Browse > Article
http://dx.doi.org/10.3837/tiis.2022.05.013

Enhancing Location Privacy through P2P Network and Caching in Anonymizer  

Liu, Peiqian (College of Computer Science and Technology, Henan Polytechnic University)
Xie, Shangchen (College of Computer Science and Technology, Henan Polytechnic University)
Shen, Zihao (College of Computer Science and Technology, Henan Polytechnic University)
Wang, Hui (College of Computer Science and Technology, Henan Polytechnic University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.5, 2022 , pp. 1653-1670 More about this Journal
Abstract
The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.
Keywords
Caching Mechanism; Deep Reinforcement Learning; Location Privacy Protection; Location-Based Service; Peer-to-Peer Network;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 M. Xu, H. Zhao, X. Ji, and J. Shen, "Distribution-perceptive-based spatial cloaking algorithm for location privacy in mobile peer-to-peer enviroments," Journal of Software, vol. 29, no. 7, pp. 1852-1862, 2018.
2 H. Li, X. Xue, Z. Li, L. Li, and J. Xiong, "Location privacy protection scheme for LBS in IoT," Wireless Communications and Mobile Computing, vol. 2021, pp. 1-18, Aug. 2021.
3 A. A. A. Sen, S. K. A. Nazar, N. A. Osman, N. M. Bahbouh, H. F. Aloufi, and I. M. M. Alawfi, "A new technique for managing reputation of peers in the cooperation approach for privacy protection," in Proc. of 8th INDIACom, New Delhi, India, pp. 409-412, 2021.
4 M. U. Ashraf, K. M. Jambi, R. Qayyum, and H. Ejaz, "IDP: a privacy provisioning framework for TIP attributes in trusted third party-based location-based services systems," IJACSA, vol. 11, no. 7, 2020.
5 H. Jiang, J. Li, P. Zhao, F. Zeng, Z. Xiao, and A. Iyengar, "Location privacy-preserving mechanisms in location-based services: a comprehensive survey," ACM Comput. Surv., vol. 54, no. 1, pp. 1-36, Jan. 2022.
6 E. Kim, "In-store shopping with location-based retail apps: perceived value, consumer response, and the moderating effect of flow," Inf Technol Manag, vol. 22, no. 2, pp. 83-97, Jun. 2021.   DOI
7 C. Chow, M. F. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based service," in Proc. of 14th GIS, Arlington, Virginia, USA, p. 171-178, 2006.
8 W. Sui, Z. Liu, H. Lv, Z. Li, and W. Liu, "Random partition region for location privacy protection on edge computing," in Proc. of 8th CSCloud, Washington, DC, USA, pp. 155-160, Jun. 2021.
9 Z. Abubaker, N. Javaid, A. Almogren, M. Akbar, M. Zuair, and J. Ben-Othman, "Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks," Computer Networks, vol. 204, p. 108691, Feb. 2022.   DOI
10 H. Li, R. Lu, and M. M. E. A. Mahmoud, "Security and privacy of machine learning assisted P2P networks," Peer-to-Peer Netw. Appl., vol. 13, no. 6, pp. 2234-2236, Nov. 2020.   DOI
11 S. Zhang, X. Li, Z. Tan, T. Peng, and G. Wang, "A caching and spatial K -anonymity driven privacy enhancement scheme in continuous location-based services," Future Generation Computer Systems, vol. 94, pp. 40-50, May. 2019.   DOI
12 R. Gupta and U. P. Rao, "An exploration to location based service and its privacy preserving techniques: a survey," Wireless Pers Commun, vol. 96, no. 2, pp. 1973-2007, Sep. 2017.   DOI
13 M. Yamin and A. A. A. Sen, "Improving privacy and security of user data in location based services:," International Journal of Ambient Computing and Intelligence, vol. 9, no. 1, pp. 19-42, Jan. 2018.   DOI
14 Y. Cui, G. Fei, W. Li, Y. Shi, H. Zhang, Q. Wen, and E. Panaousis, "Cache-based privacy preserving solution for location and content protection in location-based services," Sensors, vol. 20, no. 16, p. 4651, Aug. 2020. .   DOI
15 N. Innab and S. Alaradi, "Ensuring privacy protection in location-based services through integration of cache and dummies," IJACSA, vol. 10, no. 2, 2019.
16 S. Zhang, K. K. R. Choo, Q. Liu, and G. Wang, "Enhancing privacy through uniform grid and caching in location-based services," Future Generation Computer Systems, vol. 86, pp. 881-892, Sep. 2018.   DOI
17 J. Dong, H. Wu, D. Zhou, K. Li, Y. Zhang, H. Ji, Z. Tong, S. Lou and Z. Liu, "Application of big data and artificial intelligence in COVID-19 prevention, diagnosis, treatment and management decisions in China," J Med Syst, vol. 45, no. 9, p. 84, Sep. 2021.   DOI
18 A. R. Naik and B. N. Keshavamurthy, "Next level peer-to-peer overlay networks under high churns: a survey," Peer-to-Peer Netw. Appl., vol. 13, no. 3, pp. 905-931, May. 2020.   DOI
19 D. Seng, J. Zhang, and X. Shi, "Visual analysis of deep q-network," KSII Transactions on Internet and Information Systems, vol. 15, no. 3, pp.853-873, Mar. 2021.
20 C. Zhong, M. C. Gursoy, and S. Velipasalar, "A deep reinforcement learning-based framework for content caching," in Proc. of 52nd CISS, Princeton, NJ, USA, pp. 1-6, Mar. 2018.
21 S. Amini, J. Lindqvist, J. I. Hong, M. Mou, R. Raheja, J. Lin, N. Sadeh, and E. Tochb, "Cache: caching location-enhanced content to improve user privacy," SIGMOBILE Mob. Comput. Commun. Rev., vol. 14, no. 3, pp. 19-21, July. 2010.
22 M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proc. of 1st MobiSys, applications and services, San Francisco, CA, USA, pp. 31-42, 2003.
23 R. Schollmeier, "A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications," in Proc. of 1st Peer-to-Peer Computing, Sweden, pp. 101-102, 2002.
24 Y. Zhang, Q. Zhang, Y. Yan, Y. Jiang, and M. Zhang, "A k-anonymous location privacy protection method of polygon based on density distribution," International Journal of Network Security, vol. 23, no. 1, pp. 57-66, Jan. 2021.
25 Y. Zhang, Q. Zhang, Z. Li, Y. Yan, and M. Zhang, "A k-anonymous location privacy protection method of dummy based on geographical semantics," International Journal of Network Security, vol. 21, no. 6, pp. 937-946, Nov. 2019.
26 B. N. Jagdale and J. W. Bakal, "A novel authentication and authorization scheme in P2P networking using location-based privacy," Evol. Intel., Mar. 2020.
27 S. Liu, J. H. Wang, J. Wang, and Q. Zhang, "Achieving user-defined location privacy preservation using a P2P system," IEEE Access, vol. 8, pp. 45895-45912, March. 2020.   DOI