Browse > Article
http://dx.doi.org/10.9708/jksci.2013.18.3.047

Grid-based Semantic Cloaking Method for Continuous Moving Object Anonymization  

Zhang, Xu (Dept. of Computer and Information Engineering, Inha University)
Shin, Soong-Sun (Dept. of Computer and Information Engineering, Inha University)
Kim, Gyoung-Bae (Dept. of Computer Education, Seown University)
Bae, Hae-Young (Dept. of Computer and Information Engineering, Inha University)
Abstract
Location privacy has been a serious concern for mobile users who use location-based services to acquire geographical location continuously. Spatial cloaking technique is a well-known privacy preserving method, which blurs an exact user location into a cloaked area to meet privacy requirements. However, cloaking for continuous moving object suffers from cloaked area size problem as it is unlikely for all objects travel in the same direction. In this paper, we propose a grid-based privacy preservation method with an improved Earth Mover's Distance(EMD) metric weight update scheme for semantic cloaking. We also define a representative cloaking area which protects continuous location privacy for moving users. Experimental implementation and evaluation exhibit that our proposed method renders good efficiency and scalability in cloaking processing time and area size control. We also show that our proposed method outperforms the existing method by successfully protects location privacy of continuous moving objects against various adversaries.
Keywords
Location Privacy; Continuous Moving Object Anonymization; Semantic Cloaking; Location Based Service;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 C.Y. Chow, and M.F. Mokbel, "Trajectory Privacy in Location-based Services and Data Publication," ACM SIGKDD Explorations Newsletter, Vol. 13, No. 1, pp. 19-29, 2011.   DOI
2 A. Pingley, W. Yu, N. Zhang, X.W. Fu, and W. Zhao, "Cap: A Context-Aware Privacy Protection System for Location-Based Services," IEEE ICDCS, pp. 49-57, June 2009.
3 K.G. Shin, X.E. Ju, Z.G. Chen, and X. Hu, "Privacy Protection for Users of Location-Based Services," IEEE Wireless Communication, Vol. 19, no. 1, pp. 30-39, February, 2012.
4 B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid," Proc. Int'l Conf. World Wide Web (WWW), pp. 237-246, 2008.
5 B.Y. Lee, J.O. Oh, H.J. Yu, and J. Kim, "Protecting Location Privacy Using Location Semantics", Proc. Int'l. Conf. Knowledge Discovery and Data Mining (KDD), pp. 1289-1297, 2011.
6 C.Y. Chow, M.F. Mokbel, and X. Liu, "Spatial Cloaking for Anonymous Location-based Services in Mobile Peer-to-Peer Environments," Vol. 15, No. 2, pp. 351-380, 2012.
7 H.I. Kim, Y.S. Shin, and J.W. Chang, "A Grid-based Cloaking Scheme for Continuous Queries in Distributed Systems," Proc. Int'l. Conf. Computer and Information Technology, pp. 75-82, 2011.
8 X. Pan, J.L. Xu, and X.F. Meng, "Protecting Location Privacy against Location-Dependent Attacks in Mobile Services," IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 8, pp. 1506-1519, 2012.   DOI   ScienceOn
9 H.J. Lee, B.S. Oh, H.I. Kim, and J.W. Chang, "Grid-based Cloaking Area Creation Scheme Supporting Continuous Location-based Services," Proc. Int'l. Conf. Applied Computing, pp. 537-543, 2012.
10 M.F. Mokbel, C.Y. Chow, and W.G. Aref, "The New Casper: Query procesing for location services without compromising privacy," Proc. Int'l. Conf. Very Large Databases (VLDB), pp. 763-774, 2006.
11 B. Gedik, and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms," IEEE Transactions on Mobile Computing , Vol. 7, No. 1, pp. 1-18, 2008.   DOI   ScienceOn
12 T. Xu, and Y. Cai, "Exploring Historical Location Data for Anonymity Preservation in Location-based Services," Proc. Int'l. Conf. Computer Communications (INFOCOM), pp. 547-555, 2008.
13 G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems," Proc. Int'l. Conf. World Wide Web, pp. 371-380, 2007.
14 T. Xu, and Y. Cai, "Location Anonymity in Continuous Location-based Services," Proc. Int'l. Conf. on Advances in Geographic Information Systems, pp. 221-238, 2007.
15 G. Ghinita1, P. Kalnis, and S. Skiadopoulos, "MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-based Queries," Proc. Int'l. Conf. Advances in Spatial and Temporal Databases, pp. 221-238, 2007.
16 C. Chow, and M.F. Mokbel, "Enabling Private Continuous Queries for Revealed User Locations," Proc. Int'l. Conf. Advances in Spatial and Temporal Databases, pp. 258-273, 2007.
17 X. Pan, X.F. Meng, and J. Xu, "Distortion-based Anonymity for Continuous Queries in Location-based Mobile Services," Proc. Int'l. Conf. ACM SIGSPATIAL on Advances in Geographic Information Systems, 2009.
18 Thomas Brinkhoff Network-Based Generator of Moving Objects, http://www.fh-oow.de/institute/iapg/personen/brinkhoff/generator/, 2008.
19 T. Takahashi, and S. Miyakawa, "CMOA: Continuous Moving Object Anonymization," Proc. Int'l. Conf. Database Engineering & Applications, pp. 81-90, 2012.
20 G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.L. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. Int'l. Conf. Management of Data (SIGMOD), pp. 121-132, 2008.
21 Y.L. Wang, H. Zhou, Y.J. Wu, and L. Sun, "Preserving Location Privacy for Location-based Services with Continuous Queries on Road Network," Proc. Int'l. Conf. Computer Science & Education, pp. 822-827, 2012.
22 T.G. Kim, S.S. Shin, W.I. Chung, and H.Y. Bae, "Effective Indexing of Moving Objects for Current Position Management in Road Networks," Journal of the Korea Society of Computer and Information, Vol. 16, No. 10, pp. 33-43, 2011.   과학기술학회마을   DOI   ScienceOn
23 S.S. Shin, G.B. Kim, and H.Y. Bae, "FingerPrint Building Method Using Splite-tree based on Indoor Environment," Journal of the Korea Society of Computer and Information, Vol. 17, No. 6, pp. 173-182, 2012.   과학기술학회마을   DOI   ScienceOn