Documente Academic
Documente Profesional
Documente Cultură
LBS
LBS
user
user
LBS
user
LBS
LBS
user
user
(c) P2P
In current study, primary focus on Trusted Third Party (TTP) Location Based Services (LBS) System
PROBLEM STATEMENT
PROBLEM STATEMENT
Currently, LBS attracts millions of mobile users. Extensive use of LBS raises privacy issues for the
mobile users. The main privacy issues regarding Location based services are disclosing the
o User Current Position
o His/her Personal Information
o The time of query
In order to facilitate the mobile users with full privacy, a new privacy approach is require that will
protect Time, Identity and Position matrices for Trusted Third Party (TTP) Location Based Services
(LBS) Systems.
Therefore, Provisioning privacy for TIP (Time, Identity, Position) attributes in Trusted Third Party
(TTP) Location Based Services (LBS) Systems
RESEARCH OBJECTIVES
RESEARCH OBJECTIVES
1. To propose a new privacy approach for Trusted Third Party (TTP) Location Based
Services (LBS) Systems.
2. Protecting privacy for TIP attributes in TTP LBS System
Protecting Time: The objective is to hide the time information when user making query to
LBS system.
Protecting Identity: The aim is to ensure privacy to hide the user’s identity. The identity of a
user can be his/her name, a unique identifier, or any set of properties uniquely identifying the
user.
Protecting Position: The goal is to protect position of a user which he/she has send to LBS
system.
LITERATURE REVIEW
Clocking cloaking region is created which contain the Spatial Info: Yes update the current position of all query time of user along with his
location of a user and k-1 neighbors [34]. Temporal Info: No users, cause violation of the user identity and location.
privacy.
2 It protect identity of the LBS user but Protect user location and time
Gruteser and This is based on the concept where a mobile user Identity: Yes
does not provide protection against
Grunwald, describe an obfuscation region [35]. Spatial Info: No attribute disclosure. information along with identity.
3 Zhang et al. K-anonymity can be achieved using Identity: Yes By using generalization and For making this heuristic-based
strong k- generalization and suppression with less Spatial Info: No suppression, less its computational approaches more work is
4 This approach assures the user location is Identity: Yes It is unsatisfactory to avoid attribute There is a semantic relationship
Bamba et al.
disclosure and difficult to achieve.
l-diversity indistinguishable from the set of k users [40]. Spatial Info: Yes between the values of the
Temporal Info: No attribute so various levels of
privacy are required.
Trusted Third Party (TTP) based approaches
Techniques/ Privacy level Future Work
Short Description Limitation
Approaches
5 Parameter t represents the distance Identity: Yes Basically, the Earth mover's distance It may be beneficial to use both k-anonymity
Li et al.
between attribute disclosures within
t-closeness the cluster of k users [41]. Spatial Info: Yes (EMD) is not a perfect principle for and t-closeness together.
Temporal Info: No measuring other distance.
6 Domingo-Ferrer The method is to protect each user Identity: Yes Information loss is higher when p- This approach presents a Greedy Algorithm
et al. p-sensitivity from location attack could be de- Spatial Info: Yes sensitive is enforced on a dataset, that protects against both identity disclosure
linked each user request form its Temporal Info: No according to k‐anonymity. and attributes disclosure.
creator [42].
7 Mascetti et al. In this technique, the system retains Identity: Yes In historical k-anonymity Regularly There is a need for extended research that
historical k- track of user movement and use Spatial Info: Yes and habitually visits of user can put preserves the information of the user request.
anonymity information to make the anonymity Temporal Info: No his privacy in danger.
area [43].
Trusted Third Party (TTP) based approaches
Techniques/ Privacy level Future Work
Short Description Limitation
Approaches
8 Kido et al. Dummy Position technique is used to Identity: Yes It is a great challenge to create non- This approach preserves privacy to user
Position protect user actual position by sending Spatial Info: Yes distinguished dummies from the identity and location. Time factor also
Dummies multiple "dummies" along with the true Temporal Info: No actual user position [49]. needs to protect.
position [44].
