JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 69-73.doi: 10.6040/j.issn.1671-9352.2.2014.065

Previous Articles     Next Articles

A LBS privacy-preserving method for geo-fencing services

YANG Song-tao1,2, MA Chun-guang1, ZHOU Chang-li1, ZHANG Zong-li2   

  1. 1. College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, Heilongjiang, China;
    2. College of Information and Electronic Technology, Jiamusi University, Jiamusi 154007, Heilongjiang, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: Geo-fencing technology is widely used in recommender systems, advertising push and other services. It has serious risk of personal privacy leakage threat. Focus on triggered query in Geo-fencing, the theories of the secure tripartite computation were applied in the research of the LBS privacy-preserving model, which follows the concept of location obfuscation and location k-anonymity and reaches the target of user's identity unlink-ability and location's untraced-ability. Location anonymity hidden problem and secret authentication problem were solved by computational geometry techniques and principles of cryptography in the triggered queries scenario. Theoretical analysis shows the model is security. From the perspective of privacy-preserving, the attackers do not get new knowledge from LBS system. Experiments demonstrate the computational efficiency and communication loads of this medel are superior to the traditional spatial-temporal cloaking methods.

Key words: secure tripartite computation, geo-fencing, location-based services, privacy-preserving, triggered query

CLC Number: 

  • TP309
[1] CHOW C, MOKBEL M F, AREF W G. Casper*: query processing for location services without compromising privacy [J]. ACM Transactions on Database Systems, 2009, 34(4):24-48.
[2] KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing location-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12):1719-1733.
[3] 黄毅,霍峥,孟小峰. CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报,2011, 34(10): 1976-1985. HUANG Yi, HUO Zheng, MENG Xiaofeng. CoPrivacy: a collaborative location privacy-preserving method without cloaking region [J].Chinese Journal of Computers, 2011, 34(10): 1976-1985.
[4] 彭志宇,李善平. 移动环境下LBS位置隐私保护[J].电子与信息学报,2011(5): 1211-1216. PENG Zhiyu, LI Shanping. Protecting location privacy in location-based services in mobile environments [J]. Journal of Electronics & Information Technology, 2011, (5):1211-1216.
[5] TRUJILLO-RASUA R, DOMINGO-FERRER J. On the privacy offered by (k, delta)-anonymity [J]. Information Systems, 2013, 38(4, SI):491-494.
[6] PAPADOPOULOS S, BAKIRAS S, PAPADIAS D. Nearest neighbor search with strong location privacy [J]. Proc VLDB Endow, 2010, 3(1-2): 619-629.
[7] LIU Yubao, CHEN Xiuwei, LI Zhijie, et al. An efficient method for privacy preserving location queries [J]. Frontiers of Computer Science, 2012, 6(4): 409-420.
[8] UM J, KIM Y, LEE H. k-nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services[J]. Journal of Systems Architecture, 2012, 58(9): 354-371.
[9] GHINITA G, KALNIS P, KHOSHGOZARAN A. Private queries in location-based services: anonymizers are not necessary[C]//Proceedings of 2008 ACM SIGMOD international conference on Management of data. Vancouver: ACM, 2008:121-132.
[10] LI Ming, YU Shucheng, CAO Ning,et al. Privacy-preserving distributed profile matching in proximity-based mobile social networks [J]. IEEE Transactions on Wireless Communications, 2013, 12(5): 2024-2033.
[11] WU Liang, JING Yaping.The protection algorithm of personal privacy information in sensors network [J].Sensor Letters, 2013, 11(4): 726-730.
[12] LIEN I-ting, LIN Yu-hsun, SHIEH Jyh-ren,et al. A novel privacy preserving location-based service protocol with secret circular shift for k-NN search [J].IEEE Transactions on Information Forensics and Security, 2013, 8(6, SI): 863-873.
[13] LI Fengjun, LUO Bo, LIU Peng,et al. Enforcing secure and privacy-preserving information brokering in distributed information sharing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6, SI): 888-900.
[1] YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22.
[2] JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68.
[3] XU Li-dong, WANG Ming-qiang. A meet-in-the-middle attack on 10-round AES-128 [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 39-45.
[4] ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50.
[5] CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59.
[6] LIU Zheng, NIU Fang-lin, QIAN Da-xing, CAI Xi-biao, GUO Ying. Design of anti-eavesdropping code based on fountain codes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 60-64.
[7] LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian. Steganalysis method based on shallow convolution neural network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 63-70.
[8] RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76.
[9] KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29.
[10] MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18.
[11] TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45.
[12] SUN Ze-rui, WANG Ji-jun, LI Guo-xiang, XIA Guo-en. New reversible data hiding algorithm based on interpolation images [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 46-52.
[13] SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94.
[14] YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22.
[15] HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!