Achieving User-Defined Location Privacy Preservation Using a P2P System
As location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. We argue that a good location privacy preservation scheme shoul...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9025029/ |
_version_ | 1818874198115745792 |
---|---|
author | Shengchao Liu Jessie Hui Wang Jilong Wang Qianli Zhang |
author_facet | Shengchao Liu Jessie Hui Wang Jilong Wang Qianli Zhang |
author_sort | Shengchao Liu |
collection | DOAJ |
description | As location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. We argue that a good location privacy preservation scheme should have these properties. First, a user should never expose its precise location to any other entity. Second, a user should be able to specify its own requirement on the strength of privacy preservation, since a stricter preservation requirement may increase its overhead. Third, the scheme should be able to preserve as many as possible aspects of users' privacy under various attacks. With these desired properties in mind, we carefully design an encoding scheme of users' identifiers and a fully distributed architecture for our purpose and propose a privacy preservation scheme based on them. With the help of the encoding scheme and the distributed architecture, we develop a distributed negotiation algorithm to help users conduct negotiations among themselves to find their cloaked regions that satisfy their self-defined requirements without exposing their precise locations. The negotiations are completed without coordination from any central servers, and a random proxy is selected for each individual request, therefore the potential risks caused by any central server (location-based service servers or trusted-third-party servers) are mitigated as much as possible. Experiments show that our scheme can satisfy different strengths of privacy preservation required by each user even under the most severe scenarios. |
first_indexed | 2024-12-19T13:06:47Z |
format | Article |
id | doaj.art-c84bf871e15c42f6b3a1caea7715078f |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-19T13:06:47Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-c84bf871e15c42f6b3a1caea7715078f2022-12-21T20:20:01ZengIEEEIEEE Access2169-35362020-01-018458954591210.1109/ACCESS.2020.29784889025029Achieving User-Defined Location Privacy Preservation Using a P2P SystemShengchao Liu0https://orcid.org/0000-0003-4763-5196Jessie Hui Wang1https://orcid.org/0000-0002-7825-4137Jilong Wang2https://orcid.org/0000-0002-4493-5145Qianli Zhang3https://orcid.org/0000-0003-2084-7762Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, ChinaInstitute for Network Sciences and Cyberspace, Tsinghua University, Beijing, ChinaInstitute for Network Sciences and Cyberspace, Tsinghua University, Beijing, ChinaInstitute for Network Sciences and Cyberspace, Tsinghua University, Beijing, ChinaAs location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. We argue that a good location privacy preservation scheme should have these properties. First, a user should never expose its precise location to any other entity. Second, a user should be able to specify its own requirement on the strength of privacy preservation, since a stricter preservation requirement may increase its overhead. Third, the scheme should be able to preserve as many as possible aspects of users' privacy under various attacks. With these desired properties in mind, we carefully design an encoding scheme of users' identifiers and a fully distributed architecture for our purpose and propose a privacy preservation scheme based on them. With the help of the encoding scheme and the distributed architecture, we develop a distributed negotiation algorithm to help users conduct negotiations among themselves to find their cloaked regions that satisfy their self-defined requirements without exposing their precise locations. The negotiations are completed without coordination from any central servers, and a random proxy is selected for each individual request, therefore the potential risks caused by any central server (location-based service servers or trusted-third-party servers) are mitigated as much as possible. Experiments show that our scheme can satisfy different strengths of privacy preservation required by each user even under the most severe scenarios.https://ieeexplore.ieee.org/document/9025029/k-anonymitylocation-based servicelocation privacypeer-to-peer |
spellingShingle | Shengchao Liu Jessie Hui Wang Jilong Wang Qianli Zhang Achieving User-Defined Location Privacy Preservation Using a P2P System IEEE Access k-anonymity location-based service location privacy peer-to-peer |
title | Achieving User-Defined Location Privacy Preservation Using a P2P System |
title_full | Achieving User-Defined Location Privacy Preservation Using a P2P System |
title_fullStr | Achieving User-Defined Location Privacy Preservation Using a P2P System |
title_full_unstemmed | Achieving User-Defined Location Privacy Preservation Using a P2P System |
title_short | Achieving User-Defined Location Privacy Preservation Using a P2P System |
title_sort | achieving user defined location privacy preservation using a p2p system |
topic | k-anonymity location-based service location privacy peer-to-peer |
url | https://ieeexplore.ieee.org/document/9025029/ |
work_keys_str_mv | AT shengchaoliu achievinguserdefinedlocationprivacypreservationusingap2psystem AT jessiehuiwang achievinguserdefinedlocationprivacypreservationusingap2psystem AT jilongwang achievinguserdefinedlocationprivacypreservationusingap2psystem AT qianlizhang achievinguserdefinedlocationprivacypreservationusingap2psystem |