[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2442810.2442820acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

SALS: semantics-aware location sharing based on cloaking zone in mobile social networks

Published: 06 November 2012 Publication History

Abstract

There is a potential privacy breach when users access various location-based social applications on a mobile social network (MSN), e.g., sharing locations with friends. To preserve location privacy, one of the most common methods is to use a coarse or fake location instead of a user's exact location. However, most of these previous approaches only provide geometric strategies without considering the semantic context of the geographical locations. For example, if a cloaked region contains a part of a lake, where no boats are allowed, an adversary can easily prune the cloaked region to a smaller range covering a user's actual location.
In this paper, we propose SALS, a semantics-aware location sharing framework based on cloaking zone for an MSN environment. By considering a user's social relations and activities which are available in an MSN environment, SALS does not assume any trustworthy entities, including strangers, friends or any third parties. As a solution, SALS enables users to cooperate with each other, in a Peer-to-Peer (P2P) way, to generate the cloaking zones, which will be used instead of the actual locations. Different from the previous cloaking techniques, SALS considers the semantic location which can influence the distribution probability of a user's locations. We also propose metrics for measuring the quality of the cloaking zone. The evaluation shows that our method can well defend the semantic-location attack.

References

[1]
A. Beresford and F. Stajano. Location privacy in pervasive computing. Pervasive Computing, IEEE, 2(1):46--55, 2003.
[2]
W. Chang, J. Wu, and C. C. Tan. Enhancing mobile social network privacy. In Proceedings of the IEEE Global Communications Conference (Globecom), pages 1--5, 2011.
[3]
Y. Che, Q. Yang, and X. Hong. A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks. In Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC), pages 2543--2548, April 2012.
[4]
C. Y. Chow, M. F. Mokbel, and W. G. Aref. Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems (TODS), 34(4):24:1--24:48, 2009.
[5]
C.-Y. Chow, M. F. Mokbel, and X. Liu. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of 14th ACM International Symposium on Geographic Information Systems (ACM-GIS), pages 171--178, 2006.
[6]
C.-Y. Chow, M. F. Mokbel, and X. Liu. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica, 15(2):351--380, April 2011.
[7]
M. Damiani, E. Bertino, and C. Silvestri. The probe framework for the personalized cloaking of private locations. Transactions on Data Privacy, 3(2):123--148, 2010.
[8]
M. L. Damiani, C. Silvestri, and E. Bertino. Fine-grained cloaking of sensitive positions in location-sharing applications. IEEE Pervasive Computing, 10(4):64--72, 2011.
[9]
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications and Services (MobiSys), pages 31--42, 2003.
[10]
M. F. Mokbel, C. Y. Chow, and W. G. Aref. The new Casper: Query processing for location services without compromising privacy. In Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), pages 763--774, 2006.
[11]
G. Pei, M. Gerla, and X. Hong. LANMAR: Landmark routing for large scale wireless ad hoc networks with group mobility. In Proceedings of 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pages 11--18, 2000.
[12]
K. P. N. Puttaswamy and B. Y. Zhao. Preserving privacy in location-based mobile social applications. In Proceedings of the 11th International Workshop on Mobile Computing Systems & Applications (HotMobile), pages 1--6, 2010.
[13]
W. Wei, F. Xu, and Q. Li. MobiShare: Flexible privacy-preserving location sharing in mobile online social networks. In Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM), pages 2616--2620, 2012.
[14]
X. Wu, J. Liu, X. Hong, and E. Bertino. Anonymous geo-forwarding in manets through location cloaking. IEEE Transactions on Parallel and Distributed Systems (TPDS), 19(10):1297--1309, 2008.
[15]
G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: three protocols for location privacy. In Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET), pages 62--76, 2007.

Cited By

View all
  • (2019)Solutions for Data Quality in GIS and VGI: A Systematic Literature ReviewNew Knowledge in Information Systems and Technologies10.1007/978-3-030-16181-1_61(645-654)Online publication date: 27-Mar-2019
  • (2016)The Effect of Location Granularity on Semantic Location InferencesProceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS)10.1109/HICSS.2016.276(2197-2204)Online publication date: 5-Jan-2016
  • (2016)Personalized Location Anonymity - A Kernel Density Estimation ApproachWeb-Age Information Management10.1007/978-3-319-39958-4_5(52-64)Online publication date: 2-Jun-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiGIS '12: Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
November 2012
112 pages
ISBN:9781450316996
DOI:10.1145/2442810
  • Conference Chair:
  • Chi-Yin Chow
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cloaking zone
  2. location privacy
  3. mobile social network
  4. semantic location

Qualifiers

  • Research-article

Funding Sources

  • MOE-Intel IT Research Fund of China

Conference

SIGSPATIAL'12
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Solutions for Data Quality in GIS and VGI: A Systematic Literature ReviewNew Knowledge in Information Systems and Technologies10.1007/978-3-030-16181-1_61(645-654)Online publication date: 27-Mar-2019
  • (2016)The Effect of Location Granularity on Semantic Location InferencesProceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS)10.1109/HICSS.2016.276(2197-2204)Online publication date: 5-Jan-2016
  • (2016)Personalized Location Anonymity - A Kernel Density Estimation ApproachWeb-Age Information Management10.1007/978-3-319-39958-4_5(52-64)Online publication date: 2-Jun-2016
  • (2015)X-RegionInternational Journal of Communication Systems10.1002/dac.265028:1(167-186)Online publication date: 10-Jan-2015
  • (2014)SPSProceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications - Volume 849110.1007/978-3-319-07782-6_30(324-335)Online publication date: 23-Jun-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media