We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Yubin Duan, Guo-Ju Gao, Ming-Jun Xiao, Jie Wu. Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems[J]. Journal of Computer Science and Technology, 2020, 35(3): 629-646. DOI: 10.1007/s11390-020-0256-1
Citation: Yubin Duan, Guo-Ju Gao, Ming-Jun Xiao, Jie Wu. Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems[J]. Journal of Computer Science and Technology, 2020, 35(3): 629-646. DOI: 10.1007/s11390-020-0256-1

Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems

Funds: This research was supported in part by the National Science Foundation of USA under Grant Nos. CNS 1824440, CNS 1828363, CNS 1757533, CNS 1618398, CNS 1651947, and CNS 1564128, the National Natural Science Foundation of China under Grant Nos. 61872330, 61572457, 61379132, and the National Natural Science Foundation of Jiangsu Province of China under Grant Nos. BK20191194 and BK20131174.
More Information
  • Author Bio:

    Yubin Duan received his B.S. degree in mathematics and physics from University of Electronic Science and Technology of China, Chengdu, in 2017. He is currently a Ph.D. candidate in the Department of Computer and Information Sciences, Temple University, Philadelphia. His current research focuses on urban computing.

  • Corresponding author:

    Guo-Ju Gao E-mail: gaoguoju@mail.ustc.edu.cn

  • Received Date: December 29, 2019
  • Revised Date: March 10, 2020
  • Published Date: May 27, 2020
  • With the quick development of the sharing economy, ride-hailing services have been increasingly popular worldwide. Although the service provides convenience for users, one concern from the public is whether the location privacy of passengers would be protected. Service providers (SPs) such as Didi and Uber need to acquire passenger and driver locations before they could successfully dispatch passenger orders. To protect passengers’ privacy based on their requirements, we propose a cloaking region based order dispatch scheme. In our scheme, a passenger sends the SP a cloaking region in which his/her actual location is not distinguishable. The trade-off of the enhanced privacy is the loss of social welfare, i.e., the increase in the overall pick-up distance. To optimize our scheme, we propose to maximize the social welfare under passengers’ privacy requirements. We investigate a bipartite matching based approach. A theoretical bound on the matching performance under specific privacy requirements is shown. Besides passengers’ privacy, we allow drivers to set up their maximum pick-up distance in our extended scheme. The extended scheme could be applied when the number of drivers exceeds the number of passengers. Nevertheless, the global matching based scheme does not consider the interest of each individual passenger. The passengers with low privacy requirements may be matched with drivers far from them. To this end, a pricing scheme including three strategies is proposed to make up for the individual loss by allocating discounts on their riding fares. Extensive experiments on both real-world and synthetic datasets show the efficiency of our scheme.
  • [1]
    Duan Y, Mosharraf T, Wu J, Zheng H. Optimizing carpool scheduling algorithm through partition merging. In Proc. the IEEE Int. Conf. Communication, May 2018.
    [2]
    Gao G, Xiao M, Zhao Z. Optimal multi-taxi dispatch for mobile taxi-hailing systems. In Proc. the 45th IEEE Int. Conf. Parallel Processing, August 2016, pp.294-303.
    [3]
    Shokri R, Theodorakopoulos G, le Boudec J Y, Hubaux J P. Quantifying location privacy. In Proc. the 32nd IEEE Symp. Security and Privacy, May 2011, pp.247-262.
    [4]
    Meyer-Lee G, Shang J, Wu J. Location-leaking through network traffic in mobile augmented reality applications. In Proc. the 37th IEEE Int. Performance Computing and Communications Conf., November 2018.
    [5]
    Damiani M L, Bertino E, Silvestri C. The PROBE framework for the personalized cloaking of private locations. Trans. Data Privacy, 2010, 3(2):123-148.
    [6]
    Xue M, Kalnis P, Pung H K. Location diversity:Enhanced privacy protection in location based services. In Proc. the 4th Int. Symp. Location and Context Awareness, May 2009, pp.70-87.
    [7]
