Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2023, Vol. 17 Issue (5) : 175814    https://doi.org/10.1007/s11704-022-2155-9
RESEARCH ARTICLE
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services
Long LI1,2, Jianbo HUANG3, Liang CHANG2(), Jian WENG1, Jia CHEN3, Jingjing LI1()
1. College of Cyber Security, Jinan University, Guangzhou 510632, China
2. Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China
3. Department of Computer Applications, Guilin University of Technology at Nanning, Nanning 530000, China
 Download: PDF(4093 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Since smartphones embedded with positioning systems and digital maps are widely used, location-based services (LBSs) are rapidly growing in popularity and providing unprecedented convenience in people’s daily lives; however, they also cause great concern about privacy leakage. In particular, location queries can be used to infer users’ sensitive private information, such as home addresses, places of work and appointment locations. Hence, many schemes providing query anonymity have been proposed, but they typically ignore the fact that an adversary can infer real locations from the correlations between consecutive locations in a continuous LBS. To address this challenge, a novel dual privacy-preserving scheme (DPPS) is proposed that includes two privacy protection mechanisms. First, to prevent privacy disclosure caused by correlations between locations, a correlation model is proposed based on a hidden Markov model (HMM) to simulate users’ mobility and the adversary’s prediction probability. Second, to provide query probability anonymity of each single location, an advanced k-anonymity algorithm is proposed to construct cloaking regions, in which realistic and indistinguishable dummy locations are generated. To validate the effectiveness and efficiency of DPPS, theoretical analysis and experimental verification are further performed on a real-life dataset published by Microsoft, i.e., GeoLife dataset.

Keywords location-based services      privacy-preserving      hidden Markov model      k-anonymity      query probability     
Corresponding Author(s): Liang CHANG,Jingjing LI   
Just Accepted Date: 28 October 2022   Issue Date: 13 February 2023
 Cite this article:   
Long LI,Jianbo HUANG,Liang CHANG, et al. DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services[J]. Front. Comput. Sci., 2023, 17(5): 175814.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-022-2155-9
https://academic.hep.com.cn/fcs/EN/Y2023/V17/I5/175814
Fig.1  System model
Fig.2  State change diagram of an HMM
Fig.3  An example of a social network
Fig.4  An example of two consecutive location sets
Fig.5  Diagram of the HMM-based correlation model
Algorithm 1 AKA
1D ← generate a pool of 4k dummies within radius R and distance Dismaxi
2for 1≤memberk-1 do
3   weight=zeros(1*|D|)
4   for 1≤d≤|D| do
5     LSi+1= LSi+1∪{Dd}
6     weight[d]←(a*|1-pji+1|+b*dis(lji+1,lri+1)jDdis(lji+1,lri+1))
7     LSq+1= LSq+1-{Dd}
8   end
9   new number ← {member of D that minimizes weight}
10   LSi+1=LSi+1∪{new member}
11   D=D-{new member}
12end
13return LSi+1lri+1
Tab.1  Detailed steps of the AKA
Fig.6  Comparisons in terms of entropy
Fig.7  Comparisons in terms of transition entropy. (a) 2 consecutive location sets; (b) 3 consecutive location sets.
Fig.8  Comparisons in terms of the variance of the transition entropy
Fig.9  Comparisons in terms of the distance variance. (a) k=10; (b) k =20; (c) k =30
  
  
  
  
  
