DOI QR코드

DOI QR Code

Efficient dummy generation for protecting location privacy in location based services

위치기반 서비스에서 위치 프라이버시를 보호하기 위한 효율적인 더미 생성

  • Cai, Tian-yuan (College of Information and Communication Engineering, Wonkwang University) ;
  • Youn, Ji-hye (College of Information and Communication Engineering, Wonkwang University) ;
  • Song, Doo-hee (College of Information and Communication Engineering, Wonkwang University) ;
  • Park, Kwang-jin (College of Information and Communication Engineering, Wonkwang University)
  • Received : 2017.04.18
  • Accepted : 2017.08.21
  • Published : 2017.10.31

Abstract

For enjoying the convenience provided by location based services, the user needs to submit his or her location and query to the LBS server. So there is a probability that the untrusted LBS server may expose the user's id and location etc. To protect user's privacy so many approaches have been proposed in the literature. Recently, the approaches about using dummy are getting popular. However, there are a number of things to consider if we want to generate a dummy. For example, when generating a dummy, we have to take the obstacle and the distance between dummies into account so that we can improve the privacy level. Thus, in this paper we proposed an efficient dummy generation algorithm to achieve k-anonymity and protect user's privacy in LBS. Evaluation results show that the algorithm can significantly improve the privacy level when it was compared with others.

사용자가 위치기반 서비스(Location based service: 이하 LBS)를 제공 받기 위해서 LBS 서버에게 사용자의 위치와 질의 내용을 공개해야만 한다. 따라서 사용자의 신분, 위치 등이 노출될 수 있다. 최근 사용자의 프라이버시를 보호하기 위하여 더미를 이용한 기법들이 연구되고 있다. 그러나 더미를 생성하기 위하여 고려해야 할 사항들이 다수 존재한다. 예를 들어 더미 생성 시 장애물과 더미간의 거리 등을 고려해야만 프라이버시 보호를 증가시킬 수 있다. 따라서 본 논문에서 우리는 사용자의 프라이버시 보호를 증가시킬 수 있는 효율적인 더미 생성 기법을 제안한다. 실험 결과를 통해 최근 기법보다 성능이 우수함을 증명하였다.

Keywords

References

  1. K. G. Shin, X. Ju, Z. Chen, et al., "Privacy protection for users of location-based services", IEEE Wireless Communications, vol. 19, no. 1, pp. 30-39, 2012. https://doi.org/10.1109/MWC.2012.6155874
  2. A. R. Beresford and F. Stajano, "Location privacy in pervasive computing", IEEE Pervasive computing, vol. 2, no .1, pp. 46-55, 2003. https://doi.org/10.1109/MPRV.2003.1186725
  3. Y. H. Gustav, X. Wu, Y. Ren, et al., "Dummy Based Privacy Preservation in Continuous Querying Road Network Services", IEEE International Conference Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 94-101, 2014. DOI : 10.1109/CyberC.2014.24
  4. B. Niu, X. Zhu, W. Li, et al., "A personalized two-tier cloaking scheme for privacy-aware location-based services", IEEE Computing, Networking and Communications, pp. 94-98, 2015. https://doi.org/10.1109/ICCNC.2015.7069322
  5. P. R. Lei, W. C. Peng, I. J. Su, et al., "Dummy-based schemes for protecting movement trajectories", Journal of Information Science and Engineering, vol. 28, no. 2, pp. 335-350, 2012. DOI : https://ir.nctu.edu.tw/handle/11536/15826
  6. B. Niu, Q. Li, X. Zhu, et al. "Achieving k-anonymity in privacy-aware location-based services", IEEE International Conference on Computing, Networking and Communications, pp. 754-762, 2014. https://doi.org/10.1109/INFOCOM.2014.6848002
  7. T. Hara, A. Suzuki, M. Iwata, et al. "Dummy-Based User Location Anonymization Under Real-World Constraints", IEEE Access, vol. 4, pp. 673-687, 2016. https://doi.org/10.1109/ACCESS.2016.2526060
  8. B. Niu, X. Zhu, H. Chi, et al. "3PLUS: Privacypreserving pseudo-location updating system in locationbased services", IEEE Wireless Communications and Networking Conference, pp. 4564-4569, 2013. https://doi.org/10.1109/CC.2013.6623499
  9. H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services", Proceedings. International Conference on Pervasive Services, pp. 88-97, 2005. http://ieeexplore.ieee.org/document/1506394/tp=&arnu mber=1506394
  10. T. Y. Cai, D. H. Song, et al., "Efficient dummy generation for protecting location privacy", korea Institute of information, Electronics and Communication Technology, vol. 9, no. 6, pp.526-533, 2016. http://dx.doi.org/10.17661/jkiiect.2016.9.6.526
  11. M. F. Mokbel, C. Y. Chow, and W . G. Aref, "The new Casper: query processing for location services without compromising privacy", Proceedings of the 32nd international conference on Very large data bases, pp. 763-774, 2006. DOI : https://www.cerias.purdue.edu/apps/reports_and _papers/view/3799
  12. D. H. Song, J. Sim, K. J. Park, et al., "A privacypreserving continuous location monitoring system for location-based services", International Journal of Distributed Sensor Networks, pp.1-10, 2015. http://journals.sagepub.com/doi/full/10.1155/2015/815613
  13. T. Xu and Y. Cai, "Exploring historical location data for anonymity preservation in location-based services", IEEE International Conference on Computer Communications, pp. 1220-1228, 2008. https://doi.org/10.1109/INFOCOM.2008.103
  14. B. Niu, X. Zhu, X. Lei, et al., "Eps: Encounter-based privacy-preserving scheme for location-based services", IEEE Global Communications Conference, pp. 2139-2144, 2013. https://doi.org/10.1109/GLOCOM.2013.6831391
  15. B. Niu, X. Zhu, X. Lei, et al., "EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs", IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 398-406, 2014. https://doi.org/10.1109/GLOCOM.2013.6831391
  16. H. Zhao, J. Wan, and Z. Chen. "A Novel Dummy-Based KNN Query Anonymization Method in Mobile Services", International Journal of Smart Home, vol. 10, no. 6, pp. 137-154, 2016. http://dl.acm.org/citation.cfm?id=2424354
  17. B. Niu, X. Zhu, X. Lei, et al., "Privacy-area aware dummy generation algorithms for location-based services", IEEE International Conference on Communications, pp. 957-962, 2014. https://doi.org/10.1109/ICC.2014.6883443
  18. B. Niu, S. Gao, F. Li, et al., "Protection of location privacy in continuous LBSs against adversaries with background information", IEEE International Conference on Computing, Networking and Communications, pp. 1-6, 2016. DOI : 10.1109/ICCNC.2016.7440649
  19. F. Li, S. Wan, B Niu, et al., "Time obfuscation-based privacy-preserving scheme for location-based services", Wireless Communications and Networking Conference, pp. 1-6, 2016. https://doi.org/10.1109/WCNC.2016.7564715
  20. B. Niu, Q. Li, X. Zhu, et al., "Enhancing privacy through caching in location-based services", IEEE International Conference on Computer Communications, pp. 1017-1025, 2015. https://doi.org/10.1109/INFOCOM.2015.7218474

Cited by

  1. 마르코브 체인을 적용한 유동인구의 매출 및 이동 패턴 분석 vol.21, pp.1, 2017, https://doi.org/10.7472/jksii.2020.21.1.71