Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints
The wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locatio...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-04-01
|
Series: | Information |
Subjects: | |
Online Access: | https://www.mdpi.com/2078-2489/10/4/121 |
_version_ | 1828521889936441344 |
---|---|
author | Mulugeta Kassaw Tefera Xiaolong Yang |
author_facet | Mulugeta Kassaw Tefera Xiaolong Yang |
author_sort | Mulugeta Kassaw Tefera |
collection | DOAJ |
description | The wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locations associated with different pseudonyms, which come at a cost either in terms of resource consumption or quality of service, or both. However, we observed that the effect of resource consumption has not been discussed in existing studies. In this paper, we present the user-centric LPPMs against location inference attacks under the consideration of both service quality and energy constraints. Moreover, we modeled the precision-based and dummy-based mechanisms in the context of an existing LPPM framework, and also extended the linear program solutions applicable to them. This study allowed us to specify the LPPMs that decreased the precision of exposed locations or generated dummy locations of the users. Based on this, we evaluated the privacy protection effects of optimal location obfuscation function against an adversary’s inference attack function using real mobility datasets. The results indicate that dummy-based mechanisms provide better achievable location privacy under a given combination of service quality and energy constraints, and once a certain level of privacy is reached, both the precision-based and dummy-based mechanisms only perturb the exposed locations. The evaluation results also contribute to a better understanding for the LPPM design strategies and evaluation mechanism as far as the system resource utilization and service quality requirements are concerned. |
first_indexed | 2024-12-11T19:57:56Z |
format | Article |
id | doaj.art-59c45a69c4f3499a87b6bff2872628d5 |
institution | Directory Open Access Journal |
issn | 2078-2489 |
language | English |
last_indexed | 2024-12-11T19:57:56Z |
publishDate | 2019-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Information |
spelling | doaj.art-59c45a69c4f3499a87b6bff2872628d52022-12-22T00:52:36ZengMDPI AGInformation2078-24892019-04-0110412110.3390/info10040121info10040121Location Privacy Protection Systems in Presence of Service Quality and Energy ConstraintsMulugeta Kassaw Tefera0Xiaolong Yang1School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, ChinaThe wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locations associated with different pseudonyms, which come at a cost either in terms of resource consumption or quality of service, or both. However, we observed that the effect of resource consumption has not been discussed in existing studies. In this paper, we present the user-centric LPPMs against location inference attacks under the consideration of both service quality and energy constraints. Moreover, we modeled the precision-based and dummy-based mechanisms in the context of an existing LPPM framework, and also extended the linear program solutions applicable to them. This study allowed us to specify the LPPMs that decreased the precision of exposed locations or generated dummy locations of the users. Based on this, we evaluated the privacy protection effects of optimal location obfuscation function against an adversary’s inference attack function using real mobility datasets. The results indicate that dummy-based mechanisms provide better achievable location privacy under a given combination of service quality and energy constraints, and once a certain level of privacy is reached, both the precision-based and dummy-based mechanisms only perturb the exposed locations. The evaluation results also contribute to a better understanding for the LPPM design strategies and evaluation mechanism as far as the system resource utilization and service quality requirements are concerned.https://www.mdpi.com/2078-2489/10/4/121location-based serviceslocation privacylocation-privacy preserving mechanismresource utilizationtracking attacksgame-theoretic model |
spellingShingle | Mulugeta Kassaw Tefera Xiaolong Yang Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints Information location-based services location privacy location-privacy preserving mechanism resource utilization tracking attacks game-theoretic model |
title | Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints |
title_full | Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints |
title_fullStr | Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints |
title_full_unstemmed | Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints |
title_short | Location Privacy Protection Systems in Presence of Service Quality and Energy Constraints |
title_sort | location privacy protection systems in presence of service quality and energy constraints |
topic | location-based services location privacy location-privacy preserving mechanism resource utilization tracking attacks game-theoretic model |
url | https://www.mdpi.com/2078-2489/10/4/121 |
work_keys_str_mv | AT mulugetakassawtefera locationprivacyprotectionsystemsinpresenceofservicequalityandenergyconstraints AT xiaolongyang locationprivacyprotectionsystemsinpresenceofservicequalityandenergyconstraints |