  
1 J, Hua Y, Liu Y, Shen X, Tian Y, Luo C Jin . A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services. Frontiers of Computer Science, 2020, 14( 3): 143605
2 S, Zhang X, Li Z, Tan T, Peng G Wang . A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 2019, 94: 40–50
3 K H, Lim J, Chan S, Karunasekera C Leckie . Tour recommendation and trip planning using location-based social media: a survey. Knowledge and Information Systems, 2019, 60( 3): 1247–1275
4 H, Liu C, Jin A Zhou . Popular route planning with travel cost estimation from trajectories. Frontiers of Computer Science, 2020, 14( 1): 191–207
5 H, Yu X, Jia H, Zhang X, Yu J Shu . PSRide: Privacy-preserving shared ride matching for online ride hailing systems. IEEE Transactions on Dependable and Secure Computing, 2021, 18( 3): 1425–1440
6 H, Jiang J, Li P, Zhao F, Zeng Z, Xiao A Iyengar . Location privacy-preserving mechanisms in location-based services: a comprehensive survey. ACM Computing Surveys, 2021, 54( 1): 4
7 J, Zhang C, Li B Wang . A performance tunable CPIR-based privacy protection method for location based service. Information Sciences, 2022, 589: 440–458
8 B S, Vidyalakshmi R K, Wong C H Chi . Health mentions on twitter: a case study to identify privacy leaks. IEEE Consumer Electronics Magazine, 2020, 9( 5): 85–90
9 H, Wang Z, Xu X, Zhang X, Peng K Li . An optimal differentially private data release mechanism with constrained error. Frontiers of Computer Science, 2022, 16( 1): 161608
10 P, Zhao J, Li F, Zeng F, Xiao C, Wang H Jiang . ILLIA: Enabling K-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet of Things Journal, 2018, 5( 2): 1033–1042
11 N, Wang J, Fu J, Zeng B K Bhargava . Source-location privacy full protection in wireless sensor networks. Information Sciences, 2018, 444: 105–121
12 Y, Yang X, Zheng W, Guo X, Liu V Chang . Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Information Sciences, 2019, 479: 567–592
13 Z, Zhang X, Qi Y, Wang C, Jin J, Mao A Zhou . Distributed top−k similarity query on big trajectory streams. Frontiers of Computer Science, 2019, 13( 3): 647–664
14 S, Zhang X, Mao K K R, Choo T, Peng G Wang . A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services. Information Sciences, 2020, 527( 2): 406–419
15 H, Kido Y, Yanagisawa T Satoh . An anonymous communication technique using dummies for location-based services. In: Proceedings of International Conference on Pervasive Services, 2005. 2005, 88−97
16 B, Niu Q, Li X, Zhu G, Cao H Li . Achieving k-anonymity in privacy-aware location-based services. In: Proceedings of IEEE INFOCOM 2014-IEEE Conference on Computer Communications. 2014, 754−762
17 G, Sun V, Chang M, Ramachandran Z, Sun G, Li H, Yu D Liao . Efficient location privacy algorithm for Internet of Things (IoT) services and applications. Journal of Network and Computer Applications, 2017, 89: 3–13
18 G, Sun S, Cai H, Yu S, Maharjan V, Chang X, Du M Guizani . Location privacy preservation for mobile users in location-based services. IEEE Access, 2019, 7: 87425–87438
19 Y, Sun M, Chen L, Hu Y, Qian M M Hassan . ASA: Against statistical attacks for privacy-aware users in Location Based Service. Future Generation Computer Systems, 2017, 70: 48–58
20 T, Peng Q, Liu G Wang . Enhanced location privacy preserving scheme in location-based services. IEEE Systems Journal, 2014, 11( 1): 219–230
21 S, Zhang K K R, Choo Q, Liu G Wang . Enhancing privacy through uniform grid and caching in location-based services. Future Generation Computer Systems, 2018, 86: 881–892
22 V K, Yadav S, Verma S Venkatesan . Linkable privacy-preserving scheme for location-based services. IEEE Transactions on Intelligent Transportation Systems, 2022, 23( 7): 7998–8012
23 T, Peng Q, Liu D, Meng G Wang . Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 2017, 387: 165–179
24 S, Shaham M, Ding B, Liu Z H, Lin J Li . Transition-Entropy: a novel metric for privacy preservation in location-based services. In: Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 2019, 1−6
25 S, Shaham M, Ding B, Liu S, Dang Z, Lin J Li . Privacy preservation in location-based services: A novel metric and attack model. IEEE Transactions on Mobile Computing, 2021, 20( 10): 3006–3019
26 Z, Wu R, Wang Q, Li X, Lian G, Xu E, Chen X Liu . A location privacy-preserving system based on query range cover-up or location-based services. IEEE Transactions on Vehicular Technology, 2020, 69( 5): 5244–5254
27 L, Kuang Y, Wang X, Zheng L, Huang Y Sheng . Using location semantics to realize personalized road network location privacy protection. EURASIP Journal on Wireless Communications and Networking, 2020, 2020( 1): 1
28 Z, Tan C, Wang C, Yan M, Zhou C Jiang . Protecting privacy of location-based services in road networks. IEEE Transactions on Intelligent Transportation Systems, 2020, 22( 10): 6435–6448
[1] FCS-22155-OF-LL_suppl_1 Download
[1] Fengxia LIU, Zhiming ZHENG, Yexuan SHI, Yongxin TONG, Yi ZHANG. A survey on federated learning: a perspective from multi-party computation[J]. Front. Comput. Sci., 2024, 18(1): 181336-.
[2] Zhusen LIU, Zhenfu CAO, Xiaolei DONG, Xiaopeng ZHAO, Haiyong BAO, Jiachen SHEN. A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid[J]. Front. Comput. Sci., 2022, 16(1): 161810-.
[3] Zhixin ZENG, Xiaodi WANG, Yining LIU, Liang CHANG. MSDA: multi-subset data aggregation scheme without trusted third party[J]. Front. Comput. Sci., 2022, 16(1): 161808-.
[4] Huiping LIU, Cheqing JIN, Aoying ZHOU. Popular route planning with travel cost estimation from trajectories[J]. Front. Comput. Sci., 2020, 14(1): 191-207.
[5] Zhefan ZHONG, Xin LIN, Liang HE, Jing YANG. Answering why-not questions on KNN queries[J]. Front. Comput. Sci., 2019, 13(5): 1062-1071.
[6] Chengliang WANG,Yayun PENG,Debraj DE,Wen-Zhan SONG. DPHK: real-time distributed predicted data collecting based on activity pattern knowledge mined from trajectories in smart environments[J]. Front. Comput. Sci., 2016, 10(6): 1000-1011.
[7] Xudong ZHU, Zhijing LIU. Human behavior clustering for anomaly detection[J]. Front Comput Sci Chin, 2011, 5(3): 279-289.
[8] Di WU, Gabriel Pui Cheong FUNG, Jeffrey Xu YU, Qi PAN. Stock prediction:an event-driven approach based on bursty keywords[J]. Front Comput Sci Chin, 2009, 3(2): 145-157.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed