User Privacy Preference Support in Location Privacy-Preserving Nearest Neighbor Query
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61370077, 61003057)

  • Article
  • | |
  • Metrics
  • |
  • Reference [46]
  • |
  • Related [20]
  • |
  • Cited by [1]
  • | |
  • Comments
    Abstract:

    Privacy protection problem in location based service receives continuous attentions in recent years, especially for location privacy protection in location based nearest neighbors query. Existing work however often neglects or fails to cultivate in accommodating query users' privacy preference requirements. The constraint of privacy preference burdens the trade-off between location privacy protection and quality of service in privacy-aware location based query service. Several issues need to be addressed:(1) Privacy preferences contradict with privacy models diametrically in terms of personality and commonality they focus on; (2) There is a dilemma between privacy preferences and query performance that preferences require intermediate query results be dynamic and adjustable while simplified intermediate query results commonly promise good performances; and (3) Privacy preferences incur the attack originated from intersection inferring to candidate answer sets in continuous location based queries. In this survey, the privacy preference problem in location based nearest neighbor query is identified and presented. The performance of existing location obfuscation and query techniques, as well as their ability in accommodating users' privacy preferences, are discussed in terms of location obfuscation principle and inherent restricting mechanism between nearest neighbor query performance and location protection. Subsequently, inherent restricting mechanism between location privacy preserving nearest neighbors query and privacy preference support is detailed, and some major problems originated from location privacy preference are demonstrated. Finally, some possible solutions to these problems are elaborated and the future research work is suggested.

