4.5 Article

RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries

Journal

IEEE-ACM TRANSACTIONS ON NETWORKING
Volume 26, Issue 2, Pages 1018-1032

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2018.2812851

Keywords

Location privacy; k-anonymity; continuous LBS queries; location-dependent attacks

Funding

  1. National Natural Science Foundation of China [61502192, 61572219, 61502193, 61702204, 41701479]
  2. China Postdoctoral Science Foundation [2017T100556]
  3. Fundamental Research Funds for the Central Universities [2016YXMS293, 2016JCTD118]

Ask authors/readers for more resources

With the increasing popularity of location-based services (LBS), how to preserve one's location privacy has become a key issue to be concerned. The commonly used approach k-anonymity, originally designed for protecting a user's snapshot location privacy, inherently fails to preserve the user from location-dependent attacks (LDA) that include the maximum movement boundary (MMB) attacks and maximum arrival boundary (MAB) attacks, when the user continuously requests LBS. This paper presents RobLoP, a robust location privacy preserving algorithm against LDA in continuous LBS queries. The key insight of RobLoP is to theoretically derive the constraints of both MMB and MAB in a uniform way. It provides a necessary condition of the pairwise user to be safely cloaked against LDA. On top of that, RobLoP first identifies those candidate users who can be cloaked with the requesting user. RobLoP then searches for a so-called strict point set including the candidate set and other auxiliary points, as a sufficient condition under which RobLoP can finally generate the cloaked region successfully. To the best of our knowledge, RobLoP is the first work that can preserve location privacy against LDA thoroughly and closely with a theoretical guarantee. The effectiveness and superiority of RobLoP to state-of-the-art studies are validated via extensive simulations on the real trucks data, the synthetic data, as well as the measured data collected by ourselves.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available