Achieving User-Defined Location Privacy Preservation Using a P2P System

As location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. We argue that a good location privacy preservation scheme shoul...

Full description

Bibliographic Details
Main Authors: Shengchao Liu, Jessie Hui Wang, Jilong Wang, Qianli Zhang
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9025029/
_version_ 1818874198115745792
author Shengchao Liu
Jessie Hui Wang
Jilong Wang
Qianli Zhang
author_facet Shengchao Liu
Jessie Hui Wang
Jilong Wang
Qianli Zhang
author_sort Shengchao Liu
collection DOAJ
description As location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. We argue that a good location privacy preservation scheme should have these properties. First, a user should never expose its precise location to any other entity. Second, a user should be able to specify its own requirement on the strength of privacy preservation, since a stricter preservation requirement may increase its overhead. Third, the scheme should be able to preserve as many as possible aspects of users' privacy under various attacks. With these desired properties in mind, we carefully design an encoding scheme of users' identifiers and a fully distributed architecture for our purpose and propose a privacy preservation scheme based on them. With the help of the encoding scheme and the distributed architecture, we develop a distributed negotiation algorithm to help users conduct negotiations among themselves to find their cloaked regions that satisfy their self-defined requirements without exposing their precise locations. The negotiations are completed without coordination from any central servers, and a random proxy is selected for each individual request, therefore the potential risks caused by any central server (location-based service servers or trusted-third-party servers) are mitigated as much as possible. Experiments show that our scheme can satisfy different strengths of privacy preservation required by each user even under the most severe scenarios.
first_indexed 2024-12-19T13:06:47Z
format Article
id doaj.art-c84bf871e15c42f6b3a1caea7715078f
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-19T13:06:47Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-c84bf871e15c42f6b3a1caea7715078f2022-12-21T20:20:01ZengIEEEIEEE Access2169-35362020-01-018458954591210.1109/ACCESS.2020.29784889025029Achieving User-Defined Location Privacy Preservation Using a P2P SystemShengchao Liu0https://orcid.org/0000-0003-4763-5196Jessie Hui Wang1https://orcid.org/0000-0002-7825-4137Jilong Wang2https://orcid.org/0000-0002-4493-5145Qianli Zhang3https://orcid.org/0000-0003-2084-7762Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, ChinaInstitute for Network Sciences and Cyberspace, Tsinghua University, Beijing, ChinaInstitute for Network Sciences and Cyberspace, Tsinghua University, Beijing, ChinaInstitute for Network Sciences and Cyberspace, Tsinghua University, Beijing, ChinaAs location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. We argue that a good location privacy preservation scheme should have these properties. First, a user should never expose its precise location to any other entity. Second, a user should be able to specify its own requirement on the strength of privacy preservation, since a stricter preservation requirement may increase its overhead. Third, the scheme should be able to preserve as many as possible aspects of users' privacy under various attacks. With these desired properties in mind, we carefully design an encoding scheme of users' identifiers and a fully distributed architecture for our purpose and propose a privacy preservation scheme based on them. With the help of the encoding scheme and the distributed architecture, we develop a distributed negotiation algorithm to help users conduct negotiations among themselves to find their cloaked regions that satisfy their self-defined requirements without exposing their precise locations. The negotiations are completed without coordination from any central servers, and a random proxy is selected for each individual request, therefore the potential risks caused by any central server (location-based service servers or trusted-third-party servers) are mitigated as much as possible. Experiments show that our scheme can satisfy different strengths of privacy preservation required by each user even under the most severe scenarios.https://ieeexplore.ieee.org/document/9025029/k-anonymitylocation-based servicelocation privacypeer-to-peer
spellingShingle Shengchao Liu
Jessie Hui Wang
Jilong Wang
Qianli Zhang
Achieving User-Defined Location Privacy Preservation Using a P2P System
IEEE Access
k-anonymity
location-based service
location privacy
peer-to-peer
title Achieving User-Defined Location Privacy Preservation Using a P2P System
title_full Achieving User-Defined Location Privacy Preservation Using a P2P System
title_fullStr Achieving User-Defined Location Privacy Preservation Using a P2P System
title_full_unstemmed Achieving User-Defined Location Privacy Preservation Using a P2P System
title_short Achieving User-Defined Location Privacy Preservation Using a P2P System
title_sort achieving user defined location privacy preservation using a p2p system
topic k-anonymity
location-based service
location privacy
peer-to-peer
url https://ieeexplore.ieee.org/document/9025029/
work_keys_str_mv AT shengchaoliu achievinguserdefinedlocationprivacypreservationusingap2psystem
AT jessiehuiwang achievinguserdefinedlocationprivacypreservationusingap2psystem
AT jilongwang achievinguserdefinedlocationprivacypreservationusingap2psystem
AT qianlizhang achievinguserdefinedlocationprivacypreservationusingap2psystem