9 Beresford et al. Defines areas are called mix zones, user Identity: Yes Fail to provide construction This approach preserves privacy to user
Mix Zone position is mixed with these zones [46]. Spatial Info: Yes algorithms that are effective for identity and location. Time factor also
Temporal Info: No mobile users moving on road needs to protect.
networks.
10 Palanisamy and This technique follows the mix zone based Identity: Yes MobiMix usually exposes There is a need to consider more practical
Liu, MobiMix concept over the road network [47]. Spatial Info: Yes information of users, there is attack models based on travel presence.
Temporal Info: No unlinkability between the new and
old pseudonyms.
Trusted Third Party (TTP) based approaches
Techniques/ Privacy level Future Work
Short Description Limitation
Approaches
11 Policy-based Policies are made to protect the mobile Identity: Yes According to the selected policy, as There is a need to make a more and
schemes user privacy These privacy policies are Spatial Info: Yes response service providers can hand over better policy-based scheme for
issued by service providers [48]. Temporal Info: No the user data to others for money. preserving user personal data.
12 Jiang et al. Its function is to receive user request, Identity: No The main problem is that Service provider There is a need to make impossible to
Pseudonymisers send it to the service provider and Spatial Info: Yes can infer the actual identity of the user by identify the data subject by analyzing
replaces the identity with the fake one Temporal Info: No linking the location of the user. the related data.
[48].
13 Route Server Route Server handover the authentic Identity: Yes The challenge was provide privacy to users In (RS) algorithm to improve privacy,
and efficient results for position queries Spatial Info: Yes from attacker who will conclude the wrong have proposed a new AES-RS
[4]. Temporal Info: No data in actual data [54]. architecture.
14 AES-RS AES-RS is based on position dummy in Identity: Yes AES-RS system performance enhance and Delay variation might be possible by
architecture which dummies generated with a single Spatial Info: Yes reduce after a particular time interval. the distributed approach with multiple
user request [4]. Temporal Info: No LBS server.
After Critical Analysis of all TTP based
approaches, we select “Position Dummy”
technique for our research objectives.
PUBLICATION IN
INTERNATIONAL JOURNAL OF ADVANCE
RESEARCH IN COMPUTER SCIENCE
(IJARCS)
Available Online at www.ijarcs.info,
Researchgate, Google Scholar.
PROPOSED SOLUTION
IDP SYSTEM MODEL - DIAGRAM
IDP SYSTEM MODEL - DESCRIPTION
Actual user wants a route path to find out the nearest ATM from his current
location using over the road network.
LBS user posted a query to location based services system in order to find out a
route path or POI (in our scenario “the nearest ATM”) from his current location.
Location based services system is Trusted Third Party (TTP).
When user posting query, at that time the user privacy at the risk.
In order to overcome theses privacy issue and to protect his precise information
as current location our mechanism is to generate dummy position in a specific
area.
The defined area can be in the form of grid or circle.
IDP SYSTEM MODEL – DESCRIPTION (CONT….)
Here, the problem was by posting multiple queries several (5 – 10) times, attacker can
easily identify the actual user and can take advantage of his information
In order to overcome this problem, whenever actual user posting query to LBS System
every time its identity will be changed.
Basically, the identity will be changed every time LBS user posting query to LBS System.
In LBS System, the Identity is randomly generated unique ID.
On the basis of this mechanism, we have achieve our protection goals i.e. Time, Identity,
Position in Trusted Third Party (TTP) Location Based Services (LBS) system
Moreover, a proper environment has been provided to the location-based services
system and the privacy issues between the user and Location Server (LS) is reduced.
ALGORITHM DESIGN
Input: User location U(X, Y), Anonymous_Area A, Anonymity_Number K, Dummies N, π.
