The Method of Location Privacy Protection Based on Grid Identifier Matching
ZHANG Shaobo①③ LIU Qin② WANG Guojun①④
①(School of Information Science and Engineering, Central South University, Changsha 410083, China) ②(College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082,China) ③(School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China) ④(School of Computer Science and Educational Software, Guangzhou University, Guangzhou 510006, China)
The model based on fully-trusted third party is a major model for location privacy protection in location-based services, but the model has some risk of exposing privacy. In this paper, a location privacy protection method based on Grid Identifier Matching (GIM) is proposed. In this method the user first divides the query area into grid and combines the order-preserving symmetric encryption and K-anonymity mechanism. Then, the K-anonymity paradigm is formed in anonymizer. Finally, the query results are returned to users by utilizing GIM. In the query process, the anonymizer dose not have any knowlegdge about a user’s real location, which can enhance the user’s location privacy. Meanwhile, the anonymizer only does simple comparison and matching operations, which relieves effectively is performance bottleneck of the anonymizer. Security analysis shows that the proposed approach can effectively protect the user’s location privacy. Experimental evaluations show that the proposed approach can decrease processing time overhead of the anonymizer.
张少波,刘琴,王国军. 基于网格标识匹配的位置隐私保护方法[J]. 电子与信息学报, 2016, 38(9): 2173-2179.
ZHANG Shaobo, LIU Qin, WANG Guojun. The Method of Location Privacy Protection Based on Grid Identifier Matching. JEIT, 2016, 38(9): 2173-2179.
LU Rongxing, LIN Xiaodong, LIANG Xiaohui, et al. A dynamic privacypreserving key management scheme for location-based services in vanets[J]. IEEE Transactions on Intelligent Transportation Systems, 2012, 13(1): 127-139. doi: 10.1109/TITS.2011.2164068.
[2]
YU Rong, KANG Jiawen, HUANG Xumin, et al. MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(1): 93-105. doi: 10.1109/TDSC.2015.2399291.
[3]
NIU Ben, LI Qinghua, ZHU Xiaoyan, et al. Enhancing privacy through caching in location-based services[C]. 2015 IEEE Conference on Computer Communication(INFOCOM), Hong Kong, China, 2015: 1017-1025. doi: 10.1109/ INFOCOM.2015.7218474
ZHANG Xuejun, GUI Xiaolin, and WU Zhongdong. Privacy preservation for location-based services: a survey[J]. Journal of Software, 2015, 26(9): 2373-2395. doi: 10.13328/j.cnki.jos. 004857.
[5]
PENG Tao, LIU Qin, and WANG Guojun. Enhanced location privacy preserving scheme in location-based services [J]. IEEE Systems Journal, 2014: 1-12. doi: 10.1109/JSYST. 2014.2354235.
[6]
SHOKRI R, THEODORAKOPOULOS G, PAPADIMITRATOS P, et al. Hiding in the mobile crowd: location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11(3): 266-279. doi: 10.1109/TDSC.2013.57.
[7]
CHOW C Y, MOKBEL M F, and LIU X. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011, 15(2): 351-380. doi: 10.1007/s10707-009-0099-y.
[8]
ARDAGNA C A, CREMONINI M, VIMERCATI S D C, et al. An obfuscation-based approach for protecting location privacy[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(1): 13-27. doi: 10.1109/TDSC.2009.25.
PENG Zhiyu and LI Shanping. Protecting location privacy in location-based services in mobile environments[J]. Journal of Electronics & Information Technology, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146. 2010.01050.
[10]
GEDIK B and LIU L. Protecting location privacy with personalized k-anonymous: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-18. doi: 10.1109/TMC.2007.1062.
ZHOU Changli, Ma Chunguang, and YANG Songtao. Location privacy-preserving method for LBS continuous KNN query in road networks[J]. Journal of Computer Research and Development, 2015, 52(11): 2628-2644. doi: 10.7544/ issn1000-1239.2015.20140523.
[12]
SCHLEGEL R, CHOW C Y, HUANG Q, et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015, 14(10): 2158-2172. doi: 10.1109/TMC.2015.2388488.
[13]
AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]. Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004: 563-574.
[14]
POPA R A, LI F H, and ZELDOVICH N. An ideal-security protocol for order-preserving encoding[C]. 2013 IEEE Symposium on Security and Privacy (SP), Berkeley, California, 2013: 463-477. doi: 10.1109/SP.2013.38.
[15]
AHMADIAN M, PAYA A, and MARINESCU D C. Security of applications involving multiple organizations and order preserving encryption in hybrid cloudenvironments[C]. 2014 IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPSW), Phoenix, Azerbaijan, 2014: 894-903. doi: 10.1109/IPDPSW.2014.102.
[16]
GAO Sheng, MA Jianfeng, SHI Weisong, et al. TrPF: a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887. doi: 10.1109/TIFS.2013. 2252618.
[17]
MCNAMES J. A fast nearest-neighbor algorithm based on a principal axis search tree[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2001, 23(9): 964-976. doi: 10.1109/34.955110.
[18]
BRINKHOFF T. Generating traffic data[J]. Bulletin of the Technical Committee Data Engineering, 2003, 26(2): 19-25.