Abstract

As location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. We argue that a good location privacy preservation scheme should have these properties. First, a user should never expose its precise location to any other entity. Second, a user should be able to specify its own requirement on the strength of privacy preservation, since a stricter preservation requirement may increase its overhead. Third, the scheme should be able to preserve as many as possible aspects of users' privacy under various attacks. With these desired properties in mind, we carefully design an encoding scheme of users' identifiers and a fully distributed architecture for our purpose and propose a privacy preservation scheme based on them. With the help of the encoding scheme and the distributed architecture, we develop a distributed negotiation algorithm to help users conduct negotiations among themselves to find their cloaked regions that satisfy their self-defined requirements without exposing their precise locations. The negotiations are completed without coordination from any central servers, and a random proxy is selected for each individual request, therefore the potential risks caused by any central server (location-based service servers or trusted-third-party servers) are mitigated as much as possible. Experiments show that our scheme can satisfy different strengths of privacy preservation required by each user even under the most severe scenarios.

Highlights

  • Nowadays, a lot of online devices have been equipped with positioning modules like GPS

  • The explosive growth of these devices and the increasing speed of mobile Internet have led to the rapid development of various Location Based Services (LBS) [1], such as Point of Interest (POI) searching and navigation

  • The results show that our scheme can satisfy privacy preservation strength required by users even under attacks

Read more

Summary

INTRODUCTION

A lot of online devices have been equipped with positioning modules like GPS. There are some schemes, such as [15], [16], that include actual locations in final requests to LBS servers, which may expose user’s privacy when the adversary has known some side-information of the target user. With these problems in mind, we design a distributed P2P-based scheme with the following desired properties. We design a distributed negotiation mechanism to determine cloaked regions for users based on their coarse-grained locations and personalized privacy requirements.

RELATED WORK
NEGOTIATING CLOAKED REGIONS
EXPERIMENT AND ANALYSIS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call