Journal of Computer Science and Technology ›› 2020, Vol. 35 ›› Issue (3): 629-646.doi: 10.1007/s11390-020-0256-1

Special Issue: Computer Networks and Distributed Computing

• Computer Networks and Distributed Computing • Previous Articles     Next Articles

Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems

Yubin Duan1, Student Member, IEEE, Guo-Ju Gao2,*, Student Member, IEEE, Ming-Jun Xiao2, Member, IEEE, Jie Wu1, Fellow, IEEE        

  1. 1 Department of Computer and Information Sciences, Temple University, Pennsylvania 19122, U.S.A.;
    2 School of Computer Science and Technology, University of Science and Technology of China, Hefei 230036, China
  • Received:2019-12-30 Revised:2020-03-11 Online:2020-05-28 Published:2020-05-28
  • Contact: Guo-Ju Gao
  • About author:Yubin Duan received his B.S. degree in mathematics and physics from University of Electronic Science and Technology of China, Chengdu, in 2017. He is currently a Ph.D. candidate in the Department of Computer and Information Sciences, Temple University, Philadelphia. His current research focuses on urban computing.
  • Supported by:
    This research was supported in part by the National Science Foundation of USA under Grant Nos. CNS 1824440, CNS 1828363, CNS 1757533, CNS 1618398, CNS 1651947, and CNS 1564128, the National Natural Science Foundation of China under Grant Nos. 61872330, 61572457, 61379132, and the National Natural Science Foundation of Jiangsu Province of China under Grant Nos. BK20191194 and BK20131174.

With the quick development of the sharing economy, ride-hailing services have been increasingly popular worldwide. Although the service provides convenience for users, one concern from the public is whether the location privacy of passengers would be protected. Service providers (SPs) such as Didi and Uber need to acquire passenger and driver locations before they could successfully dispatch passenger orders. To protect passengers’ privacy based on their requirements, we propose a cloaking region based order dispatch scheme. In our scheme, a passenger sends the SP a cloaking region in which his/her actual location is not distinguishable. The trade-off of the enhanced privacy is the loss of social welfare, i.e., the increase in the overall pick-up distance. To optimize our scheme, we propose to maximize the social welfare under passengers’ privacy requirements. We investigate a bipartite matching based approach. A theoretical bound on the matching performance under specific privacy requirements is shown. Besides passengers’ privacy, we allow drivers to set up their maximum pick-up distance in our extended scheme. The extended scheme could be applied when the number of drivers exceeds the number of passengers. Nevertheless, the global matching based scheme does not consider the interest of each individual passenger. The passengers with low privacy requirements may be matched with drivers far from them. To this end, a pricing scheme including three strategies is proposed to make up for the individual loss by allocating discounts on their riding fares. Extensive experiments on both real-world and synthetic datasets show the efficiency of our scheme.

Key words: order dispatch; pricing; privacy; ride-hailing;

