F-Seeker: Privacy-Aware Granular Moving-Object Query Framework Based on Over-Anonymity

ZHOU Zhi-gang, ZHANG Hong-li, YE Lin, YU Xiang-zhan

ACTA ELECTRONICA SINICA ›› 2016, Vol. 44 ›› Issue (10) : 2477-2484.

PDF(2706 KB)
CIE Homepage  |  Join CIE  |  Login CIE  |  中文 
PDF(2706 KB)
ACTA ELECTRONICA SINICA ›› 2016, Vol. 44 ›› Issue (10) : 2477-2484. DOI: 10.3969/j.issn.0372-2112.2016.10.028

F-Seeker: Privacy-Aware Granular Moving-Object Query Framework Based on Over-Anonymity

  • ZHOU Zhi-gang, ZHANG Hong-li, YE Lin, YU Xiang-zhan
Author information +

Abstract

Aiming to the privacy-preserving problem for moving-object retrieval services in social network,we propose a granular friend retrieval framework based on over-anonymity,called F-Seeker.Before outsourcing data,we adopt an enhanced anonymity strategy——(k,m,e)-anonymity,which preserving user privacy from the curious retrieval service provider.In the processing of providing services,the service provider employs over-anonymity strategy based on visibility requirements to realize granular data access control.In addition,we encode data using Z-order address and the retrieval efficiency can be improved by pruning.Experimental results show that the proposed strategy can protect user privacy while the computation overhead does not increase greatly.

Key words

over-anonymity / granular search / location-based service (LBS) / Voronoi diagram / Z-order space filling curve

Cite this article

Download Citations
ZHOU Zhi-gang, ZHANG Hong-li, YE Lin, YU Xiang-zhan. F-Seeker: Privacy-Aware Granular Moving-Object Query Framework Based on Over-Anonymity[J]. Acta Electronica Sinica, 2016, 44(10): 2477-2484. https://doi.org/10.3969/j.issn.0372-2112.2016.10.028

References

[1] Kido H,Yanagisawa Y,Satoh T.An anonymous communication technique using dummies for location-based services[A].Proceedings of International Conference on Pervasive Services (ICPS'05)[C].USA:IEEE Press,2005.88-97.
[2] 刘华玲,郑建国,孙辞海.基于贪心扰动的社交网络隐私保护研究[J].电子学报,2013,41(8):1586-1591. Liu Hua-ling,Zheng Jian-guo,Sun Ci-hai.Privacy preserving in social networks based on greedy perturbation[J].Acta Electronica Sinica,2013,41(8):1586-1591.(in Chinese)
[3] Rinku Dewri.Exploiting service similarity for privacy in location based search queries[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(2):374-383.
[4] Gruteser M,Grunwal D.Anonymous usage of location-based services through spatial and temporal cloaking[A].Proceedings of the International Conference on Mobile Systems Applications and Services[C].USA:IEEE Press,2013.163-168.
[5] Mokbel M F,Chow C Y,Aref W G.The new casper:Query processing for location services without compromising privacy[A].Proceedings of the International Conference on Very Large Data Bases[C].USA:VLDB Press,2006.763-774.
[6] Bhuvan B,Ling L,et al.Supporting anonymous location queries in mobile environments with privacy grid[A].Proceedings of the 17th International Conference on World Wide Web[C].USA:ACM Press,2008.237-246.
[7] 王丽娜,彭瑞卿,等.个人移动数据收集中的多维轨迹匿名方法[J].电子学报,2013,41(8):1653-1659. Wang Li-na,Peng Rui-qing,et al.Multi-dimensional trajectory anonymity in collecting personal mobility data[J].Acta Electronica Sinica,2013,41(8):1653-1659.(in Chinese)
[8] 叶阿勇,林少聪,马建峰,许力.一种主动扩散式的位置隐私保护方法[J].电子学报,2014,43(7):1362-1368. Ye A-yong,Lin Shao-cong,Ma Jian-feng,Xu Li.An active diffusion based location privacy protection method[J].Acta Electronica Sinica,2014,43(7):1362-1368.(in Chinese)
[9] Chen Q,Hu H,Xu J.Authenticating top-k queries in location-based services with confidentiality[A].Proceedings of the International Conference on Very Large Data Bases[C].USA:VLDB Press,2014.49-60.
[10] Xiong X,Aref W G.R-trees with update memos[A].Proceedings of the 22nd International Conference on Data Engineering (ICDE'06)[C].USA:IEEE Press,2006.22.
[11] Saltenis S,Jensen C S,Leutenegger S T,Lopez M A.Indexing the positions of continuously moving objects[A].Proceedings of ACM SIGMOD[C].USA:ACM Press,2000.331-342.
[12] Jensen C S,Lin D,Ooi B C.Query and update efficient B-+tree based indexing of moving objects[A].Proceedings of the International Conference on Very Large Data Bases[C].USA:VLDB Press,2004.768-779.
[13] Patel J M,Chen Y,Chakka V P.Stripes:An efficient index for predicted trajectories[A].Proceedings of ACM SIGMOD[C].USA:ACM Press,2004.637-646.
[14] Berg M de,Kreveld M van,Overmars M,Schwarzkopf O.Computational Geometry:Algorithms and Applications (2nd edition)[M].Berlin:Springer-Verlag,2000.
[15] Hu L,Ku W-S,Bakiras S,Shahabi C.Spatial query integrity with voronoi neighbors[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(4):863-876.
[16] Kalins P,Ghinita G,Mouratidis K,Papadias D.Preventing location-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
[17] Ghinita G,Kalnis P,Khoshgozaran A,Shahabi C,Tan K-L.Private queries in location based services:Anonymizers are not necessary[A].Proceedings of the ACM SIGMOD International Conference on Management of Data[C].New York:ACM,2008.121-132.
[18] Lee K,Lee W,Zheng B,Li H,Tian Y.Z-sky:an efficient skyline query processing framework based on z-order[J].The VLDB Journal,2010,19(3):333-362.
[19] William Feller.An Introduction to Probability Theory and Its Applications (Vol.1,3rd Edition)[M].USA:Wiley,1968.

Funding

National Program on Key Basic Research Project of China  (973 Program) (No.2011CB302605, No.2013CB329602); National Natural Science Foundation of China (No.61202457, No.61173144, No.61402137, No.61402149)
PDF(2706 KB)

1002

Accesses

0

Citation

Detail

Sections
Recommended

/