Abstract
In recent years, the problem of location privacy protection in location-based service (LBS) has drawn a great deal of researchers’ attention. However, the existing technologies of location privacy protection rarely consider the personal visit probability and other side-information, which are likely to be exploited by attackers. In order to protect the users’ location privacy more effectively, we propose a Personal Location Anonymity (PLA) combining side-information to achieve k-anonymity. On the offline phase, we utilize Kernel Density Estimation (KDE) approach to obtain the personal visit probability for each cell of space according to a specific users’ visited locations. On the online phase, the dummy locations for each user’s query can be selected based on both the entropy of personal visit probability and the area of Cloaking Region (CR). We conduct extensive experiments on the real dataset to verify the performance of privacy protection degree, where the privacy properties are measured by the location information entropy and the area of CR.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yiu, M.L., Jensen, C.S., Moller, J., et al.: Design and analysis of a ranking approach to private location-based services[J]. ACM Trans. Database Syst. (TODS) (2011)
Machanavajjhala, A., Kifer, D., Gehrke, J., et al.: l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Disc. Data (TKDD) 5, 1–47 (2007)
Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24, 1506–1519 (2012)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: Query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases. VLDB Endowment (2006)
Niu, B., Li, Q., Zhu, X., et al.: Achieving k-anonymity in privacy-aware location-based services. In: INFOCOM, 2014 Proceedings. IEEE (2014)
Zhang, C., Huang, Y.: Cloaking locations for anonymous location based services: A hybrid approach. Geoinformatica 13, 159–182 (2009)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the First International Conference on Mobile Systems, Application, and Services. USENIX, San Francisco (2003)
Che, Y., Chiew, K., Hong, X., et al.: SALS: Semantics-aware location sharing based on cloaking zone in mobile social networks. In: Proceedings of the First SIGSPATIAL International Workshop on Mobile Geographic Information Systems (2012)
Bamba, B., Liu, L., Yigitoglu, E.: Road network-aware aonymization in mobile systems with reciprocity support. In: 2015 24th International Conference on Computer Communication and Networks (ICCCN). IEEE (2015)
Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: Architecture and algorithms. IEEE Trans. Mob. Comput. 14, 495–508 (2015)
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: International Conference on Pervasive Services, 2005 ICPS 2005, Proceedings. IEEE (2005)
Lu, H., Jensen, C.S., Yiu, M.L.: PAD: Privacy-area aware, dummy-based location privacy in mobile services. In: Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access. ACM (2008)
Jia, J., Zhang, F.: K-anonymity algorithm using encryption for location privacy protection. Int. J. Multimedia Ubiquit. Eng. 10, 155–166 (2015)
Ghinita, G., Kalnis, P., Khoshgozaran, A., et al.: Private queries in location based services: Anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM (2008)
Lu, R., Lin, X., Shi, Z., et al.: PLAM: A privacy-preserving framework for local-area mobile social networks. In: 2014 Proceedings IEEE INFOCOM. IEEE (2014)
Andrs, M.E., Bordenabe, N.E., Chatzikokolakis, K., et al.: Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security. ACM (2013)
Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. In: 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW). IEEE (2013)
Zhang, J.D., Chow, C.Y.: iGSLR: Personalized geo-social location recommendation: a kernel density estimation approach. In: Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM (2013)
Silverman, B.W.: Density Estimation Stat. Data Anal. CRC Press, Boca Raton (1986)
Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: User movement in location-based social networks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2011)
Acknowledgment
This work was supported by NSFC grants (Nos. 61170085, 61472141, 61321064), Shanghai Knowledge Service Platform Project (No. ZF1213), Shanghai Agriculture Science Program (2015) Number 3-2 and Project of Shanghai Science and Technology Committee under Grant (No. 15110500700).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhao, D., Ma, J., Wang, X., Tian, X. (2016). Personalized Location Anonymity - A Kernel Density Estimation Approach. In: Cui, B., Zhang, N., Xu, J., Lian, X., Liu, D. (eds) Web-Age Information Management. WAIM 2016. Lecture Notes in Computer Science(), vol 9659. Springer, Cham. https://doi.org/10.1007/978-3-319-39958-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-39958-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-39957-7
Online ISBN: 978-3-319-39958-4
eBook Packages: Computer ScienceComputer Science (R0)