[1] Duan Y, Mosharraf T, Wu J, Zheng H. Optimizing carpool scheduling algorithm through partition merging. In Proc. the IEEE Int. Conf. Communication, May 2018.
[2] Gao G, Xiao M, Zhao Z. Optimal multi-taxi dispatch for mobile taxi-hailing systems. In Proc. the 45th IEEE Int. Conf. Parallel Processing, August 2016, pp.294-303.
[3] Shokri R, Theodorakopoulos G, le Boudec J Y, Hubaux J P. Quantifying location privacy. In Proc. the 32nd IEEE Symp. Security and Privacy, May 2011, pp.247-262.
[4] Meyer-Lee G, Shang J, Wu J. Location-leaking through network traffic in mobile augmented reality applications. In Proc. the 37th IEEE Int. Performance Computing and Communications Conf., November 2018.
[5] Damiani M L, Bertino E, Silvestri C. The PROBE framework for the personalized cloaking of private locations. Trans. Data Privacy, 2010, 3(2):123-148.
[6] Xue M, Kalnis P, Pung H K. Location diversity:Enhanced privacy protection in location based services. In Proc. the 4th Int. Symp. Location and Context Awareness, May 2009, pp.70-87.
[7] Pham A, Dacosta I, Endignoux G, Troncoso-Pastoriza J R, Huguenin K, Hubaux J P. ORide:A privacy-preserving yet accountable ride-hailing service. In Proc. the 26th USENIX Security Symp., August 2017, pp.1235-1252.
[8] Aïvodji U M, Huguenin K, Huguet M J, Killijian M O. SRide:A privacy-preserving ridesharing system. In Proc. the 11th ACM Conf. Security&Privacy in Wireless and Mobile Networks, June 2018, pp.40-50.
[9] He Y, Ni J, Wang X, Niu B, Li F, Shen X. Privacypreserving partner selection for ride-sharing services. IEEE Trans. Vehicular Technology, 2018, 67(7):5994-6005.
[10] Khazbak Y, Fan J, Zhu S, Cao G. Preserving location privacy in ride-hailing service. In Proc. the 2008 IEEE Conf. Communications and Network Security, May 2018.
[11] Aurenhammer F. Voronoi diagrams-A survey of a fundamental geometric data structure. ACM Computing Surveys, 1991, 23(3):345-405.
[12] Duan Y, Gao G, Xiao M, Wu J. A privacy-preserving order dispatch scheme for ride-hailing services. In Proc. the 16th Int. Conf. Mobile Ad-hoc and Smart Systems, November 2019.
[13] Hadiwardoyo S A, Patra S, Calafate C T, Cano J C, Manzoni P. An intelligent transportation system application for smartphones based on vehicle position advertising and route sharing in vehicular ad-hoc networks. Journal of Computer Sci. and Tech., 2018, 33(2):249-262.
[14] Beresford A R, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003, 2(1):46-55.
[15] Liu A, Li Z X, Liu G F, Zheng K, Zhang M, Li Q, Zhang X. Privacy-preserving task assignment in spatial crowdsourcing. Journal of Computer Sci. and Tech., 2017, 32(5):905-918
[16] Hoh B, Gruteser M. Protecting location privacy through path confusion. In Proc. the 1st IEEE Int. Conf. Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.194-205.
[17] Sánchez D, Martínez S, Domingo-Ferrer J. Co-utile P2P ridesharing via decentralization and reputation management. Transportation Research Part C:Emerging Technologies, 2016, 73:147-166.
[18] Goel P, Kulik L, Ramamohanarao K. Optimal pick up point selection for effective ride sharing. IEEE Trans. Big Data, 2017, 3(2):154-168.
[19] Dai C, Yuan X, Wang C. Privacy-preserving ridesharing recommendation in geosocial networks. In Proc. the 5th Int. Conf. Computational Social Networks, August 2016, pp.193-205.
[20] Aïvodji U M, Gambs S, Huguet M J, Killijian M O. Meeting points in ridesharing:A privacy-preserving approach. Transportation Research Part C:Emerging Technologies, 2016, 72:239-253.
[21] Li H, Zhu H, Du S, Liang X, Shen X S. Privacy leakage of location sharing in mobile social networks:Attacks and defense. IEEE Trans. Dependable and Secure Computing, 2018, 15(4):646-660.
[22] Zhang N, Zhong S, Tian L. Using blockchain to protect personal privacy in the scenario of online taxi-hailing. Int. Journal of Computers Communications Control, 2017, 12(6):886-902.
[23] Pham A, Dacosta I, Jacot-Guillarmod B, Huguenin K, Hajar T, Tramèr F, Gligor V, Hubaux J P. PrivateRide:A privacy-enhanced ride-hailing service. Proceedings on Privacy Enhancing Technologies, 2017, 2017(2):38-56.
[24] Liang X, Li X, Lu R, Lin X, Shen X. UDP:Usage-based dynamic pricing with privacy preservation for smart grid. IEEE Trans. Smart Grid, 2013, 4(1):141-150.
[25] Zhuo X, Gao W, Cao G, Dai Y. Win-coupon:An incentive framework for 3G traffic offloading. In Proc. the 19th Annual IEEE Int. Conf. Network Protocols, October 2011, pp.206-215.
[26] Gao G, Xiao M, Wu J, Huang L, Hu C. Truthful incentive mechanism for nondeterministic crowdsensing with vehicles. IEEE Trans. Mobile Computing, 2018, 17(12):2982-2997.