Output: DumArr [K(x, y) + U(X, Y)]
Procedure:
1. If (A == G (L, U)) \\ If area is rectangular than Calculate Both Height and Width, U, L limit.
2. N← 𝐺 \\ Calculate Number of cells in G
3. (V, E) ∈ N \\ Determine vertices and edges of each cell
4. Else If (A = Circle (𝜋))
2π 𝐴
5. θ= ; r=
𝑘 π
; \\ Calculate both angle and radius
1.8
1.4
1.2
0.8
0.6
0.4
0.2
0
0h 3h 6h 9h 12h 15h 18h
Duration (Hours)
(a) Route API Data Access Delay (secs) (b) Route API retransmission Attempts (secs)
“The consequences showed that the proposed IDP model outperformed the
existing state-of-the-art privacy protection techniques by all measured attributes.”
CONCLUSION & FUTURE WORK
LBS plays a vital role in emerging mobile computing systems. Leading to TTP based LBS systems, mobile
user is facing some substantial challenges, privacy is one of these. Fundamentally, a mobile user’s privacy is
concerned with user’s identity, spatial information and temporal information.
This research present the absolute survey of different well-suited privacy approaches in the TTP LBS
system. The main fundamental of the conducted survey was to provide a proper environment to the LBS
system and reduce the privacy issues between the user and Location Server (LS).
Leading to these privacy attributes, current study addressed the privacy challenge by proposing a new
privacy protection model named “Improved Dummy Position” (IDP) which is the improved version of
dummy position mechanism.
In order to make sure the privacy authenticity, we implemented IDP in real france_highway road networks
using Riverbed Modeler academic edition 17.5 simulation tool and measured different privacy factors
including Ethernet delay, Query success rate, system performance (load and query processing time), route
API retransmission and data access rate.
It was observe that, IDP outperformed the existing state-of-the-art models and achieved 80% privacy by
improving the rate up to 30%. However, this significant improvement provided a complete protection in all
metrics.
CONCLUSION & FUTURE WORK
By future perspective, extend 80% privacy rate upto 100%, it is crucial to raise the user’s focus
towards the importance of location privacy and the imperilment when disclosing ones location to
the third parties. Also, it is required to test proposed model with real clients with real locations in a
real environment with a large system in order to make our contributions stronger.
PUBLICATION IN
INTERNATIONAL JOURNAL OF ADVANCED
COMPUTER SCIENCE AND APPLICATION
(IJACSA)
Available Online at www.thesai.org,
Researchgate, Google Scholar.
REFERENCES
[1] Puttaswamy, Krishna P. N., Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Amr El Abbadi, Christopher Kruegel, and Ben Y. Zhao.
“Preserving Location Privacy in Geo-Social Applications”, IEEE Transactions on Mobile Computing, 2012.
[2] M. E. Andrés, N. E. Bordenabe, “Geo-indistinguishability: Differential privacy for location-based system,” in Proc. of the 20th ACM Conf. on
Computer and Communications Security, pp. 901-914, 2013.
[3] Kang G. Shin, X.J., and Zhigang Chen, X. H. Privacy protection for users of location-based services. IEEE Wireless Communications. 2012.
[4] L. Yu and M. Y. Lung. “Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services.” Knowledge
and Data Engineering, IEEE Transactions pp: 235-249. 2015.
[5] M. Duckham and L. Kulik. “A formal model of obfuscation and negotiation for location privacy”. In PERVASIVE, 2005.
[6] Tyagi, Amit & Sreenath, N. (2015). A Comparative Study on Privacy Preserving Techniques for Location Based Services. British Journal of
Mathematics & Computer Science. 10. 1-25.
[7] Lu Ou, Hui Yin, Zheng Qin, Sheng Xiao, Guangyi Yang, and Yupeng Hu, “An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query
Scheme,” Security and Communication Networks, vol. 2018. 11 pages, 2018.
[8] Alrahhal, Mohamad Shady & Khemakhem, Maher & Jambi, Kamal. (2017). A survey on privacy of location-based services: Classification,
inference attacks, and challenges. Journal of Theoretical and Applied Information Technology. 3195.
[9] Available: https://downloads.cloudsecurityalliance.org/. 2018.
[10] Ruchika Gupta and Udai Pratap Rao, “A Hybrid Location Privacy Solution for Mobile LBS,” Mobile Information Systems, vol. 2017, Article ID
2189646,11 pages, 2017.
