We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Wei-Wei Ni, Jin-Wang Zheng, Zhi-Hong Chong. HilAnchor: Location Privacy Protection in the Presence of Users' Preferences[J]. Journal of Computer Science and Technology, 2012, (2): 413-427. DOI: 10.1007/s11390-012-1231-2
Citation: Wei-Wei Ni, Jin-Wang Zheng, Zhi-Hong Chong. HilAnchor: Location Privacy Protection in the Presence of Users' Preferences[J]. Journal of Computer Science and Technology, 2012, (2): 413-427. DOI: 10.1007/s11390-012-1231-2

HilAnchor: Location Privacy Protection in the Presence of Users' Preferences

Funds: Supported by the National Natural Science Foundation of China under Grant Nos. 61003057 and 60973023.
More Information
  • Received Date: June 28, 2011
  • Revised Date: January 15, 2012
  • Published Date: March 04, 2012
  • Location privacy receives considerable attentions in emerging location based services. Most current practices however either ignore users' preferences or incompletely fulfill privacy preferences. In this paper, we propose a privacy protection solution to allow users' preferences in the fundamental query of k nearest neighbors (kNN). Particularly, users are permitted to choose privacy preferences by specifying minimum inferred region. Via Hilbert curve based transformation, the additional workload from users' preferences is alleviated. Furthermore, this transformation reduces time-expensive region queries in 2-D space to range the ones in 1-D space. Therefore, the time efficiency, as well as communication efficiency, is greatly improved due to clustering properties of Hilbert curve. Further, details of choosing anchor points are theoretically elaborated. The empirical studies demonstrate that our implementation delivers both flexibility for users' preferences and scalability for time and communication costs.
  • [1]
    Gruteser M, Schelle G, Jain A, Han R, Grunwald D. Privacy-aware location sensor networks. In Proc. the 9th Workshopon Hot Topics in Operating Systems (HotOS 2003), Hawaii,USA, May 18-21, 2003, pp.163-167.
    [2]
    Beresford A R, Stajano F. Location privacy in pervasive com-puting. IEEE Pervasive Computing, 2003, 2(1): 46-55.
    [3]
    Ronssopoulos Nick R, Kelley S, Vincent F. Nearest neighborqueries. In Proc. the ACM SIGMOD International Confe-rence on Management of Data (SIGMOD 1995), San Jose,California, USA, May 22-25, 1995, pp.71-79.
    [4]
    Xiao Z, Meng X F, Xu J L. Quality aware privacy protec-tion for location-based services. In Proc. the 12th Inter-national Conference on Database Systems for Advanced Ap-plications (DASFAA 2007), Bangkok, Thailand, April 9-12,2007, pp.434-446.
    [5]
    Bettini C, Wang X S, Jajodia S. Protecting privacy againstlocation-based personal identification. In Proc. the 2ndVLDB Workshop on Secure Data Management (SDM 2005),Trondheim, Norway, September 2-3, 2005, pp.185-199.
    [6]
    Mokbel M F, Chow C Y, Aref W G. The new Casper: Queryprocessing for location services without compromising pri-vacy. In Proc. the 32nd International Conference on VeryLarge Data Bases (VLDB 2006), Seoul, Korea, September12-15, 2006, pp.763-774.
    [7]
    Li P Y, Peng W C, Wang T W, Ku W S, Xu J, Hamilton J A.A cloaking algorithm based on spatial networks for locationprivacy. In Proc. IEEE International Conference on SensorNetworks, Ubiquitous, and Trustworthy Computing (SUTC2008), Taichung, Taiwan, China, June 11-13, 2008, pp.90-97.
    [8]
    Duckham M, Kulik L. A formal model of obfuscation and ne-gotiation for location privacy. In Proc. the 3th InternationalConference on Pervasive Computing (Pervasive 2005), Mu-nich, Germany, May 8-13, 2005, pp.152-170.
    [9]
    Kalnis P, Ghinita G, Mouratidis K, Papadias D. Prevent-ing location-based identity inference in anonymous spatialqueries. IEEE Trans. Knowl. Data Eng., 2007, 19(12): 1719-1733.
    [10]
    Ghinita G, Kalnis P, Skiadopoulos S. PRIVE: Anonymouslocation-based queries in distributed mobile systems. InProc. the 16th International Conference on World WideWeb (WWW 2007), Banff, Alberta, Canada, May 8-12, 2007,pp.371-380.
    [11]
    Indyk P, Woodruff D P. Polylogarithmic private approxima-tions and efficient matching. In Proc. the 3rd Theory ofCryptography Conference (TCC 2006), New York, NY, USA,March 4-7, 2006, pp.245-264.
    [12]
    Khoshgozaran A, Shahabi C. Blind evaluation of nearestneighbor queries using space transformation to preserve lo-cation privacy. In Proc. the 10th International Conferenceon Advances in Spatio and Temporal Databases (SSTD 2007),Boston, MA, USA, July 16-18, 2007, pp.239-257.
    [13]
    Yiu M L, Jensen C S, Huang X G, Lu H. SpaceTwist: Manag-ing the trade-offs among location privacy, query performance,and query accuracy in mobile services. In Proc. the 24th In-ternational Conference on Data Engineering (ICDE 2008),Canc?un, México, April 7-12, 2008, pp.366-375.
    [14]
    Gong Z Q, Sun G Z, Xie X. Protecting privacy in location-based services using k-anonymity without cloaked region. InProc. the 11th International Conference on Mobile DataManagement (MDM 2010), Kanas City, Missouri, USA, May23-26, 2010, pp.366-371.
    [15]
    Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K L.Private queries in location based services: Anonymizers arenot necessary. In Proc. the ACM SIGMOD InternationalConference on Management of Data (SIGMOD 2008), Van-couver, BC, Canada, June 9-12, 2008, pp.121-132.
    [16]
    Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving userlocation privacy in mobile data management infrastructures.In Proc. the 6th Workshop on Privacy Enhancing Technolo-gies (PET 2006), Cambridge, UK, June 28-30, 2006, pp.393-412.
    [17]
    Pan X, Xu J L, Meng X F. Protecting location privacyagainst location-dependent attacks in mobile services. IEEETransactions on Knowledge and Data Engineering, 2011,http://doi.ieeecomputersociety.org/10.1109/TKDE.2011.105.
    [18]
    Xu J L, Tang X Y, Hu H B, Du J. Privacy-conscious location-based queries in mobile environments. IEEE Trans. ParallelDistrib. Syst., 2010, 21(3): 313-326.
    [19]
    Papadopoulos S, Bakiras S, Papadias D. Nearest neighborsearch with strong location privacy. PVLDB, 2010, 3(1): 619-629.
    [20]
    Moon B, Jagadish H V, Faloutsos C, Saltz J H. Analysis of theclustering properties of the Hilbert space-filling curve. IEEETrans. Knowl. Data Eng., 2001, 13(1): 124-141.
  • Cited by

    Periodical cited type(1)

    1. Chitra Sabapathy Ranganathan, Rajeshkumar Sampathrajan, P L Kishan Kumar Reddy, et al. Big Data Infrastructures Using Apache Storm for Real-Time Data Processing. 2025 International Conference on Intelligent Control, Computing and Communications (IC3), DOI:10.1109/IC363308.2025.10956412

    Other cited types(0)

Catalog

    Article views (33) PDF downloads (1393) Cited by(1)
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return