Browse > Article

Protection of Location Privacy for Spatio-Temporal Query Processing Using R-Trees  

Kwon, Dong-Seop (명지대학교 컴퓨터공학과)
Publication Information
The Journal of Society for e-Business Studies / v.15, no.3, 2010 , pp. 85-98 More about this Journal
Abstract
The prevailing infrastructure of ubiquitous computing paradigm on the one hand making significant development for integrating technology in the daily life but on the other hand raising concerns for privacy and confidentiality. This research presents a new privacy-preserving spatio-temporal query processing technique, in which location based services (LBS) can be serviced without revealing specific locations of private users. Existing location cloaking techniques are based on a grid-based structures such as a Quad-tree and a multi-layered grid. Grid-based approaches can suffer a deterioration of the quality in query results since they are based on pre-defined size of grids which cannot be adapted for variations of data distributions. Instead of using a grid, we propose a location-cloaking algorithm which uses the R-tree, a widely adopted spatio-temporal index structure. The proposed algorithm uses the MBRs of leaf nodes as the cloaked locations of users, since each leaf node guarantees having not less than a certain number of objects. Experimental results show the superiority of the proposed method.
Keywords
Spatio-temporal Database; Privacy Protection; R-tree; Spatio-temporal Query;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Alastair Beresford and Frank Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, Vol. 2, No. 1, 2003, pp. 46-55.   DOI   ScienceOn
2 Thomas Brinkhoff, "A framework for generating network-based moving objects," GeoInformatica, Vol. 6, No. 2, 2002, pp. 153-180.   DOI   ScienceOn
3 Dongseop Kwon, Sangjun Lee, Wonik Choi, and Sukho Lee, "An Adaptive Hashing Technique for Indexing Moving Objects," Data and Knowledge Engineering, Vol. 56, No. 3, 2006, pp. 287-303.   DOI   ScienceOn
4 Dongseop Kwon, Sangjun Lee, and Sukho Lee, "Efficient Update Method for Indexing Locations of Moving Objects," Journal of Information Science and Engineering, Vol. 21, No. 3, 2005, pp. 643-658.
5 Dongseop Kwon, Sangjun Lee, and Sukho Lee, "Indexing the Current Positions of Moving Objects Using the Lazy Update R-tree," Proceedings of the 3rd International Conference on Mobile Data Management(MDM2002), 2002, pp. 113-120.
6 Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian, "t-closeness : Privacy Beyond k-Anonymity and l-Diversity," Proceedings of the IEEE 23rd International Conference on Data Engineering, 2007, pp. 106-115.
7 Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam, "l-Diversity : Privacy Beyond k-Anonymity," ACM Transactions on Knowledge Discovery from Data(TKDD), Vol. 1, No. 1, 2007.
8 Mohamed F. Mokbel, Chi-Yin Chow, and Walid G. Aref, "The new Casper :query processing for location services without compromising privacy," Proceedings of the 32nd international conference on Very large data bases, 2006, pp. 763-774.
9 Mohamed F. Mokbel, Thanaa M. Ghanem, Walid G. Aref, "Spatio-temporal Access Methods", IEEE Data Engineering Bulletin, Vol. 26, No. 2, 2003, pp. 40-49.
10 Bill Schilit, Jason Hong, and Marco Gruteser, "Wireless location privacy protection," IEEE Computer, Vol. 36, No. 12, 2003, pp. 135-137.   DOI   ScienceOn
11 Marco Gruteser and Dirk Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," Proceedings of the 1st international conference on Mobile systems, applications and services, 2003, pp. 31-42.
12 Chi-Yin Chow, Mohamed F. Mokbel, Walid G. Aref, and West Lafayette, "Casper : Query processing for location services without compromising privacy," ACM Transactions on Database Systems(TODS), Vol. 34, No. 4, 2009, pp. 1-48.
13 Wonik Choi, Dongseop Kwon, and Sangjun Lee, "Spatio-Temporal Data Warehouses Using An Adaptive Cell- based Approach," Data and Knowledge Engineering, Vol. 59, No. 7, 2006, pp. 189-207.   DOI
14 Bugra Gedik, Ling Liu, "Location Privacy in Mobile Systems : A Personalized Anonymization Model," Proceedings of the 25th International Conference on Distributed Computing Systems, 2005, pp. 620-629.
15 Jay Warrior, Eric Mchenry, and Kenneth Mcgee, "They Know Who You Are," IEEE Spectrum Vol. 40, No. 7, 2003, pp. 20-25.   DOI   ScienceOn
16 Latanya Sweeney, "k-anonymity : a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, Vol. 10, No. 5, 2002, pp. 557-570.   DOI   ScienceOn