Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints

The wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locatio...

Full description

Bibliographic Details
Main Authors: Mulugeta Kassaw Tefera, Xiaolong Yang
Format: Article
Language:English
Published: MDPI AG 2019-04-01
Series:Information
Subjects:
Online Access:https://www.mdpi.com/2078-2489/10/4/121
_version_ 1828521889936441344
author Mulugeta Kassaw Tefera
Xiaolong Yang
author_facet Mulugeta Kassaw Tefera
Xiaolong Yang
author_sort Mulugeta Kassaw Tefera
collection DOAJ
description The wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locations associated with different pseudonyms, which come at a cost either in terms of resource consumption or quality of service, or both. However, we observed that the effect of resource consumption has not been discussed in existing studies. In this paper, we present the user-centric LPPMs against location inference attacks under the consideration of both service quality and energy constraints. Moreover, we modeled the precision-based and dummy-based mechanisms in the context of an existing LPPM framework, and also extended the linear program solutions applicable to them. This study allowed us to specify the LPPMs that decreased the precision of exposed locations or generated dummy locations of the users. Based on this, we evaluated the privacy protection effects of optimal location obfuscation function against an adversary’s inference attack function using real mobility datasets. The results indicate that dummy-based mechanisms provide better achievable location privacy under a given combination of service quality and energy constraints, and once a certain level of privacy is reached, both the precision-based and dummy-based mechanisms only perturb the exposed locations. The evaluation results also contribute to a better understanding for the LPPM design strategies and evaluation mechanism as far as the system resource utilization and service quality requirements are concerned.
first_indexed 2024-12-11T19:57:56Z
format Article
id doaj.art-59c45a69c4f3499a87b6bff2872628d5
institution Directory Open Access Journal
issn 2078-2489
language English
last_indexed 2024-12-11T19:57:56Z
publishDate 2019-04-01
publisher MDPI AG
record_format Article
series Information
spelling doaj.art-59c45a69c4f3499a87b6bff2872628d52022-12-22T00:52:36ZengMDPI AGInformation2078-24892019-04-0110412110.3390/info10040121info10040121Location Privacy Protection Systems in Presence of Service Quality and Energy ConstraintsMulugeta Kassaw Tefera0Xiaolong Yang1School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, ChinaThe wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locations associated with different pseudonyms, which come at a cost either in terms of resource consumption or quality of service, or both. However, we observed that the effect of resource consumption has not been discussed in existing studies. In this paper, we present the user-centric LPPMs against location inference attacks under the consideration of both service quality and energy constraints. Moreover, we modeled the precision-based and dummy-based mechanisms in the context of an existing LPPM framework, and also extended the linear program solutions applicable to them. This study allowed us to specify the LPPMs that decreased the precision of exposed locations or generated dummy locations of the users. Based on this, we evaluated the privacy protection effects of optimal location obfuscation function against an adversary’s inference attack function using real mobility datasets. The results indicate that dummy-based mechanisms provide better achievable location privacy under a given combination of service quality and energy constraints, and once a certain level of privacy is reached, both the precision-based and dummy-based mechanisms only perturb the exposed locations. The evaluation results also contribute to a better understanding for the LPPM design strategies and evaluation mechanism as far as the system resource utilization and service quality requirements are concerned.https://www.mdpi.com/2078-2489/10/4/121location-based serviceslocation privacylocation-privacy preserving mechanismresource utilizationtracking attacksgame-theoretic model
spellingShingle Mulugeta Kassaw Tefera
Xiaolong Yang
Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints
Information
location-based services
location privacy
location-privacy preserving mechanism
resource utilization
tracking attacks
game-theoretic model
title Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints
title_full Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints
title_fullStr Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints
title_full_unstemmed Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints
title_short Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints
title_sort location privacy protection systems in presence of service quality and energy constraints
topic location-based services
location privacy
location-privacy preserving mechanism
resource utilization
tracking attacks
game-theoretic model
url https://www.mdpi.com/2078-2489/10/4/121
work_keys_str_mv AT mulugetakassawtefera locationprivacyprotectionsystemsinpresenceofservicequalityandenergyconstraints
AT xiaolongyang locationprivacyprotectionsystemsinpresenceofservicequalityandenergyconstraints