Skip to main content

Privacy Preserving Scheme for Location and Content Protection in Location-Based Services

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

Abstract

Location-Based Services (LBSs) have been facilitating and enriching people’s daily lives. While users enjoy plenty of conveniences, privacy disclosure in terms of both location information and query contents is common. Most of the existing solutions mainly focus on location privacy and adopt K-anonymity principle to preserve user’s privacy. However, these methods are vulnerable to protect user’s query content. In this paper, we propose a Privacy Preserving and Content Protection (PPCP) scheme for LBSs users. Unlike most of researches requiring a trusted third party (TTP), our scheme is based on a semi-trusted middle entity, which is unaware of both the exact location information about issuer and query content in the user’s requirement. We utilize space filling curve to transform user location and protect user query content based on encryption technology, so that the proposed scheme can provide enhanced location privacy and query privacy protection in both snapshot and continuous LBSs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Malm, A.: Mobile location-based services. Berg Insights LBS Research Series (2016). http://www.berginsight.com/ReportPDF/ProductSheet/bi-lbs9-ps.pdf

  2. Hwang, R.H., Hsueh, Y.L., Chung, H.W.: A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)

    Article  Google Scholar 

  3. Shin, K.G., Ju, X., Chen, Z., Hu, X.: Privacy protection for users of location-based services. IEEE Wirel. Commun. 19(1), 30–39 (2012)

    Article  Google Scholar 

  4. Pingley, A., Zhang, N., Fu, X., Choi, H.A., Subramaniam, S., Zhao, W.: Protection of query privacy for continuous location based services. In: 2011 IEEE Proceedings of INFOCOM, pp. 1710–1718. IEEE (2011)

    Google Scholar 

  5. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)

    Google Scholar 

  6. Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506–1519 (2012)

    Article  Google Scholar 

  7. Dewri, R., Ray, I., Whitley, D.: Query m-invariance: preventing query disclosures in continuous location-based services. In: 2010 Eleventh International Conference on Mobile Data Management (MDM), pp. 95–104. IEEE (2010)

    Google Scholar 

  8. Luo, W., Hengartner, U.: Veriplace: a privacy-aware location proof architecture. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 23–32. ACM (2010)

    Google Scholar 

  9. Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: 2014-IEEE Conference on Computer Communications, IEEE INFOCOM, pp. 754–762. IEEE (2014)

    Google Scholar 

  10. Liu, Q., Tan, C.C., Wu, J., Wang, G.: Cooperative private searching in clouds. J. Parallel Distrib. Comput. 72(8), 1019–1031 (2012)

    Article  MATH  Google Scholar 

  11. Xiao, M., Wu, J., Huang, L.: Home-based zero-knowledge multi-copy routing in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(5), 1238–1250 (2015)

    Article  Google Scholar 

  12. Hilbert, D.: Ueber die stetige abbildung einer line auf ein flächenstück. Math. Ann. 38(3), 459–460 (1891)

    Article  MathSciNet  Google Scholar 

  13. Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73540-3_14

    Chapter  Google Scholar 

  14. Peng, T., Liu, Q., Wang, G.: Enhanced location privacy preserving scheme in location-based services. IEEE Syst. J. 3(2), 1–12 (2014)

    Article  MathSciNet  Google Scholar 

  15. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_2

    Chapter  Google Scholar 

  16. Liu, X., Schrack, G.: Encoding and decoding the Hilbert order. Softw. Pract. Experience 26(12), 1335–1346 (1996)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451, 61272151 and 61502163, High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01, and Hunan Provincial Natural Science Foundation of China under Grant Number 2016JJ3051.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Peng, T., Liu, Q., Wang, G., Xiang, Y. (2016). Privacy Preserving Scheme for Location and Content Protection in Location-Based Services. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics