Title :
A decentralized Location-Query-Sensitive Cloaking algorithm for LBS
Author :
Li, Wei ; Liu, Chunlei
Author_Institution :
Key Lab. of Beijing Network Technol., Beihang Univ., Beijing, China
Abstract :
Privacy-aware query is very important to Location based service (LBS). Since user´s location distribution is not uniform and the contents of user query may be similar, users will be easily attacked by query sampling attack and homogeneity attack. In this paper we proposed a new distributed spatial cloaking algorithm, Location-Query Sensitive Cloaking algorithm(LQ-Cloak) to protect query privacy. The main idea is that before requesting any location-based service, the mobile user will form a group among peers locating in his neighbor area(cells) via single-hop communication and/or multi-hop routing. Then the Anonymity Spatial Region (ASR) is computed according to the cells that covers the entire group of peers. This technique is based on a distributed anonymity architecture, and eliminates the bottleneck of whole system. This method considered both users´ location distribution and query content when cloaking, so the anonymity spatial region can meet the request of K-anonymity and l-diversity model. Extensive experimental studies show that the proposed techniques are effective to protect users´ privacy in the distributed environment.
Keywords :
content management; data privacy; mobile computing; query processing; telecommunication network routing; ASR; K-anonymity model; LBS; LQ-Cloak; anonymity spatial region; decentralized location-query-sensitive cloaking algorithm; distributed anonymity architecture; distributed spatial cloaking algorithm; homogeneity attack; l-diversity model; location distribution; location-based service; mobile user; multihop routing; neighbor area; privacy-aware query; query content; query privacy protection; query sampling attack; single-hop communication; user location distribution; user query; Computer architecture; Databases; Educational institutions; Entropy; Mobile communication; Privacy; Servers; K-anonymity; distributed architecture; l-diversity; query privacy;
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International
Conference_Location :
Limassol
Print_ISBN :
978-1-4577-1378-1
DOI :
10.1109/IWCMC.2012.6314349