Browse > Article
http://dx.doi.org/10.3837/tiis.2019.09.024

A Trajectory Substitution Privacy Protection Scheme in location-based services  

Song, Cheng (School of Computer Science and Technology, Henan Polytechnic University)
Zhang, Yadong (School of Computer Science and Technology, Henan Polytechnic University)
Gu, Xinan (School of Computer Science and Technology, Henan Polytechnic University)
Wang, Lei (School of Computer Science and Technology, Henan Polytechnic University)
Liu, Zhizhong (School of Computer Science and Technology, Henan Polytechnic University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.9, 2019 , pp. 4771-4787 More about this Journal
Abstract
Aimed at the disclosure risk of mobile terminal user's location privacy in location-based services, a location-privacy protection scheme based on similar trajectory substitution is proposed. On the basis of the anonymized identities of users and candidates who request LBS, this scheme adopts trajectory similarity function to select the candidate whose trajectory is the most similar to user's at certain time intervals, then the selected candidate substitutes user to send LBS request, so as to protect user's privacy like identity, query and trajectory. Security analyses prove that this scheme is able to guarantee such security features as anonymity, non-forgeability, resistance to continuous query tracing attack and wiretapping attack. And the results of simulation experiment demonstrate that this scheme remarkably improve the optimal candidate' trajectory similarity and selection efficiency.
Keywords
similar trajectory; privacy protection; query substitution; LBS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. He, "Research on LBS privacy protection technology in mobile social networks," in Proc. of IEEE Advanced Information Technology, Electronic and Automation Control Conference, IEEE, pp.73-76, 2017.
2 H. Huang, "Progress in Location-Based Services 2014," Lecture Notes in Geoinformation & Cartography, vol. 46, no. 6, pp. 0463, 2016.
3 Ben Niu, Xiaoyan Zhu and Haotian Chi, "3PLUS: Privacy-preserving pseudo-location updating system in location-based services," in Proc. of Wireless Communications & Networking Conference IEEE, 2013.
4 Rui Chen, Benjamin C.M. Fung and Noman Mohammed, "Privacy-preserving trajectory data publishing by local suppression," Information Sciences, vol. 231, no. 1, pp. 83-97, 2013.   DOI
5 Zhao J, Zhang Y and Li Xing Hua, "A Trajectory Privacy Protection Approach via Trajectory Frequency Suppression," Chinese Journal of Computers, vol. 37, no. 10, pp. 2096-2106, 2014.   DOI
6 LI Feng-hua, Zhang Cui and Niiu Ben, "Efficient trajectory privacy protection scheme," Journal on Communications, vol. 36, no. 12, pp. 114-123, 2015.   DOI
7 Ye Ayong , Y Li and L Xu, "A novel location privacy-preserving scheme based on l-queries for continuous LBS," Computer Communications, vol. 98, pp. 1-10, 2016.   DOI
8 Sun Gang, Liao, Dan and Li Hui, "L2P2: A location-label based approach for privacy preserving in LBS," Future Generation Computer Systems, vol.74, pp.375-384, 2017.   DOI
9 X.H. Li, M.X. Miao and H. Liu, "An incentive mechanism for K -anonymity in LBS privacy protection based on credit mechanism," Soft Computing, vol. 21, no. 14, pp. 3907-3917, January 2017.   DOI
10 T. Lam and K. Rietsch, "Total positivity, Schubert positivity, and geometric Satake," Journal of Algebra, vol.460, pp.284-319, 2016.   DOI
11 Yanming.Suna , Min.Chena and L.Hu, "ASA: Against statistical attacks for privacy-aware users in Location Based Service," Future Generation Computer Systems, vol. 70, pp. 48-58, 2017.   DOI
12 Ju X and Shin K G , "Location Privacy Protection for Smartphone Users Using Quad tree Entropy Maps," Journal of Information Privacy & Security, vol. 11, no. 2, pp. 62-79, 2015.   DOI
13 Naghizade E , Bailey J and Kulik L, "How private can i be among public users," Acm International Joint Conference on Pervasive & Ubiquitous Computing, ACM, pp. 1137-1141, 2015.
14 Zhang Yuan , Q. Chen and S. Zhong, "Privacy-preserving Data Aggregation in Mobile Phone Sensing," IEEE Transactions on Information Forensics and Security, vol.11, no. 5, pp. 980-992, 2016.   DOI
15 Wang H, Li FH and Niu B, "Advances in location privacy protection technology," Journal on Communications, vol. 37, no. 12, pp. 124-141, 2016.
16 Lee, Ken C. K., "Efficient Index-Based Approaches for Skyline Queries in Location-Based Applications," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 11, pp. 2507-2520, 2013.   DOI
17 Pan Xiao , X Meng and J Xu, "Distortion based Anonymity for Continuous Queries in Location Based Mobile Services," in Proc. of Acm Sigspatial International Symposium on Advances in Geographic Information Systems DBLP, pp. 256-265, 2009.
18 Freudiger Julien , R Shokri , and J. P. Hubaux, "On the Optimal Placement of Mix Zones," Lecture Notes in Computer Science, vol. 5672, pp.216-234, 2009.
19 Kato, R, Iwata, M and Hara, T, "A dummy-based anonymization method based on user trajectory with pauses," in Proc. of International Conference on Advances in Geographic Information Systems , pp. 249-258, 2012.
20 Zheng Huo, "PrivateCheckIn:Trajectory Privacy-Preserving for Check-In Services in MSNS," Chinese Journal of Computers, vol.36, no. 4, pp.716-726, 2013.   DOI