Computer Science ›› 2019, Vol. 46 ›› Issue (5): 122-128.doi: 10.11896/j.issn.1002-137X.2019.05.019

Previous Articles     Next Articles

Pre-cache Based Privacy Protection Mechanism in Continuous LBS Queries

GU Yi-ming1,2, BAI Guang-wei1, SHEN Hang1,3, HU Yu-jia1,2   

  1. (College of Computer Science and Technology,Nanjing Tech University,Nanjing 211816,China)1
    (State Key Laboratory for Novel Software Technology (Nanjing University),Nanjing 210093,China)2
    (National Engineering Research Center for Communication and Network Technology (Nanjing University of Posts and Telecommunications),Nanjing 210003,China)3
  • Received:2018-04-12 Revised:2018-07-15 Published:2019-05-15

Abstract: Location data bring huge economic benefits,but the problem of leaking location privacy also follows.Aiming at the problem of maximum movement boundary (MMB) attack in continuous R-range queries,this paper proposed a pre-cache based privacy protection mechanism.First,a pseudo-random generalization method is proposed to control the generalized area of the snapshot query on the basis of protecting location privacy.Then,the upcoming intersection is predicted within the generalized query area.The next generalized query area is calculated and pre-cached with the intersection position.Through the pre-caching method,the time correlation between consecutive queries is reduced and the privacy protection level is improved.Performance analysis and experimental results show that the proposed privacy protection mechanism can effectively reduce the privacy leakage caused by the maximum movement boundary attack.

Key words: Continuous queries, Edge computing, Maximum movement boundary attack, Privacy protection

CLC Number: 

  • TP309.2
[1]NIU B,LI Q,ZHU X,et al.Achieving k-anonymity in privacy-aware location-based services[C]∥INFOCOM,2014 Proceedings IEEE.IEEE,2014:754-762.
[2]NIU B,ZHANG Z,LI X,et al.Privacy-area aware dummy gene-ration algorithms for location-based services[C]∥2014 IEEE International Conference on Communications (ICC).IEEE,2014:957-962.
[3]SUN Y,ZHANG B,ZHAO B,et al.Mix-zones optimal deployment for protecting location privacy in VANET[J].Peer-to-Peer Networking and Applications,2015,8(6):1108-1121.
[4]CICEK A E,NERGIZ M E,SAYGIN Y.Ensuring location diversity in privacy-preserving spatio-temporal data publishing[J].The VLDB Journal,2014,23(4):609-625.
[5]ZHANG X,XIA Y,BAE H Y.A novel location privacy preservation method for moving object[J].International Journal of Security and ItsApplications,2015,9(2):1-12.
[6]SHI W S,SUN H,CAO J,et al.Edge Computing:An Emerging Computing Model for Internet of Everything Era[J].Journal of Computing Research and Development,2017,54(5):907-924.(in Chinese)施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924.
[7]WAN S,LI F H,NIU B,et al.Research progress on locationprivacy-preserving techniques[J].Journal of Communications,2017,37(12):124-141.(in Chinese)万盛,李凤华,牛犇,等.位置隐私保护技术研究进展[J].通信学报,2017,37(12):124-141.
[8]YANG X,ZHU Y,HU Q.Improved location privacy protection method based on SpaceTwist[J].Journal of Hebei University (Natural Science Edition),2017,37(3):287-293.
[9]NIU B,ZHU X,LI W,et al.Epcloak:An efficient and privacy-preserving spatial cloaking scheme for lbss[C]∥2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).IEEE,2014:398-406.
[10]KIM Y K,HOSSAIN A,HOSSAIN A A,et al.Hilbert-orderbased spatial cloaking algorithm in road network[J].Concurrency and Computation:Practice and Experience,2013,25(1):143-158.
[11]CHOW C Y,MOKBEL M F.Enabling private continuous queries for revealed user locations[C]∥International Symposium on Spatial and Temporal Databases.Berlin:Springer,2007:258-275.
[12]ZHOU C L,MA C G,YANG S T.Location privacy-preserving method for LBS continuous KNN query in road networks[J].Journal of Computer Research and Development,2014,49(7):1001-1016.(in Chinese)周长利,马春光,杨松涛.路网环境下保护 LBS 位置隐私的连续 KNN 查询方法[J].Journal of Computer Research and Development,2014,49(7):1001-1016.
[13]CHENG R,ZHANG Y,BERTINO E,et al.Preserving user location privacy in mobile data management infrastructures[C]∥International Workshop on Privacy Enhancing Technologies.Berlin:Springer,2006:393-412.
[14]GHINITA G,SILVESTRI C,SILVESTRI C,et al.Preventingvelocity-based linkage attacks in location-aware applications[C]∥ACM Sigspatial International Conference on Advances in Geographic Information Systems.ACM,2009:246-255.
[15]HASHEM T,KULIK L,ZHANG R.Countering overlappingrectangle privacy attack for moving knnqueries[J].Information Systems,2013,38(3):430-453.
[16]NGUYEN N,HAN S,SHIN M.URALP:unreachable region aware location privacy against maximum movement boundary attack[J].International Journal of Distributed Sensor Networks,2015,11(8):246216.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] SUN Hui-ting, FAN Yan-fang, MA Meng-xiao, CHEN Ruo-yu, CAI Ying. Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC [J]. Computer Science, 2022, 49(9): 242-248.
[3] YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253.
[4] LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279.
[5] YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495.
[6] FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605.
[7] LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627.
[8] XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11.
[9] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[10] ZHANG Hai-bo, ZHANG Yi-feng, LIU Kai-jian. Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC [J]. Computer Science, 2022, 49(2): 304-311.
[11] LIN Chao-wei, LIN Bing, CHEN Xing. Study on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment [J]. Computer Science, 2022, 49(2): 312-320.
[12] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[13] LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20.
[14] LIANG Jun-bin, ZHANG Hai-han, JIANG Chan, WANG Tian-shu. Research Progress of Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing [J]. Computer Science, 2021, 48(7): 316-323.
[15] XUE Yan-fen, GAO Ji-mei, FAN Gui-sheng, YU Hui-qun, XU Ya-jie. Energy-aware Fault-tolerant Collaborative Task Execution Algorithm in Edge Computing [J]. Computer Science, 2021, 48(6A): 374-382.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!