[11] Piao, Chunhui, Xiaoyan Li, Xiao Pan, and Changyou Zhang. “User privacy protection for a mobile commerce alliance”, Electronic Commerce
Research and Applications, 2016.
REFERENCES
[12] Computer Communication Review | acm sigcomm", Sigcomm.org, 2018. [Online]. Available:
http://www.sigcomm.org/publications/computer-communication-review.
[13] Ruchika Gupta and Udai Pratap Rao, “A Hybrid Location Privacy Solution for Mobile LBS,” Mobile Information Systems, vol. 2017,
Article ID 2189646,11 pages, 2017.
[14] Qin Hu Shengling Wang, Chunqiang Hu, Jianhui Huang, Wei Li, Xiuzhen Cheng. “Messages in a Concealed Bottle: Achieving Query
Content Privacy with Accurate Location-Based Services”, IEEE Transactions on Vehicular Technology, 2018
[15] Ertaul, IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.3, March 2017
[16] J. Chen, K. He, Q. Yuan, M. Chen, R. Du and Y. Xiang, "Blind Filtering at Third Parties: An Efficient Privacy- Preserving Framework for
Location-Based Services," in IEEE Transactions on Mobile Computing.
[17] Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao “A context-aware scheme for privacy-preserving location-based services”,
Computer Networks, 2012
[18] B. Bamba, L. Liu, P. Pesti, and T. Wang. “Supporting anonymous location queries in mobile environments with privacygrid”. In
WWW, 2008.
[19] C.-Y. Chow and M. F. Mokbel. “Enabling private continuous queries for revealed user locations”. In SSTD, 2007.
[20] P. Samarati. “Protecting respondents’ identities in microdata” release. TKDE, 2001.
[21] L. Sweeney. “K-anonymity: A model for protecting privacy”. IJUFKS, pp, 557–570, 2002.
[22] Hidetoshi Kido, Y. Y., & Satoh, T. “Protection of Location Privacy using Dummies for Location-based Services.”. Proceedings of the
21st International Conference on Data Engineering (ICDE ’05) , 2005.
REFERENCES
[23] C.-Y. Chow, M. F. Mokbel, and X. Liu. “A peer-to-peer spatial cloaking algorithm for anonymous location-based services”. In
ACM GIS, 2006.
[24] Mohammad Yamin, Adnan Ahmed Abi Sen. "Improving Privacy and Security of User Data in Location Based Services",
International Journal of Ambient Computing and Intelligence, 2018.
[25] Wernke, Marius, Pavel Skvortsov, Frank Dürr, and Kurt Rothermel. “A classification of location privacy attacks and
approaches”, Personal and Ubiquitous Computing, 2014.
[26] Marius Wernke, P. S., & Frank Du¨rr, K. R. “A Classification of Location Privacy Attacks and Approaches”, pp, 1-24.
[27] Chi-Yin Chow, M. F. (n.d.). “Privacy in Location-based Services: A System Architecture Perspective”, pp, 23-27.
[28] OPUS: Zur Startseite”, Elib.uni-stuttgart.de, 2018. Available: https://elib.umi-stuttgart.de/.
[29] “Location Based Services”, Available: pooh.poly.asu.edu/Mobile/ClassNotes/.../LocationBasedSvcs/LocationBasedServices.
[30] Robert Kolvoord, K. K., & Rittenhouse, P. “Applications of Location-Based Services and Mobile”. International Journal ofGeo-
information, pp: 1-9. 2017.
[31] Michael, K. “Location-Based Services: a vehicle for IT&T convergence”, pp: 467-477. 2004.
[32] Ertaul, L. “Privacy in Location Based Services (LBS) via Composite Privacy in Location Based Services (LBS) via Composite
Privacy in Location Based Services” . IJCSNS International Journal of Computer Science and Network Security, pp:117-123. 2017.
[33] Costas Pontikakos, T. G., & Tsiligiridis, T. “Location-based services: architecture overview”, 2015.