    Reference
    [1] Jiang B, Yao XB. Location-Based services and GIS in perspective. Computers, Environment and Urban Systems, 2006,30(6):712-725.[doi:10.1016/j.compenvurbsys.2006.02.003]
    [2] Zhou AY, Yang B, Jin CQ, Ma Q. Location based services:Architecture and progress. Chinese Journal of Computers, 2011,34(7):1155-1171(in Chinese with English abstract).[doi:10.3724/SP.J.1016.2011.01155]
    [3] Wang L, Meng XF. Location privacy preservation in big data era:A survey. Ruan Jian Xue Bao/Journal of Software, 2014,25(4):693-712(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4551.htm[doi:10.13328/j.cnki.jos.004551]
    [4] Ni WW, Zhen JW, Chong ZH. HilAnchor:Location privacy protection in the presence of users' preferences. Lecture Notes in Computer Science, 2011,6897(2):340-352.
    [5] Lin X, Li SP, Yang CH. Attacking algorithms against continuous queries in LBS and anonymity measurement. Ruan Jian Xue Bao/Journal of Software, 2009,20(4):1058-1068(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3428.htm[doi:10.3724/SP.J.1001.2009.03428]
    [6] Chow CY, Mokbel MF. Enabling private continuous queries for revealed user locations. In:Papadias D, Zhang DH, Kollios G, eds. Proc. of the 10th Int'l Symp. on Advances in Spatial and Temporal Databases (SSTD 2007). Berlin, Heidelberg:Springer-Verlag, 2007.258-275.[doi:10.1007/978-3-540-73540-3_15]
    [7] Pan X, Hao X, Meng XF. Privacy preserving towards continuous query in location based services. Journal of Computer Research and Development, 2010,47(1):121-129(in Chinese with English abstract).
    [8] Palanisamy B, Liu L. Mobimix:Protecting location privacy with mix-zones over road networks. In:Abiteboul S, Böhm K, Koch C, Tan KL, eds. Proc. of the 27th Int'l Conf. on Data Engineering (ICDE 2011). Los Alamitos:IEEE Computer Society, 2011.494-505.[doi:10.1109/ICDE.2011.5767898]
    [9] Xue J, Liu XY, Yang XC, Wang B. A privacy preserving approach on road network. Chinese Journal of Computers, 2011,34(5):865-878(in Chinese with English abstract).[doi:10.3724/SP.J.1016.2011.00865]
    [10] Kalnis P, Ghinita G, Mouratidis K, Papadias D. Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. on Knowledge and Data Engineering, 2007,19(12):1719-1733.[doi:10.1109/TKDE.2007.190662]
    [11] Gedik B, Liu L. Protecting location privacy with personalized k-anonymity:Architecture and algorithms. IEEE Trans. on Mobile Computing, 2008,7(1):1-18.[doi:10.1109/TMC.2007.1062]
    [12] Chow CY, Mokbel MF, Aref WG. Casper*:Query processing for location services without compromising privacy. ACM Trans. on Database Systems, 2009,34(4):1-45.[doi:10.1145/1620585.1620591]
    [13] Khoshgozaran A, Shahabi C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In:Papadias D, Zhang DH, Kollios G, eds. Proc. of the 10th Int'l Symp. on Advances in Spatial and Temporal Databases (SSTD 2007). Berlin, Heidelberg:Springer-Verlag, 2007.239-257.[doi:10.1007/978-3-540-73540-3_14]
    [14] Yiu ML, Jensen CS, Huang XG, Lu H. SpaceTwist:Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In:Alonso G, Blakeley JA, Chen ALP, eds. Proc. of the 24th Int'l Conf. on Data Engineering (ICDE 2008). Los Alamitos:IEEE Computer Society, 2008.366-375.[doi:10.1109/ICDE.2008.4497445]
    [15] Papadopoulos S, Bakiras S, Papadias D. Nearest neighbor search with strong location privacy. Proc. of the VLDB Endowment, 2010,3(1-2):619-629.[doi:10.14778/1920841.1920920]
    [16] Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL. Private queries in location based services:Anonymizers are not necessary. In:Wang JTL, ed. Proc. of the 2008 ACM SIGMOD Int'l Conf. on Management of Data. New York:ACM Press, 2008.121-132.[doi:10.1145/1376616.1376631]
    [17] Paulet R, Kaosar MG, Yi X, Bertino E. Privacy-Preserving and content-protecting location based queries. In:Kementsietsidis A, Salles MAV, eds. Proc. of the IEEE 28th Int'l Conf. on Data Engineering (ICDE 2012). Los Alamitos:IEEE Computer Society, 2012.44-53.[doi:10.1109/ICDE.2012.95]
    [18] Lin D, Jensen CS, Zhang R, Xiao L, Lu JH. A moving object index for efficient query processing with peer-wise location privacy. Proc. of the VLDB Endowment, 2011,5(1):37-48.[doi:10.14778/2047485.2047489]
    [19] Pan X, Xu JL, Meng XF. Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. on Knowledge and Data Engineering, 2012,24(8):1506-1519.[doi:10.1109/TKDE.2011.105]
    [20] Wang T, Liu L. Privacy-Aware mobile services over road networks. Proc. of the VLDB Endowment, 2009,2(1):1042-1053.[doi:10.14778/1687627.1687745]
    [21] Huang Y, Huo Z, Meng XF. CoPrivacy:A collaborative location-preserving method without cloaking region. Chinese Journal of Computers, 2011,34(10):1976-1985(in Chinese with English abstract).[doi:10.3724/SP.J.1016.2011.01976]
    [22] Yuan MX, Chen L, Yu PS. Personalized privacy protection in social networks. Proc. of the VLDB Endowment, 2010,4(2):141-150.[doi:10.14778/1921071.1921080]