    Pham A, Dacosta I, Endignoux G, Troncoso-Pastoriza J R, Huguenin K, Hubaux J P. ORide:A privacy-preserving yet accountable ride-hailing service. In Proc. the 26th USENIX Security Symp., August 2017, pp.1235-1252.
    [8]
    Aïvodji U M, Huguenin K, Huguet M J, Killijian M O. SRide:A privacy-preserving ridesharing system. In Proc. the 11th ACM Conf. Security&Privacy in Wireless and Mobile Networks, June 2018, pp.40-50.
    [9]
    He Y, Ni J, Wang X, Niu B, Li F, Shen X. Privacypreserving partner selection for ride-sharing services. IEEE Trans. Vehicular Technology, 2018, 67(7):5994-6005.
    [10]
    Khazbak Y, Fan J, Zhu S, Cao G. Preserving location privacy in ride-hailing service. In Proc. the 2008 IEEE Conf. Communications and Network Security, May 2018.
    [11]
    Aurenhammer F. Voronoi diagrams-A survey of a fundamental geometric data structure. ACM Computing Surveys, 1991, 23(3):345-405.
    [12]
    Duan Y, Gao G, Xiao M, Wu J. A privacy-preserving order dispatch scheme for ride-hailing services. In Proc. the 16th Int. Conf. Mobile Ad-hoc and Smart Systems, November 2019.
    [13]
    Hadiwardoyo S A, Patra S, Calafate C T, Cano J C, Manzoni P. An intelligent transportation system application for smartphones based on vehicle position advertising and route sharing in vehicular ad-hoc networks. Journal of Computer Sci. and Tech., 2018, 33(2):249-262.
    [14]
    Beresford A R, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003, 2(1):46-55.
    [15]
    Liu A, Li Z X, Liu G F, Zheng K, Zhang M, Li Q, Zhang X. Privacy-preserving task assignment in spatial crowdsourcing. Journal of Computer Sci. and Tech., 2017, 32(5):905-918
    [16]
    Hoh B, Gruteser M. Protecting location privacy through path confusion. In Proc. the 1st IEEE Int. Conf. Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.194-205.
    [17]
    Sánchez D, Martínez S, Domingo-Ferrer J. Co-utile P2P ridesharing via decentralization and reputation management. Transportation Research Part C:Emerging Technologies, 2016, 73:147-166.
    [18]
    Goel P, Kulik L, Ramamohanarao K. Optimal pick up point selection for effective ride sharing. IEEE Trans. Big Data, 2017, 3(2):154-168.
    [19]
    Dai C, Yuan X, Wang C. Privacy-preserving ridesharing recommendation in geosocial networks. In Proc. the 5th Int. Conf. Computational Social Networks, August 2016, pp.193-205.
    [20]
    Aïvodji U M, Gambs S, Huguet M J, Killijian M O. Meeting points in ridesharing:A privacy-preserving approach. Transportation Research Part C:Emerging Technologies, 2016, 72:239-253.
    [21]
    Li H, Zhu H, Du S, Liang X, Shen X S. Privacy leakage of location sharing in mobile social networks:Attacks and defense. IEEE Trans. Dependable and Secure Computing, 2018, 15(4):646-660.
    [22]
    Zhang N, Zhong S, Tian L. Using blockchain to protect personal privacy in the scenario of online taxi-hailing. Int. Journal of Computers Communications Control, 2017, 12(6):886-902.
    [23]
    Pham A, Dacosta I, Jacot-Guillarmod B, Huguenin K, Hajar T, Tramèr F, Gligor V, Hubaux J P. PrivateRide:A privacy-enhanced ride-hailing service. Proceedings on Privacy Enhancing Technologies, 2017, 2017(2):38-56.
    [24]
    Liang X, Li X, Lu R, Lin X, Shen X. UDP:Usage-based dynamic pricing with privacy preservation for smart grid. IEEE Trans. Smart Grid, 2013, 4(1):141-150.
    [25]
    Zhuo X, Gao W, Cao G, Dai Y. Win-coupon:An incentive framework for 3G traffic offloading. In Proc. the 19th Annual IEEE Int. Conf. Network Protocols, October 2011, pp.206-215.
    [26]
    Gao G, Xiao M, Wu J, Huang L, Hu C. Truthful incentive mechanism for nondeterministic crowdsensing with vehicles. IEEE Trans. Mobile Computing, 2018, 17(12):2982-2997.
    [27]
    Edelman B, Ostrovsky M, Schwarz M. Internet advertising and the generalized second-price auction:Selling billions of dollars worth of keywords. The American Economic Review, 2007, 97(1):242-259.
    [28]
    Vickrey W. Counterspeculation, auctions, and competitive sealed tenders. The Journal of Finance, 1961, 16(1):8-37.
    [29]
    Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving user location privacy in mobile data management infrastructures. In Proc. the 6th Int. Workshop on Privacy Enhancing Technologies, June 2006, pp.393-412.
  • Related Articles