[27] Edelman B, Ostrovsky M, Schwarz M. Internet advertising and the generalized second-price auction:Selling billions of dollars worth of keywords. The American Economic Review, 2007, 97(1):242-259.
[28] Vickrey W. Counterspeculation, auctions, and competitive sealed tenders. The Journal of Finance, 1961, 16(1):8-37.
[29] Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving user location privacy in mobile data management infrastructures. In Proc. the 6th Int. Workshop on Privacy Enhancing Technologies, June 2006, pp.393-412.
[1] William Croft, Jörg-Rüdiger Sack, and Wei Shi. Differential Privacy via a Truncated and Normalized Laplace Mechanism [J]. Journal of Computer Science and Technology, 2022, 37(2): 369-388.
[2] Jian-Zhe Zhao, Xing-Wei Wang, Ke-Ming Mao, Chen-Xi Huang, Yu-Kai Su, and Yu-Chen Li. Correlated Differential Privacy of Multiparty Data Release in Machine Learning [J]. Journal of Computer Science and Technology, 2022, 37(1): 231-251.
[3] Paul Marillonnet, Maryline Laurent, Mikaël Ates. Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services [J]. Journal of Computer Science and Technology, 2021, 36(3): 664-692.
[4] Lie-Huang Zhu, Bao-Kun Zheng, Meng Shen, Feng Gao, Hong-Yu Li, Ke-Xin Shi. Data Security and Privacy in Bitcoin System: A Survey [J]. Journal of Computer Science and Technology, 2020, 35(4): 843-862.
[5] Maryam Zarezadeh, Hamid Mala, Homa Khajeh. Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation [J]. Journal of Computer Science and Technology, 2020, 35(4): 863-874.
[6] Chong Wang, Nasro Min-Allah, Bei Guan, Yu-Qi Lin, Jing-Zheng Wu, Yong-Ji Wang. An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion [J]. Journal of Computer Science and Technology, 2019, 34(6): 1351-1365.
[7] Naveen Kumar, Ashutosh Kumar Singh, Abdul Aleem, Shashank Srivastava. Security Attacks in Named Data Networking: A Review and Research Directions [J]. Journal of Computer Science and Technology, 2019, 34(6): 1319-1350.
[8] Xiang Chen, Dun Zhang, Zhan-Qi Cui, Qing Gu, Xiao-Lin Ju. DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy [J]. Journal of Computer Science and Technology, 2019, 34(5): 1020-1038.
[9] Zi-Peng Zhang, Ming Fu, Xin-Yu Feng. A Lightweight Dynamic Enforcement of Privacy Protection for Android [J]. Journal of Computer Science and Technology, 2019, 34(4): 901-923.
[10] Lei Cui, Youyang Qu, Mohammad Reza Nosouhi, Shui Yu, Jian-Wei Niu, Gang Xie. Improving Data Utility Through Game Theory in Personalized Differential Privacy [J]. Journal of Computer Science and Technology, 2019, 34(2): 272-286.
[11] Yifan Wu, Fan Yang, Yong Xu, Haibin Ling. Privacy-Protective-GAN for Privacy Preserving Face De-Identification [J]. Journal of Computer Science and Technology, 2019, 34(1): 47-60.
[12] Xiao-Dong Dong, Sheng Chen, Lai-Ping Zhao, Xiao-Bo Zhou, Heng Qi, Ke-Qiu Li. More Requests, Less Cost: Uncertain Inter-Datacenter Traffic Transmission with Multi-Tier Pricing [J]. Journal of Computer Science and Technology, 2018, 33(6): 1152-1163.
[13] Rong Wang, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang. Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness [J]. Journal of Computer Science and Technology, 2018, 33(6): 1231-1242.
[14] Rui Yuan, Yu-Bin Xia, Hai-Bo Chen, Bin-Yu Zang, Jan Xie. ShadowEth: Private Smart Contract on Public Blockchain [J]. , 2018, 33(3): 542-556.
[15] Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jing Yang. Scalable and Privacy-Preserving Data Sharing Based on Blockchain [J]. , 2018, 33(3): 557-567.
Full text



[1] Zhou Di;. A Recovery Technique for Distributed Communicating Process Systems[J]. , 1986, 1(2): 34 -43 .
[2] Chen Shihua;. On the Structure of Finite Automata of Which M Is an(Weak)Inverse with Delay τ[J]. , 1986, 1(2): 54 -59 .
[3] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[4] Wang Jianchao; Wei Daozheng;. An Effective Test Generation Algorithm for Combinational Circuits[J]. , 1986, 1(4): 1 -16 .
[5] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[6] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[7] Zheng Guoliang; Li Hui;. The Design and Implementation of the Syntax-Directed Editor Generator(SEG)[J]. , 1986, 1(4): 39 -48 .
[8] Huang Xuedong; Cai Lianhong; Fang Ditang; Chi Bianjin; Zhou Li; Jiang Li;. A Computer System for Chinese Character Speech Input[J]. , 1986, 1(4): 75 -83 .
[9] Xu Xiaoshu;. Simplification of Multivalued Sequential SULM Network by Using Cascade Decomposition[J]. , 1986, 1(4): 84 -95 .
[10] Tang Tonggao; Zhao Zhaokeng;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
  Copyright ©2015 JCST, All Rights Reserved