Anonymizing continuous queries with delay-tolerant mix-zones over road networks

被引:41
作者
Palanisamy, Balaji [1 ]
Liu, Ling [2 ]
Lee, Kisung [2 ]
Meng, Shicong [3 ]
Tang, Yuzhe [2 ]
Zhou, Yang [2 ]
机构
[1] Univ Pittsburgh, Sch Informat Sci, Pittsburgh, PA 15260 USA
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
[3] IBM TJ Watson Res Ctr, Hawthorne, NY USA
基金
美国国家科学基金会;
关键词
Location privacy; Mobile computing;
D O I
10.1007/s10619-013-7128-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a delay-tolerant mix-zone framework for protecting the location privacy of mobile users against continuous query correlation attacks. First, we describe and analyze the continuous query correlation attacks (CQ-attacks) that perform query correlation based inference to break the anonymity of road network-aware mix-zones. We formally study the privacy strengths of the mix-zone anonymization under the CQ-attack model and argue that spatial cloaking or temporal cloaking over road network mix-zones is ineffective and susceptible to attacks that carry out inference by combining query correlation with timing correlation (CQ-timing attack) and transition correlation (CQ-transition attack) information. Next, we introduce three types of delay-tolerant road network mix-zones (i.e., temporal, spatial and spatio-temporal) that are free from CQ-timing and CQ-transition attacks and in contrast to conventional mix-zones, perform a combination of both location mixing and identity mixing of spatially and temporally perturbed user locations to achieve stronger anonymity under the CQ-attack model. We show that by combining temporal and spatial delay-tolerant mix-zones, we can obtain the strongest anonymity for continuous queries while making acceptable tradeoff between anonymous query processing cost and temporal delay incurred in anonymous query processing. We evaluate the proposed techniques through extensive experiments conducted on realistic traces produced by GTMobiSim on different scales of geographic maps. Our experiments show that the proposed techniques offer high level of anonymity and attack resilience to continuous queries.
引用
收藏
页码:91 / 118
页数:28
相关论文
共 23 条
[1]  
Amini S, 2011, MOBISYS
[2]  
[Anonymous], 2006, VLDB
[3]  
[Anonymous], IEEE PERVASIVE COMPU
[4]  
Ardagna C, 2011, IEEE TDSC
[5]  
Bamba Bhuvan., 2008, WWW
[6]  
Bettini C, 2009, LECT NOTES COMPUTER, V5599
[7]  
Buttyan Levente., 2007, ESAS
[8]  
Chow C, 2007, SSTD
[9]  
Chow Chi-Yin., 2011, GeoInformatica
[10]  
Dewri R, 2010, MDM