• DocumentCode
    188196
  • Title

    Dummy Based Privacy Preservation in Continuous Querying Road Network Services

  • Author

    Gustav, Yankson Herbert ; Xiao Wu ; Yan Ren ; Yong Wang ; Fengli Zhang

  • Author_Institution
    Sch. of Comput. Sci. & Technol., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
  • fYear
    2014
  • fDate
    13-15 Oct. 2014
  • Firstpage
    94
  • Lastpage
    101
  • Abstract
    Dummies are useful for improving success rate because they can be always available, however, using dummies have two main challenges. The first is how to generate a dummy that is indistinguishable from a real user especially on road networks which have varied movement trends. Secondly, dummies can be used to launch attacks on the location based server by malicious clients which affects the business of the service providers. In this paper, we propose a novel client orientated privacy preserving scheme for continuously querying road network service that is also capable of protecting location based servers from attacks. We employed an offline trajectory clustering algorithm that clustered users´ trajectory and used the derived parameters to generate a cost effective reusable realistic dummies on road network. To overcome malicious clients using dummies to launch attacks on location based servers, we developed a privacy preserving verification protocol capable of checking the activities of all clients in privacy preserving manner to curb such attacks. We tested the efficiency of our algorithm with some defined evaluation metrics, and it provided an effective privacy protection, satisfied clients at all times within an excellent processing time at a reasonable dummy processing cost when continuously querying road network services.
  • Keywords
    data privacy; mobile computing; pattern clustering; program verification; protocols; security of data; LBS; dummy based privacy preservation; location-based services; offline trajectory clustering algorithm; privacy preserving verification protocol; road network services; Algorithm design and analysis; Clustering algorithms; Mobile communication; Privacy; Protocols; Roads; Trajectory; Dummy users; Location-based Services (LBS); Privacy Preservation Algorithm; Privacy Preserving Verification protocol; Road Network Services; Trajectory Clustering Algorithm;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2014 International Conference on
  • Conference_Location
    Shanghai
  • Print_ISBN
    978-1-4799-6235-8
  • Type

    conf

  • DOI
    10.1109/CyberC.2014.24
  • Filename
    6984287