REFERENCES
[34] Neeta B. Bhongade, G. P, “A Review of Privacy Preserving LBS: Study of Well-Suited Approaches,” in International Journal of
Engineering Trends and Technology (IJETT), pp. 62-65. 2015.
[35] Gruteser, M., Grunwald, D, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of
the 1st international conference on Mobile systems, applications and services (MobiSys ’03), New York, NY, USA, ACM, pp. 31–42. 2003.
[36] Mokbel, M.F., Chow, C.Y., Aref, W.G, The new casper: query processing for location services without compromising privacy,” in
Proceedings of the 32nd international conference on Very large data bases (VLDB ’06), VLDB Endowment, pp. 763–774. 2006.
[37] Gedik, B., Liu, L, “Location privacy in mobile systems: A personalized anonymization model,” in International Conference on
Distributed Computing Systems (ICDCS), pp. 620–629. 2005.
[38] Gedik, B., Liu, L, “Protecting location privacy with personalized k-anonymity: Architecture and algorithms,” in IEEE Transactions on
Mobile Computing 7, pp. 1–18. 2008.
[39] Zhang, C., Huang, Y, “Cloaking locations for anonymous location based services: a hybrid approach,” in Geoinformatica 13, pp. 159–
182. 2009.
[40] Bamba, B., Liu, L., Pesti, P., Wang, T, “Supporting anonymous location queries in mobile environments with privacygrid,” in
Proceeding of the 17th international conference on World Wide Web (WWW ’08), New York, NY, USA, ACM, pp. 237–246. 2008.
[41] Li, N., Li, T., Venkatasubramanian, S, “t-closeness: Privacy beyond k-anonymity and l-diversity,” in Proceedings of the IEEE 23rd
International Conference on Data Engineering (ICDE), pp. 106–115. 2007.
[42] Solanas, A., Seb´e, F., Domingo-Ferrer, J, “Micro-aggregation-based heuristics for p sensitive k-anonymity: one step beyond,” in
Proceedings of the 2008 international workshop on Privacy and anonymity in information society (PAIS ’08), New York, NY, USA, ACM, pp. 61–
69. 2008.
REFERENCES
[43] Mascetti, S., Bettini, C., Wang, X.S., Freni, D., Jajodia, S: Providenthider, “An algorithm to preserve historical k-anonymity in lbs,” in
IEEE International Conference on Mobile Data Management (MDM 2009). Volume 0, Los Alamitos, CA, USA, IEEE Computer Society, pp. 172–
181. 2009.
[44] Kido, H., Yanagisawa, Y., Satoh, T, “An anonymous communication technique using dummies for location-based services,” in
Proceedings of the International Conference on Pervasive Services (ICPS ), pp. 88–97. 2005.
[45] Shankar, P, Ganapathy, V., Iftode, L, “Privately querying location-based services with sybilquery,” in International Conference on
Ubiquitous Computing (UbiComp), 2009, pp. 31–40.
[46] Beresford, A.R, Stajano, F, “Mix zones: User privacy in location-aware services,” in PerCom Workshops, pp. 127–131. 2004.
[47] Palanisamy, B., Liu, L, “Mobimix: Protecting location privacy with mix-zones over road networks” in Proceedings of the 2011 IEEE
27th International Conference on Data Engineering. ICDE ’11, Washington, DC, USA, IEEE Computer Society, pp. 494–505. 2011.
[48] Agusti Solanas, J. D.-F.-B.“Location Privacy in Location-Based Services: Beyond TTP-based Schemes”.
[49] H. L. C. S. Jensen and M. L. Yiu, "PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services," ACM, 2008.
[50] Z. Z. Ben Niu and H. L. Xiaoqing Li, "Privacy-Area Aware Dummy Generation Algorithms for Location-Based Services," IEEE ICC 2014 -
Communication and Information System Security Symposium, pp. 957-962. 2014.
51] Hidetoshi Kido, Y. Y., & Satoh, T, “Protection of Location Privacy using Dummies for Location-based Services,” in International
[