    [23] Freni D, Vicente CR, Mascetti S, Bettini C, Jensen CS. Preserving location and absence privacy in geo-social networks. In:Huang J, Koudas N, Jones GJF, Wu XD, Collins-Thompson K, An AJ, eds. Proc. of the 19th ACM Conf. on Information and Knowledge Management (CIKM 2010). New York:ACM Press, 2010.309-318.[doi:10.1145/1871437.1871480]
    [24] Hashem T, Kulik L, Zhang R. Countering overlapping rectangle privacy attack for moving kNN queries. Information Systems, 2013,38(3):430-453.[doi:10.1016/j.is.2012.07.001]
    [25] Xu J, Tang X, Hu H, Du J. Privacy-Conscious location-based queries in mobile environments. IEEE Trans. on Parallel and Distributed Systems, 2010,21(3):313-326.[doi:10.1109/TPDS.2009.65]
    [26] Bamba B, Liu L, Pesti P, Wang T. Supporting anonymous location queries in mobile environments with privacy grid. In:Huai J, ed. Proc. of the 17th Int'l Conf. on World Wide Web. New York:ACM Press, 2008.237-246.[doi:10.1145/1367497.1367531]
    [27] Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services. In:Aberer K, Franklin MJ, Nishio S, eds.Proc. of the 21st Int'l Conf. on Data Engineering. Los Alamitos:IEEE Computer Society, 2005.1248.[doi:10.1109/ICDE.2005.269]
    [28] Yao B, Li FF, Xiao XK. Secure nearest neighbor revisited. In:Jensen CS, Jermaine CM, Zhou XF, eds. Proc. of the 29th IEEE Int'l Conf. on Data Engineering (ICDE 2013). Los Alamitos:IEEE Computer Society, 2013.733-744.[doi:10.1109/ICDE.2013.6544870]
    [29] Yi X, Paulet R, Bertino E, Varadharajan V. Practical k nearest neighbor queries with location privacy. In:Cruz IF, Ferrari E, Tao YF, Bertino E, Trajcevski G, eds. Proc. of the IEEE 30th Int'l Conf. on Data Engineering (ICDE 2014). Los Alamitos:IEEE Computer Society, 2014.640-651.[doi:10.1109/ICDE.2014.6816688]
    [30] Mascetti S, Bettini C, Wang XS, Freni D, Jajodia S. ProvidentHider:An algorithm to preserve historical k-anonymity in LBS. In:Huang JL, ed. Proc. of the 10th Int'l Conf. on Mobile Data Management (MDM 2009). Los Alamitos:IEEE Computer Society, 2009.172-181.[doi:10.1109/MDM.2009.28]
    [31] Dewri R, Ray I, Ray I, Whitley D. Query m-invariance:Preventing query disclosures in continuous location-based services. In:Hara T, Jensen CS, Kumar V, Madria S, Zeinalipour-Yazti D, eds. Proc. of the 11th Int'l Conf. on Mobile Data Management (MDM 2010). Los Alamitos:IEEE Computer Society, 2010.95-104.[doi:10.1109/MDM.2010.52]
    [32] Elmehdwi Y, Samanthula BK, Jiang W. Secure k-nearest neighbor query over encrypted data in outsourced environments. In:Cruz IF, Ferrari E, Tao YF, Bertino E, Trajcevski G, eds. Proc. of the IEEE 30th Int'l Conf. on Data Engineering (ICDE 2014). Los Alamitos:IEEE Computer Society, 2014.664-675.[doi:10.1109/ICDE.2014.6816690]
    [33] Zhu Q, Zhao T, Wang S. Privacy preservation algorithm for service-oriented information search. Chinese Journal of Computers, 2011,33(8):1315-1323(in Chinese with English abstract).
    [34] Ali ME, Tanin E, Zhang R, Ramamohanarao K. Probabilistic voronoi diagrams for probabilistic moving nearest neighbor queries. Data & Knowledge Engineering, 2012,75(2):1-33.[doi:10.1016/j.datak.2012.02.001]
    [35] Hu HB, Xu JL, Chen Q, Yang ZW. Authenticating location-based services without compromising location privacy. In:Candan KS, Chen Y, Snodgrass RT, Gravano L, Fuxman A, eds. Proc. of the ACM SIGMOD Int'l Conf. on Management of Data (SIGMOD 2012). New York:ACM Press, 2012.301-312.[doi:10.1145/2213836.2213871]
    [36] Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. Journal of the ACM, 1998,45(6):965-981.[doi:10.1145/293347.293350]
    [37] Ni WW, Zhang Y, Huang MF, Chong ZH, Huo YZ. A vector equivalent replacing based privacy-preserving perturbing method. Ruan Jian Xue Bao/Journal of Software, 2012,23(12):3198-3208(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4286.htm[doi:10.3724/SP.J.1001.2012.04286]
    附中文参考文献:
    [2] 周傲英,杨斌,金澈清,马强.基于位置的服务:架构与进展.计算机学报,2011,34(7):1155-1171.[doi:10.3724/SP.J.1016.2011.01155]
    [3] 王璐,孟小峰.位置大数据隐私保护研究综述.软件学报,2014,25(4):693-712. http://www.jos.org.cn/1000-9825/4551.htm[doi:10.13328/j.cnki.jos.004551]
    [5] 林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量.软件学报,2009,20(4):1058-1068. http://www.jos.org.cn/1000-9825/3428.htm[doi:10.3724/SP.J.1001.2009.03428]
    [7] 潘晓,郝兴,孟小峰.基于位置服务中的连续查询隐私保护研究.计算机研究与发展,2010,47(1):121-129.
    [9] 薛娇,刘向宇,杨晓春,王斌.一种面向公路网的位置隐私保护方法.计算机学报,2011,34(5):865-878.[doi:10.3724/SP.J.1016.2011.00865]
    [21] 黄毅,霍峥,孟小峰.CoPrivacy——一种用户协作无匿名区域的位置隐私保护方法.计算机学报,2011,34(10):1976-1985.[doi:10.3724/SP.J.1016.2011.01976]
    [33] 朱青,赵桐,王珊.面向查询服务的数据隐私保护算法.计算机学报,2010,33(8):1315-1323.
    [37] 倪巍伟,张勇,黄茂峰,崇志宏,贺玉芝.一种向量等价置换隐私保护数据干扰方法.软件学报,2012,23(12):3198-3208. http://www.jos.org.cn/1000-9825/4286.htm[doi:10.3724/SP.J.1001.2012.04286]
    Comments
    Comments
    分享到微博
    Submit
Get Citation

倪巍伟,陈萧.保护位置隐私近邻查询中隐私偏好问题研究.软件学报,2016,27(7):1805-1821

Copy
Share
Article Metrics
  • Abstract:3383
  • PDF: 5977
  • HTML: 1898
  • Cited by: 0
History
  • Received:November 26,2014
  • Revised:August 17,2015
  • Online: March 16,2016
You are the first2034797Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063