[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Authentication User's Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services

Published: 01 June 2015 Publication History

Abstract

Location based services (LBSs) are gaining importance due to the advancement in mobile networks and positioning technologies. The proliferation of location-based services in recent years has highlighted the need to consider location privacy. This has led to the development of methods enhancing location privacy, and to the investigation of reasons for sharing location information. While computational attacks on location privacy and their prevention have attracted a lot of research, attacks based on humans strategies and tactics have mostly been considered implicitly. Nevertheless, in querying LBSs, a user send its exact locations to their location service providers but in the process, location information of the users are misused either purposefully or otherwise by service providers creating privacy issues for users. It has therefore become important that mechanisms necessary to protect the privacy of users are adopted when querying location based services. It's on this premise that we introduced a novel query privacy algorithm called the authentication speed dynamic transportation mode cloaking algorithm for continuous query LBSs that considers users' similarity in speed, direction and travelling with the same transport mode for cloaking for anonymization. Experimental evaluation of the algorithm on a real world map shows that our model ensures total privacy for users, enhanced privacy guarantee, improves quality of service significantly and achieved an excellent performance measure also we compare our method with existing privacy protection methods such as V-DCA, DSDCA, AVD-DCA,D-TC and GCA.

References

[1]
Mun, M. Y., Kim, D. H., Shilton, K., Estrin, D., Hansen, M. H., & Govindan, R. (2014). PDVLoc: A personal data vault for controlled location data sharing. Transactions on Sensor Networks (TOSN), 10(4), 58.
[2]
Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2014). Travel recommendation using geo-tagged photos in social media for tourist. Journal Wireless Personal Communications.
[3]
Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661---686.
[4]
Wernke, M., Skvortsov, P., Dürr, F., & Rothermel, K. (2014). A classification of location privacy attacks and approaches. Personal and Ubiquitous Computing, 18(1), 163---175.
[5]
Sun, M., & Tan, G. (2014). NativeGuard: Protecting android applications from third-party native libraries. In WiSec '14: Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks.
[6]
Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. Architecture of hybrid mobile social networks for efficient content delivery. Journal Wireless Personal Communications.
[7]
Kamenyi, D. M., Wang, Y., Zhang, F., & Memon, I. (2013). Authenticated privacy preserving for continuous query in location based services. Journal of Computational Information Systems, 9(24), 9857---9864.
[8]
Chow, C.-Y., Mokbel, M. F., Bao, J., & Liu, X. (2011). Query-aware location anonymization for road networks. GeoInformatica, 15(3), 571---607.
[9]
Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., & Martínez, S. (2014). Enhancing data utility in differential privacy via microaggregation-based $$k$$kk-anonymity. The International Journal on Very Large Data Bases, 23(5), 771---794.
[10]
Serwadda, A., & Phoha, V. V. (2013). Examining a large keystroke biometrics dataset for statistical-attack openings. Transactions on Information and System Security, 16(2), 1---30.
[11]
Pan, X., Meng, X., & Xu, J. (2009). Distortion-based anonymity for continuous queries in location-based mobile services, ACM GIS.
[12]
Akhtar, R., Amin, N. U., Memon, I., & Shah, M. (2013). Source: Proceedings of SPIE--The international society for optical engineering (vol. 8768).
[13]
Nilizadeh, S., Kapadia, A., & Ahn, Y.-Y. (2014). Community-enhanced de-anonymization of online social networks. In CCS '14: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security.
[14]
Stenneth, L., Wolfson, O., Xu, B., & Yu, P. S. (2012). PhonePark: Street parking using mobile phones. In Proceedings--2012 IEEE 13th international conference on mobile data management (MDM 2012) (pp. 278---279).
[15]
Xiong, J., Xiong, J., & Claramunt, C. (2014). A spatial entropy-based approach to improve mobile risk-based authentication. In GeoPrivacy '14: Proceedings of the 1st ACM SIGSPATIAL international workshop on privacy in geographic information collection and analysis.
[16]
Ahmadinejad, S. H., & Fong, P. W. L. (2013). On the feasibility of inference attacks by third-party extensions to social network systems. In ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security.
[17]
Pan, X., Meng, X., & Xu, J. (2011). Protecting location privacy against location-dependent attack in mobile services. Knowledge and Data Engineering, 24(8), 1506---1519.
[18]
Wang, Y., He, l.-p., Peng, J., Zhang, T., & Li, H. (2012). Privacy preserving for continuous query in location based services. In Parallel and Distributed Systems (ICPADS), IEEE.
[19]
Gustav, Y. H., Wang, Y., Kamenyi, D. M., Zhang, F., & Memon, I. (2013). Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) (pp. 433---436).
[20]
Stenneth, L., & Yu, P. S. (2010). Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries. In CollaborateCom.
[21]
Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys'03. New York, NY, USA: ACM.
[22]
Gedik, B., & Liu, L. (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing --- TMC, 7(1), 1---18.
[23]
Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. In INFOCOM.
[24]
Wang, Y., Zhou, L., & Wang, R. (2011). A novel frequency sense solution for cognitive radio based on tracing localization. In 2011 IEEE international conference on communications (ICC).
[25]
Sun, Y., Yin, L., Liu, L., & Xin, S. (2014). Toward inference attacks for k-anonymity. Personal and Ubiquitous Computing, 18(8).
[26]
Cheng, R., Zhang, Y., Bertino, E., & Prabhakar, S. (2006). Preserving user location privacy in mobile data management infrastructures. In Proceedings of the privacy enhancing technology workshop (PET '06).
[27]
Du, J., Xu, J., Tang, X., & Hu, H. (2007). iPDA: Enabling privacy-preserving location-based services. In Proceedings of the conference on mobile data management (MDM).
[28]
Xu, J., Tang, X., Hu, H., & Du, J. (2010). Privacy-conscious location-based queries in mobile environments. IEEE Transactions on Parallel and Distributed Systems, 21(3), 313---326.
[29]
Domenic, M. K., Wang, Y., Zhang, F., Memon, I., & Gustav, Y. H. (2013). Preserving users' privacy for continuous query services in road networks. In Proceedings of 2013 6th international conference on information management, innovation management and industrial engineering, ICIII 2013 (vol. 1, pp. 352---355).
[30]
Brinkhoff, T. (2008). Network-based generator of moving objects. http://www.fhoow.de/institute/iapg/personen/brinkhoff/generator/

