Browse > Article
http://dx.doi.org/10.12672/ksis.2012.20.4.083

A Nearest Neighbor Query Processing Algorithm Supporting K-anonymity Based on Weighted Adjacency Graph in LBS  

Jang, Mi-Young (전북대학교 컴퓨터공학과)
Chang, Jae-Woo (전북대학교 IT정보공학과)
Publication Information
Abstract
Location-based services (LBS) are increasingly popular due to the improvement of geo-positioning capabilities and wireless communication technology. However, in order to enjoy LBS services, a user requesting a query must send his/her exact location to the LBS provider. Therefore, it is a key challenge to preserve user's privacy while providing LBS. To solve this problem, the existing method employs a 2PASS cloaking framework that not only hides the actual user location but also reduces bandwidth consumption. However, 2PASS does not fully guarantee the actual user privacy because it does not take the real user distribution into account. Hence, in this paper, we propose a nearest neighbor query processing algorithm that supports K-anonymity property based on the weighted adjacency graph(WAG). Our algorithm not only preserves the location of a user by guaranteeing k-anonymity in a query region, but also improves a bandwidth usage by reducing unnecessary search for a query result. We demonstrate from experimental results that our algorithm outperforms the existing one in terms of query processing time and bandwidth usage.
Keywords
Location Based Service(LBS); Query Processing Algorithm; User Location Preservation; Network Bandwidth Usage;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. Gruteser and D. Grunwald, 2003, "Anonymous usage of Location-Based Services Through Spatial and Temporal Cloaking." In Proc. of the 1st international conference on Mobile systems, application and services, pp. 31-42.
2 M. Mokbel, C. Chow, and W. Aref, 2006, "The New Casper: Query Processing for Location Services without Compromising Privacy," In Proc. of the International Conference on Very Large Data Bases, pp. 763-774.
3 P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias, 2007, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," In Proc. of Transactions on Knowledge and Data Engineering, vol.19 no.12, pp. 1719-1733.
4 Privacy concerns a major roadblock for location- based services say survey, 2007, http// www.Govtech.com/gt/article -s/104064, 2007.
5 W. Ku, Y. Chen and R. Zimmermann, 2009, "Privacy Protected Spatial Query Processing for Advanced LBSs," Wireless Personal Communications, vol.51, no.1, pp. 53-65.   DOI   ScienceOn
6 W. R. Muntz, T. Barclay, J. Dozier, C. Faloutsos, A. Maceachren, J. Martin, C. Pancake and M. Satyanarayanan, 2003, "IT Roadmap to a Geospatial Future." The National Academics Press.
7 Y. Theodoridis, 2003, "The R-tree portal, http:// www.rtreeportal.org," [Online]
8 김형일, 이아름, 장재우, 2010, "P2P 환경의 위치기반 서비스에서 연속적인 질의 처리를 지원하는 그리드 기반 Cloaking 영역 설정 기법", 한국GIS학회지, 제 18권, 제 3호, pp 53-62.
9 장미영, 장재우, 2012, "도로 네트워크 환경에서 암호화된 공간데이터를 위한 k-최근접점 질의 처리 알고리즘", 한국공간정보학회지, 제 20권, 제3호, pp 67-81.
10 B. Bamba and L. Liu, 2008, "PRIVACYGRID: Supporting Anonymous Location Queries in Mobile Environments," Proceeding of the 17th international conference on World Wide Web, pp. 237-246.
11 C. Y. Chow, M. F. Mokbel, and X. Liu. A, 2006, "Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services," In Proc. of the ACM International Symposium on Advances in Geographic Information Systems, pp. 171-178.
12 G. Ghinita, P. Kalnis and S. Skiadopoulos, 2007,"MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries," In Proc. of International Symposium on Spatial and Temporal Databases, vol.4605/2007, pp. 221-238.
13 G. Ghinita, P. Kalnis and S. Skiadopoulos, 2007, "PRIVE: Anonymous Location- Based Queries in Distributed Mobile Systems," In Proc. of World Wide Web, pp. 371-380.
14 G. Ghinita, P. Kalnis, A. Khoshgozaran, C.Shahabi and K. L. Tan, 2008, "Private Queries in Location Based Services: Anonymizers are not Necessary," In Proc. of ACM SIGMOD international conference on Management of data, pp. 121-132.
15 H. Hu and J. Xu, 2010, "2PASS: Bandwidth- Optimized Location Cloaking for Anonymous Location-Based Services." IEEE Transactions and Parallel on Distributed Systems, pp. 1458-1472.
16 L. Sweeney, 2002, "k-anonymity: A model for protecting privacy." International Journal of Uncertainty, Fuzziness and Knowledge Based Systems 10(5), pp. 557-570.   DOI   ScienceOn