Countering overlapping rectangle privacy attack for moving kNN queries

被引:42
作者
Hashem, Tanzima [1 ]
Kulik, Lars [1 ]
Zhang, Rui [1 ]
机构
[1] Univ Melbourne, Dept Comp & Informat Syst, Parkville, Vic 3052, Australia
基金
澳大利亚研究理事会;
关键词
Confidence level; Moving kNN queries; Overlapping rectangle attack; Location privacy; NEAREST-NEIGHBOR QUERIES; LOCATION PRIVACY; DIFFERENTIAL PRIVACY; NEGOTIATION; OBFUSCATION;
D O I
10.1016/j.is.2012.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An important class of LBSs is supported by the moving k nearest neighbor (MkNN) query, which continuously returns the k nearest data objects for a moving user. For example, a tourist may want to observe the five nearest restaurants continuously while exploring a city so that she can drop in to one of them anytime. Using this kind of services requires the user to disclose her location continuously and therefore may cause privacy leaks derived from the user's locations. A common approach to protecting a user's location privacy is the use of imprecise locations (e.g., regions) instead of exact positions when requesting LBSs. However, simply updating a user's imprecise location to a location-based service provider (LSP) cannot ensure a user's privacy for an MkNN query: continuous disclosure of regions enable LSPs to refine more precise location of the user. We formulate this type of attack to a user's location privacy that arises from overlapping consecutive regions, and provide the first solution to counter this attack. Specifically, we develop algorithms which can process an MkNN query while protecting the user's privacy from the above attack. Extensive experiments validate the effectiveness of our privacy protection technique and the efficiency of our algorithm. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:430 / 453
页数:24
相关论文
共 45 条
  • [1] Probabilistic Voronoi diagrams for probabilistic moving nearest neighbor queries
    Ali, Mohammed Eunus
    Tanin, Egemen
    Zhang, Rui
    Kotagiri, Ramamohanarao
    [J]. DATA & KNOWLEDGE ENGINEERING, 2012, 75 : 1 - 33
  • [2] [Anonymous], P 15 ANN ACM INT S A
  • [3] [Anonymous], 2010, P 13 INT C EXT DAT T
  • [4] BECKMANN N, 1990, SIGMOD REC, V19, P322, DOI 10.1145/93605.98741
  • [5] Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185
  • [6] Cheng R, 2006, LECT NOTES COMPUT SC, V4258, P393
  • [7] Chow C.-Y., 2009, T DATABASE SYSTEMS, V34, P24
  • [8] Chow CY, 2007, LECT NOTES COMPUT SC, V4605, P258
  • [9] Chow CY, 2009, LECT NOTES COMPUT SC, V5644, P283, DOI 10.1007/978-3-642-02982-0_19
  • [10] Damiani M.L., 2009, The 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, P32, DOI DOI 10.1145/1667502.1667511