Skip to main content
Log in

A trajectory privacy-preserving scheme based on query exchange in mobile social networks

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

With the increase in the number of active location-based service (LBS) users, protecting the privacy of user trajectory has become a significant concern. In this paper, we propose a deviation-based query exchange (DQE) scheme that obfuscates the users’ query point to mitigate trajectory disclosure in mobile social networks (MSNs). The user finds a best matching user (BMU) in an MSN to exchange queries when a query request is issued. The DQE scheme can prevent the attacker from reconstructing the user’s trajectory by collecting data from the LBS server which records only the user’s ID and his BMUs’ locations (fake locations). By virtue of the private matching algorithm based on the matrix confusion, the DQE scheme allows LBS users to enjoy the service while preserving their privacy. In order to test the effectiveness and efficiency of the proposed scheme, we carried out extensive security and performance analyses under various conditions. The results of the experiments show that the proposed DQE scheme can protect users’ trajectory privacy effectively and reduce the overhead of the LBS server.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Brinkhoff T (2003) Generating traffic data. Bull Tech Comm Data Eng IEEE Comput Soc 26:2003

    Google Scholar 

  • Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Advances in spatial and temporal databases, international symposium, SSTD 2007, Boston, MA, USA. pp 258–275. 16–18 Jul 2007

  • Chow CY (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: ACM international symposium on geographic information systems, ACM-Gis 2006, Arlington, VA, USA. pp 171–178. 10–11 Nov 2006

  • Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. ACM, New york

    Google Scholar 

  • Dai J, Hua L (2015) A method for the trajectory privacy protection based on the segmented fake trajectory under road networks. In: International conference on information science and control engineering. pp 13–17

  • Ficco M, Pietrantuono R, Russo S (2016) Using multi-objective metaheuristics for the optimal selection of positioning systems. Soft Comput 20(7):2641–2664

    Article  Google Scholar 

  • Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200

    Article  Google Scholar 

  • Gao S, Ma J, Shi W, Zhan G, Sun C (2013) TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans Inf Forensics Secur 8(6):874–887

    Article  Google Scholar 

  • Huo Z, Huang Y, Meng X (2011) History trajectory privacy-preserving through graph partition. In International workshop on mobile location-based service. pp 71–78

  • Huo Z, Meng X, Hu H, Huang Y (2012) You can walk alone: trajectory privacy-preserving through significant stays protection. In: International conference on database systems for advanced applications. pp 351–366

  • Hwang RH, Hsueh YL, Chung HW (2014) A novel time-obfuscated algorithm for trajectory privacy protection. In: International symposium on pervasive systems, algorithms and networks. pp 208–215

  • Jin L, Palanisamy B, Joshi JBD (2014) Poster: compromising cloaking-based location privacy preserving mechanisms with location injection attacks. In: ACM SIGSAC conference on computer and communications security. pp 1439–1441

  • Kim HI, Kim YK, Chang JW (2013) A grid-based coaking area creation scheme for continuous LBS queries in distributed systems. JoC 4(1):23–30

    Google Scholar 

  • Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener Comput Syst 63(C):56–75

    Article  Google Scholar 

  • Lei PR, Peng WC, Su J, Chang CP (2012) Dummy-based schemes for protecting movement trajectories. J Inf Sci Eng 28(2):335–350

    MathSciNet  Google Scholar 

  • Li X, Miao M, Liu H, Ma J, Li KC (2016) An incentive mechanism for k-anonymity in LBS privacy protection based on credit mechanism. Soft Comput. doi:10.1007/s00500-016-2040-2

  • Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233

    Article  Google Scholar 

  • Niu B , Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: INFOCOM, 2014 proceedings IEEE. pp 754–762

  • Niu B, Zhu X, Chi H, Li H (2013) 3plus: privacy-preserving pseudo-location updating system in location-based services. In: Wireless communications and networking conference. pp 4564–4569

  • Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495–508

    Article  Google Scholar 

  • Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506–1519

    Article  Google Scholar 

  • Primault V, Boutet A, Mokhtar SB, Brunie L (2016) Adaptive location privacy with alp. In: The 35th symposium on reliable distributed systems, pp 269–278

  • Sang Y, Shen H, Tian H, Zhang Z (2016) Achieving probabilistic anonymity in a linear and hybrid randomization model. IEEE Trans Inf Forensics Secur 11(10):2187–2202

    Article  Google Scholar 

  • Schlegel R, Chow CY, Huang Q, Wong DS (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comput 14(10):2158–2172

    Article  Google Scholar 

  • Shokri R, Theodorakopoulos G, Papadimitratos P, Kazemi E, Hubaux JP (2014) Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans Dependable Secur Comput 11(3):266–279

    Article  Google Scholar 

  • Sui X, Chen Z, Guo L, Kai W, Ma J, Wang G (2017) Social media as sensor in real world: movement trajectory detection with microblog. Soft Comput 21(3):765–779

    Article  Google Scholar 

  • Tang F, Li J, You I, Guo M (2016) Long-term location privacy protection for location-based services in mobile cloud computing. Soft Comput 20(5):1735–1747

    Article  Google Scholar 

  • Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: International conference on mobile data management. pp 65–72

  • Vu K, Zheng R, Gao J (2012) Efficient algorithms for k-anonymous location privacy in participatory sensing. Proc IEEE INFOCOM 131(5):2399–2407

  • Wang G, Du Q, Zhou W, Liu Q (2013) A scalable encryption scheme for multi-privileged group communications. J Supercomput 64(3):1075–1091

    Article  Google Scholar 

  • Wang X, Pande A, Zhu J, Mohapatra P (2016) Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans Netw 99:1–1

    Google Scholar 

  • Xiao X, Chen C, Sangaiah AK, Hu G, Ye R, Jiang Y (2017) Cenlocshare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener Comput Syst. doi:10.1016/j.future.2017.01.035

  • Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559

    Article  Google Scholar 

  • Zhang S, Liu Q, Wang G (2015) Deviation-based location switching protocol for trajectory privacy protection. Springer, Berlin

    Book  Google Scholar 

  • Zhu X, Liu J, Jiang S, Chen Z (2014) Efficient weight-based private matching for proximity-based mobile social networks. In: IEEE international conference on communications. pp 4114–4119

Download references

Acknowledgements

This work is supported in part by the National Natural Science Foundation of China under Grant Nos. 61632009, 61472451 and 61402161, the High Level Talents Program of Higher Education in Guangdong Province under Grant No. 2016ZJ01, the Hunan Provincial Education Department of China under Grant No. 2015C0589, the Hunan Provincial Natural Science Foundation of China under Grant No. 2015JJ3046, the Fundamental Research Funds for the Central Universities of Central South University under Grant No. 2016zzts058.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang.

Ethics declarations

Conflict of interest

The authors declare that there are no conflicts of interest.

Human and animal rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, S., Wang, G., Liu, Q. et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput 22, 6121–6133 (2018). https://doi.org/10.1007/s00500-017-2676-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-017-2676-6

Keywords

Navigation