Privately querying location-based services with sybilquery,” in Proceedings of the 11th ACM International Conference on Ubiquitous Computing, UbiComp'09, pp. 31–40, usa, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. B. Palanisamy and L. Liu, “MobiMix: protecting location privacy with mix-zones over road networks,” in Proceedings of the IEEE 27th International Conference on Data Engineering, pp. 494–505, Hannover, Germany, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. K.-T. Yang, G.-M. Chiu, H.-J. Lyu, D.-J. Huang, and W.-C. Teng, “Path privacy protection in continuous location-based services over road networks,” in Proceedings of the IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '12), pp. 435–442, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. T.-H. You, W.-C. Peng, and W.-C. Lee, “Protecting moving trajectories with dummies,” in Proceedings of the 8th International Conference on Mobile Data Management (MDM '07), pp. 278–282, Mannheim, Germany, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Pingley, N. Zhang, and X. Fu, “Protection of query privacy for continuous location based services,” in Proceedings of the INFOCOM, pp. 1710–1718, IEEE, Shanghai, China, 2011. View at Publisher · View at Google Scholar
  20. C. Ardagna, G. Livraga, and P. Samarati, “Protecting privacy of user information in continuous location-based services,” in Proceedings of the IEEE 15th International Conference on Computational Science and Engineering (CSE '12), pp. 162–169, Nicosia, Cyprus, December 2012. View at Publisher · View at Google Scholar
  21. T. Xu and Y. Cai, “Location anonymity in continuous location-based services,” in Proceedings of the 15th ACM International Symposium on Advances in Geographic Information Systems (GIS '07), pp. 300–307, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. T. Wang and L. Liu, “Privacy-aware mobile services over road networks,” in in Proceedings of the VLDB Endowment, vol. 2, no. 1, pp. 1042–1053, 2009. View at Scopus
  23. H. Lee, B.-S. Oh, H.-I. Kim, and J. Chang, “Grid-based cloaking area creation scheme supporting continuous location-based services,” in Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC '12), pp. 537–543, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. D. Song, J. Sim, K. Park, and M. Song, “A privacy-preserving continuous location monitoring system for location-based services,” International Journal of Distributed Sensor Networks, vol. 11, no. 8, pp. 1–10, 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, “Enhancing privacy through caching in location-based services,” in Proceedings of the 34th IEEE Annual Conference on Computer Communications (IEEE INFOCOM '15), pp. 1017–1025, IEEE, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  26. S. Amini, J. Lindqvist, J. Hong, J. Lin, E. Toch, and N. Sadeh, “Caché: caching location-enhanced content to improve user privacy,” in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 197–210, ACM, 2011. View at Publisher · View at Google Scholar
  27. X. Zhu, H. Chi, B. Niu, W. Zhang, Z. Li, and H. Li, “MobiCache: When k-anonymity meets cache,” in Proceedings of the 2013 IEEE Global Communications Conference, GLOBECOM 2013, pp. 820–825, IEEE, Atlanta, GA, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. P. Berkhin, “A survey of clustering data mining techniques,” in Grouping Multidimensional Data, J. Kogan, C. Nicholas, and M. Teboulle, Eds., pp. 25–71, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  29. A. K. Jain and R. C. Dubes, Algorithms for Clustering Data, Prentice Hall, 1988. View at MathSciNet
  30. A. K. Jain, M. N. Murty, and P. J. Flynn, “Data clustering: a review,” ACM Computing Surveys (CSUR), vol. 31, no. 3, pp. 264–323, 1999. View at Publisher · View at Google Scholar · View at Scopus
  31. G. Karypis, E.-H. Han, and V. Kumar, “Chameleon: hierarchical clustering using dynamic modeling,” Computer, vol. 32, no. 8, pp. 68–75, 1999. View at Publisher · View at Google Scholar · View at Scopus
  32. R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, “Quantifying location privacy,” in Proceedings of the IEEE Symposium on Security and Privacy, SP 2011, pp. 247–262, Berkeley, Calif, USA, 2011. View at Publisher · View at Google Scholar · View at Scopus
  33. C.-Y. Chow and M. F. Mokbel, “Trajectory privacy in location-based services and data publication,” ACM SIGKDD Explorations Newsletter, vol. 13, no. 1, pp. 19–29, 2011. View at Publisher · View at Google Scholar
  34. E. Kaplan, T. B. Pedersen, E. Sava, and Y. Saygin, “Discovering private trajectories using background information,” Data and Knowledge Engineering, vol. 69, no. 7, pp. 723–736, 2010. View at Publisher · View at Google Scholar · View at Scopus
  35. T. N. Phan, T. K. Dang, and J. Küng, “User privacy protection from trajectory perspective in location-based applications,” in Proceedings of Interdisciplinary Information Management Talks, pp. 281–288, 2011.
  36. M. Wernke, P. Skvortsov, F. Dürr, and K. Rothermel, “A classification of location privacy attacks and approaches,” Personal and Ubiquitous Computing, vol. 18, no. 1, pp. 163–175, 2014. View at Publisher · View at Google Scholar · View at Scopus
  37. T. Brinkhoff, “Oldenburg: nodes & edges,” 2017, http://iapg.jade-hs.de/personen/brinkhoff/generator.