Cited By

View all
  • (2022)Security and Privacy Protection of Car Networking Consistent Algorithm Based on Smart Multi-SensorScientific Programming10.1155/2022/11600212022Online publication date: 1-Jan-2022
  • (2021)Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road NetworksWireless Personal Communications: An International Journal10.1007/s11277-020-07854-6116:4(3309-3329)Online publication date: 1-Feb-2021
  • (2020)PPSTS: Privacy Preservation in Geographical Data by Spatio-Temporal Shifting Using Elliptic Curve CryptographyWireless Personal Communications: An International Journal10.1007/s11277-020-07604-8115:2(929-947)Online publication date: 1-Nov-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal  Volume 82, Issue 3
June 2015
781 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 June 2015

Author Tags

  1. Location based services (LBSs)
  2. Privacy preservation
  3. Quality of service (QoS)
  4. Query linking privacy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Security and Privacy Protection of Car Networking Consistent Algorithm Based on Smart Multi-SensorScientific Programming10.1155/2022/11600212022Online publication date: 1-Jan-2022
  • (2021)Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road NetworksWireless Personal Communications: An International Journal10.1007/s11277-020-07854-6116:4(3309-3329)Online publication date: 1-Feb-2021
  • (2020)PPSTS: Privacy Preservation in Geographical Data by Spatio-Temporal Shifting Using Elliptic Curve CryptographyWireless Personal Communications: An International Journal10.1007/s11277-020-07604-8115:2(929-947)Online publication date: 1-Nov-2020
  • (2020)FTR: features tree based routing in mobile social networksWireless Networks10.1007/s11276-018-1809-x26:1(283-291)Online publication date: 1-Jan-2020
  • (2019)A secure routing protocol with regional partitioned clustering and Beta trust management in smart homeWireless Networks10.1007/s11276-018-01916-125:7(3805-3823)Online publication date: 1-Oct-2019
  • (2019)Anonymous three-factor authenticated key agreement for wireless sensor networksWireless Networks10.1007/s11276-017-1604-025:4(1461-1475)Online publication date: 1-May-2019
  • (2019)Multiple mix zones de-correlation trajectory privacy model for road networkTelecommunications Systems10.1007/s11235-019-00551-170:4(557-582)Online publication date: 1-Apr-2019
  • (2018)Protecting Privacy in Location-Based Services Through Location Anonymization Using Cloaking Algorithms Based on Connected ComponentsWireless Personal Communications: An International Journal10.1007/s11277-018-5852-9102:1(449-471)Online publication date: 1-Sep-2018
  • (2018)Location monitoring approachMultimedia Tools and Applications10.1007/s11042-017-4469-477:5(5563-5607)Online publication date: 1-Mar-2018
  • (2017)Dynamic path privacy protection framework for continuous query service over road networksWorld Wide Web10.1007/s11280-016-0403-320:4(639-672)Online publication date: 1-Jul-2017
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media