    [1]Dong-Yu Cao, Hao Yin, Bi-Xin Li. A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum[J]. Journal of Computer Science and Technology, 2025, 40(3): 731-747. DOI: 10.1007/s11390-024-3843-8
    [2]Maryam Zarezadeh, Hamid Mala, Homa Khajeh. Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation[J]. Journal of Computer Science and Technology, 2020, 35(4): 863-874. DOI: 10.1007/s11390-020-9247-5
    [3]Lie-Huang Zhu, Bao-Kun Zheng, Meng Shen, Feng Gao, Hong-Yu Li, Ke-Xin Shi. Data Security and Privacy in Bitcoin System: A Survey[J]. Journal of Computer Science and Technology, 2020, 35(4): 843-862. DOI: 10.1007/s11390-020-9638-7
    [4]Yifan Wu, Fan Yang, Yong Xu, Haibin Ling. Privacy-Protective-GAN for Privacy Preserving Face De-Identification[J]. Journal of Computer Science and Technology, 2019, 34(1): 47-60. DOI: 10.1007/s11390-019-1898-8
    [5]Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jing Yang. Scalable and Privacy-Preserving Data Sharing Based on Blockchain[J]. Journal of Computer Science and Technology, 2018, 33(3): 557-567. DOI: 10.1007/s11390-018-1840-5
    [6]Xian-Mang He, Xiaoyang Sean Wang, Dong Li, Yan-Ni Hao. Semi-Homogenous Generalization:Improving Homogenous Generalization for Privacy Preservation in Cloud Computing[J]. Journal of Computer Science and Technology, 2016, 31(6): 1124-1135. DOI: 10.1007/s11390-016-1687-6
    [7]Linke Guo, Chi Zhang, Yuguang Fang, Phone Lin. A Privacy-Preserving Attribute-Based Reputation System in Online Social Networks[J]. Journal of Computer Science and Technology, 2015, 30(3): 578-597. DOI: 10.1007/s11390-015-1547-9
    [8]Hui Wang. Privacy-Preserving Data Sharing in Cloud Computing[J]. Journal of Computer Science and Technology, 2010, 25(3): 401-414.
    [9]Ren-Yi Xiao. Survey on Anonymity in Unstructured Peer-to-Peer Systems[J]. Journal of Computer Science and Technology, 2008, 23(4): 660-671.
    [10]Xiaolan Zhang, Brian King. An Anti-Counterfeiting RFID Privacy Protection Protocol[J]. Journal of Computer Science and Technology, 2007, 22(3): 438-448.
  • Cited by

    Periodical cited type(5)

    1. Ke Wang, Dongmin Yao, Mingyang Pei. What factors influence Chinese Women's nighttime ride-hailing preferences? An ICLV model analysis. Research in Transportation Economics, 2025, 110: 101538. DOI:10.1016/j.retrec.2025.101538
    2. Shixingyue Hu, Yazao Yang. Safety of female ride-hailing passengers: Perception and prevention. Humanities and Social Sciences Communications, 2024, 11(1) DOI:10.1057/s41599-024-02740-z
    3. Hui Ma, Yuan Ping, Yong Zhang, et al. Privacy-Preserving Cross-Zone Ride-Matching for Online Ride-Hailing Service. Mathematical Problems in Engineering, 2022, 2022: 1. DOI:10.1155/2022/5040766
    4. Yousheng Zheng. Personal Information Protection Based on Big Data. Journal of Physics: Conference Series, 2021, 2037(1): 012134. DOI:10.1088/1742-6596/2037/1/012134
    5. M. Fadhil, Parman Sukarno, Aulia Arif Wardana. Intelligent Computing. Lecture Notes in Networks and Systems, DOI:10.1007/978-3-031-62273-1_24

    Other cited types(0)

Catalog

    Article views (68) PDF downloads (0) Cited by(5)
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return