Computer Science ›› 2019, Vol. 46 ›› Issue (8): 212-216.doi: 10.11896/j.issn.1002-137X.2019.08.035

• Information Security • Previous Articles     Next Articles

Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash

ZHOU Yi-hua, LI Guang-hui, YANG Yu-guang, SHI Wei-min   

  1. (Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China)
  • Received:2018-08-25 Online:2019-08-15 Published:2019-08-15

Abstract: With the continuous development of mobile applications and location technologies,Location-Based Services has become more and more widely used.LBS brings convenience to people while also posing a risk of privacy breaches.In recent years,the issue of privacy protection in location services has received continuous attention from researchers,especially the issue of location privacy protection in neighboring queries has been extensively studied.Aiming at the lack of credibility of third-party anonymous servers and the problem of being a system bottleneck,this paper proposed a GeoHash-based neighbor query location privacy protection method that does not depend on third-party anonymous servers for adaptive location privacy protection.The method uses the GeoHash algorithm to encode the exact position coordinates of the user and convert the two-dimensional latitude and longitude coordinates into a one-dimensional string.The LBS server matches the GeoHash encoded string by constructing the Trie prefix tree and returns the query result to the user.Theoretical analysis and experimental results show that the algorithm reduces the query communication overhead and can effectively protect the user’s location privacy information

Key words: GeoHash, Location privacy, Location-Based services, String encoding, Trie

CLC Number: 

  • TP309
[1]WANG L,MENG X F.Location privacy preservation in big data era:A survey[J].Journal of Software,2014,25(4):693-712.(in Chinese) 王璐,孟小峰.位置大数据隐私保护研究综述[J].软件学报,2014,25(4):693-712.
[2]ZHANG X J,GUI X L,WU Z D.Privacy preservation for location-based services:A survey[J].Journal of Software,2015,26(9):2373-2395.(in Chinese) 张学军,桂小林,伍忠东.位置服务隐私保护研究综述[J].软件学报,2015,26(9):2373-2395.
[3]GEDIK B,LIU L.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[J].IEEE Transaction on Mobile Computing,2008,7(1):1-18.
[4]GEDIK B,LIU L.A customizable k-anonymity model for protecting location privacy[C]∥Proceedings of the IEEE International conference on Distributed Computing System(ICDS’05).2005:620-629.
[5]GKOULALASDIVANIS A,KALNIS P,VERYKIOS V S.Providing K-Anonymity in location based services[M].ACM,2010.
[6]BAMBA B,LIU L,PESTI P,et al.Supporting anonymous location queries in mobile environments with privacy grid[C]∥International World Wide Web Conference WWW.2008:237-246.
[7]CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service∥Acm International Symposium on Advances in Geographic Information Systems. ACM,2006.
[8]PARK G G.MobiHide:A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries[M]∥Advances in Spatial and Temporal Databases.DBLP,2007.
[9]KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-based services∥ICPS’05. Proceedings. International Conference on Pervasive Services,2005.IEEE,2005.
[10]YIU M L,JENSEN C S,HUANG X,et al.SpaceTwist:Managing the Trade-Offs Among Location Privacy,Query Performance,and Query Accuracy in Mobile Services[C]∥IEEE 24th International Conference on Data Engineering,2008.ICDE 2008.IEEE,2008.
[11]MOKBEL M F,CHOW C Y,AREF W G.The New Casper:Query Processing for Location Services without Compromising Privacy[C]∥Proceedings of the 32nd International Conference on Very Large Data Bases.Seoul,Korea,2006.
[12]KHOSHGOZARAN A,SHAHABI C,SHIRANI-MEHR H. Location privacy:going beyond K-anonymity,cloaking and anonymizers[M].Springer-Verlag New York,Inc.2011.
[13]KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]∥SSTD’07 Proceedings of the 10th international conference on Advances in spatial and temporal databases.2007:239-257.
[14]GHINITA G,KALNIS P,KHOSHGOZARAN A,et al.Private queries in location based services:Anonymizers are not necessary∥Proceedings of the ACM SIGMOD International Conference on Management of Data.Canada:ACM,2008.
[1] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[2] NIE Xiu-shan, PAN Jia-nan, TAN Zhi-fang, LIU Xin-fang, GUO Jie, YIN Yi-long. Overview of Natural Language Video Localization [J]. Computer Science, 2022, 49(9): 111-122.
[3] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[4] YU Jia-qi, KANG Xiao-dong, BAI Cheng-cheng, LIU Han-qing. New Text Retrieval Model of Chinese Electronic Medical Records [J]. Computer Science, 2022, 49(6A): 32-38.
[5] HAN Hong-qi, RAN Ya-xin, ZHANG Yun-liang, GUI Jie, GAO Xiong, YI Meng-lin. Study on Cross-media Information Retrieval Based on Common Subspace Classification Learning [J]. Computer Science, 2022, 49(5): 33-42.
[6] ZHANG Xin-feng, SONG Bo. A Person Re-identification Method Based on Improved Triple Loss and Feature Fusion [J]. Computer Science, 2021, 48(9): 146-152.
[7] LIU Li-bo, GOU Ting-ting. Cross-modal Retrieval Combining Deep Canonical Correlation Analysis and Adversarial Learning [J]. Computer Science, 2021, 48(9): 200-207.
[8] YANG Hui-min, MA Ting-huai. Compound Conversation Model Combining Retrieval and Generation [J]. Computer Science, 2021, 48(8): 234-239.
[9] ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308.
[10] FENG Xia, HU Zhi-yi, LIU Cai-hua. Survey of Research Progress on Cross-modal Retrieval [J]. Computer Science, 2021, 48(8): 13-23.
[11] WANG Chun-jing, LIU Li, TAN Yan-yan, ZHANG Hua-xiang. Image Retrieval Method Based on Fuzzy Color Features and Fuzzy Smiliarity [J]. Computer Science, 2021, 48(8): 191-199.
[12] SUN Sheng-zi, GUO Bing-hui , YANG Xiao-bo. Embedding Consensus Autoencoder for Cross-modal Semantic Analysis [J]. Computer Science, 2021, 48(7): 93-98.
[13] WANG Hui, ZHU Guo-yu, SHEN Zi-hao, LIU Kun, LIU Pei-qian. Dummy Location Generation Method Based on User Preference and Location Distribution [J]. Computer Science, 2021, 48(7): 164-171.
[14] FENG Jiao, LU Chang-yu. Cross Media Retrieval Method Based on Residual Attention Network [J]. Computer Science, 2021, 48(6A): 122-126.
[15] LUO Jing-jing, TANG Wei-zhen, DING Ji-ting. Research of ATC Simulator Training Values Independence Based on Pearson Correlation Coefficient and Study of Data Visualization Based on Factor Analysis [J]. Computer Science, 2021, 48(6A): 623-628.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!