DOI QR코드

DOI QR Code

Privacy Protection Model for Location-Based Services

  • Ni, Lihao (National Engineering Research Center for E-Learning (NERCEL), Central China Normal University) ;
  • Liu, Yanshen (Hubei Research Center for Educational Informationization, Central China Normal University) ;
  • Liu, Yi (Hubei Research Center for Educational Informationization, Central China Normal University)
  • Received : 2018.06.08
  • Accepted : 2019.04.22
  • Published : 2020.02.29

Abstract

Solving the disclosure problem of sensitive information with the k-nearest neighbor query, location dummy technique, or interfering data in location-based services (LBSs) is a new research topic. Although they reduced security threats, previous studies will be ineffective in the case of sparse users or K-successive privacy, and additional calculations will deteriorate the performance of LBS application systems. Therefore, a model is proposed herein, which is based on geohash-encoding technology instead of latitude and longitude, memcached server cluster, encryption and decryption, and authentication. Simulation results based on PHP and MySQL show that the model offers approximately 10× speedup over the conventional approach. Two problems are solved using the model: sensitive information in LBS application is not disclosed, and the relationship between an individual and a track is not leaked.

Keywords

References

  1. T. Xu, Y. Ma, and Q. Wang, "Cross-urban point-of-interest recommendation for non-natives," International Journal of Web Services Research, vol. 15, no. 3, pp. 82-102, 2018. https://doi.org/10.4018/ijwsr.2018070105
  2. A. Arampatzis and G. Kalamatianos, "Suggesting points-of-interest via content-based, collaborative, and hybrid fusion methods in mobile devices," ACM Transactions on Information Systems, vol. 36, no. 3, pp. 1-28, 2017. https://doi.org/10.1145/3125620
  3. F. Abbas and H. Oh, "A step towards user privacy while using location-based services," Journal of Information Processing System, vol. 10, no. 4, pp. 618-627, 2017. https://doi.org/10.3745/JIPS.01.0003
  4. N. S. Kumar and M. Thangamani, "Multi-ontology based points of interests (MO-POIS) and parallel fuzzy clustering (PFC) algorithm for travel sequence recommendation with mobile communication on big social media," Wireless Personal Communications, vol. 103, pp. 991-1010, 2018. https://doi.org/10.1007/s11277-018-5492-0
  5. J. Bao, C. Y. Chow, M. F. Mokbel, and W. S. Ku, "Efficient evaluation of k-range nearest neighbor queries in road networks," in Proceedings of 2010 11th International Conference on Mobile Data Management, Kansas City, MO, 2010, pp. 115-124.
  6. T. Novack, R. Peters, and A. Zipf, "Graph-based matching of points-of-interest from collaborative geodatasets," ISPRS International Journal of Geo-Information, vol. 7, article no. 117, 2018.
  7. Z. Liu, D. Luo, J. Li, X. Chen, and C. Jia, "N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks," International Journal of Computer Mathematics, vol. 93, no. 2, pp. 384-400, 2016. https://doi.org/10.1080/00207160.2014.917179
  8. C. Zhou, C. Ma, S. T. Yang, and Z. P. Li, "Low-communication inquiry method for protecting privacy-based LBS neighbor points of interest," Journal of Sichuan University (Engineering Science Edition), vol. 47, no. 3, pp. 114-122, 2015.
  9. A. Papageorgiou, M. Strigkos, E. Politou, E. Alepis, A. Solanas, and C. Patsakis, "Security and privacy analysis of mobile health applications: the alarming state of practice," IEEE Access, vol. 6, pp. 9390-9403, 2018. https://doi.org/10.1109/ACCESS.2018.2799522
  10. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan, "Private queries in location based services: anonymizers are not necessary," in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, Canada, 2008, pp. 121-132.
  11. E. Toch, C. Bettini, E. Shmueli, L. Radaelli, A. Lanzi, D. Riboni, and B. Lepri, "The privacy implications of cyber security systems: a technological survey," ACM Computing Surveys, vol. 51, no. 2, pp. 1-27, 2018.
  12. S. He and S. H. G. Chan, "Tilejunction: mitigating signal noise for fingerprint-based indoor localization," IEEE Transactions on Mobile Computing, vol. 15, no. 6, pp. 1554-1568, 2015. https://doi.org/10.1109/TMC.2015.2463287
  13. B. Niu, X. Zhu, Q. Li, J. Chen, and H. Li, "A novel attack to spatial cloaking schemes in location-based services," Future Generation Computer Systems, vol. 49, pp. 125-132, 2015. https://doi.org/10.1016/j.future.2014.10.026
  14. C. Y. Chow, M. F. Mokbel, and X. Liu, "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments," GeoInformatica, vol. 15, no. 2, pp. 351-380, 2011. https://doi.org/10.1007/s10707-009-0099-y
  15. Y. F. Chen, X. J. Liu, and B. Li, "Collaborative position privacy protection method based on game theory," Computer Science, vol. 40, no. 10, pp. 92-97, 2013.
  16. Y. Yang and J. Yuan, "Research on incredible users cooperate constructing anonymous region in LBS," Computer Engineering and Applications, vol. 50, no. 14, pp. 82-87, 2014.
  17. D. Yang, X. Fang, and G. Xue, "Truthful incentive mechanisms for k-anonymity location privacy," in Proceedings of 2013 IEEE INFOCOM, Turin, Italy, 2013, pp. 2994-3002.
  18. D. Levin, K. LaCurts, N. Spring, and B. Bhattacharjee, "Bittorrent is an auction: analyzing and improving bittorrent's incentives," in Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, Seattle, WA, 2008, pp. 243-254.
  19. M. B. Brahim, W. Drira, F. Filali, and N. Hamdi, "Spatial data extension for Cassandra NoSQL database," Journal of Big Data, vol. 3, article no. 11, 2016.
  20. S. B. Kylasa, G. Kollias, and A. Grama, "Social ties and checkin sites: connections and latent structures in location-based social networks," Social Network Analysis and Mining, vol. 6, article no. 95, 2016.
  21. S. Nishimura, S. Das, D. Agrawal, and A. El Abbadi, "MD-HBase: design and implementation of an elastic data infrastructure for cloud-scale location services," Distributed and Parallel Databases, vol. 31, no. 2, pp. 289-319, 2013. https://doi.org/10.1007/s10619-012-7109-z
  22. X. Ye, J. Xu, L. Lu, X. Li, X. Fang, and J. Kong, "Equipment-free nucleic acid extraction and amplification on a simple paper disc for point-of-care diagnosis of rotavirus A," Analytica Chimica Acta, vol. 1018, pp. 78-85, 2018. https://doi.org/10.1016/j.aca.2018.02.068
  23. A. Tabarcea, N. Gali, and P. Franti, "Framework for location-aware search engine," Journal of Location Based Services, vol. 11, no. 1, pp. 50-74, 2017. https://doi.org/10.1080/17489725.2017.1407001