Advanced Search
Volume 46 Issue 1
Jan.  2024
Turn off MathJax
Article Contents
ZHAO Guofeng, WU Hao, WANG Shanshan, XU Chuan, TANG Wenyu. A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks[J]. Journal of Electronics & Information Technology, 2024, 46(1): 155-164. doi: 10.11999/JEIT221599
Citation: ZHAO Guofeng, WU Hao, WANG Shanshan, XU Chuan, TANG Wenyu. A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks[J]. Journal of Electronics & Information Technology, 2024, 46(1): 155-164. doi: 10.11999/JEIT221599

A Location Privacy and Query Privacy Joint Protection Scheme for POI Query in Vehicular Networks

doi: 10.11999/JEIT221599
Funds:  The National Natural Science Foundation of China (62171070), Chongqing Post-Doctoral Science Fund Project (CSTB2022NSCQ-BHX0043), China Postdoctoral Science Foundation (2023MD734136)
  • Received Date: 2023-01-05
  • Rev Recd Date: 2023-05-12
  • Available Online: 2023-05-22
  • Publish Date: 2024-01-17
  • In vehicular networks, the Point Of Interest (POI) query is widely used in Location-Based Services (LBS) for vehicle applications. However, since the attackers can easily access the location, query content, and other information, it is difficult to protect the LBS privacy of vehicle users only using location privacy protection or query privacy protection independently. Therefore, a location privacy and query privacy joint protection scheme based on dummy sequences is proposed. According to the limitations of the POI query, the correlations between location privacy and query privacy are modelled to obtain the correlation judgment model characterized by the Euclidean distance and the association rule algorithm. Moreover, based on dummy sequences, the joint protection is transformed into the dummy sequence selection according to the factors that affect user privacy and the correlation value of real query. Then a constrained multi-objective optimization model is established to obtain the query sequence with a high level of anonymity and a big cloaking region. Experimental results demonstrate that our scheme can resist joint attacks on location privacy and query privacy and protect users’ LBS privacy more efficiently than existing schemes.
  • loading
  • [1]
    XU Chuan, LUO Li, DING Yingyi, et al. Personalized location privacy protection for location-based services in vehicular networks[J]. IEEE Wireless Communications Letters, 2020, 9(10): 1633–1637. doi: 10.1109/LWC.2020.2999524
    [2]
    冯登国, 张敏, 叶宇桐. 基于差分隐私模型的位置轨迹发布技术研究[J]. 电子与信息学报, 2020, 42(1): 74–88. doi: 10.11999/JEIT190632

    FENG Dengguo, ZHANG Min, and YE Yutong. Research on differentially private trajectory data publishing[J]. Journal of Electronics &Information Technology, 2020, 42(1): 74–88. doi: 10.11999/JEIT190632
    [3]
    KUANG Li, HE Shuai, FAN Yuyou, et al. T-SR: A location privacy protection algorithm based on POI query[J]. IEEE Access, 2019, 7: 59491–59503. doi: 10.1109/ACCESS.2019.2913547
    [4]
    WANG Shengling, HU Qin, SUN Yunchuan, et al. Privacy preservation in location-based services[J]. IEEE Communications Magazine, 2018, 56(3): 134–140. doi: 10.1109/MCOM.2018.1700288
    [5]
    LI Xingxin, ZHU Youwen, and WANG Jian. Highly efficient privacy preserving location-based services with enhanced one-round blind filter[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(4): 1803–1814. doi: 10.1109/TETC.2019.2926385
    [6]
    FAROUK F, ALKADY Y, and RIZK R. Efficient privacy-preserving scheme for location based services in VANET system[J]. IEEE Access, 2020, 8: 60101–60116. doi: 10.1109/ACCESS.2020.2982636
    [7]
    SHAHAM S, DING Ming, LIU Bo, et al. Privacy preservation in location-based services: A novel metric and attack model[J]. IEEE Transactions on Mobile Computing, 2021, 20(10): 3006–3019. doi: 10.1109/TMC.2020.2993599
    [8]
    PINGLEY A, ZHANG Nan, FU Xinwen, et al. Protection of query privacy for continuous location based services[C]. 2011 Proceedings IEEE INFOCOM, Shanghai, China, 2011: 1710–1718.
    [9]
    YADAV V K, ANDOLA N, VERMA S, et al. P2LBS: Privacy provisioning in location-based services[J]. IEEE Transactions on Services Computing, 2023, 16(1): 466–477. doi: 10.1109/TSC.2021.3123428
    [10]
    WU Zongda, LI Guiling, SHEN Shigen, et al. Constructing dummy query sequences to protect location privacy and query privacy in location-based services[J]. World Wide Web, 2021, 24(1): 25–49. doi: 10.1007/s11280-020-00830-x
    [11]
    NIU Ben, CHEN Yahong, WANG Zhibo, et al. Eclipse: Preserving differential location privacy against long-term observation attacks[J]. IEEE Transactions on Mobile Computing, 2022, 21(1): 125–138. doi: 10.1109/TMC.2020.3000730
    [12]
    HUA Jingyu, TONG Wei, XU Fengyuan, et al. A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(5): 1155–1168. doi: 10.1109/TIFS.2017.2779402
    [13]
    ASUQUO P, CRUICKSHANK H, MORLEY J, et al. Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures[J]. IEEE Internet of Things Journal, 2018, 5(6): 4778–4802. doi: 10.1109/JIOT.2018.2820039
    [14]
    HAN Jiawei, PEI Jian, and YIN Yiwen. Mining frequent patterns without candidate generation[J]. ACM SIGMOD Record, 2000, 29(2): 1–12. doi: 10.1145/335191.335372
    [15]
    NYC. TLC Trip Record Data[EB/OL]. https://www1.nyc.gov/site/tlc/about/tlc-trip-record-data.page, 2022.
    [16]
    NIU Ben, LI Qinghua, ZHU Xiaoyan, et al. Achieving k-anonymity in privacy-aware location-based services[C]. IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, Canada, 2014: 754–762.
    [17]
    ZHAO Ping, LIU Wuwu, ZHANG Guanglin, et al. Preserving privacy in WiFi localization with plausible dummy locations[J]. IEEE Transactions on Vehicular Technology, 2020, 69(10): 11909–11925. doi: 10.1109/TVT.2020.3006363
    [18]
    百度. 百度地图[EB/OL]. https://lbsyun.baidu.com/, 2022.

    BAIDU. Baidu Maps[EB/OL]. https://lbsyun.baidu.com/, 2022.
    [19]
    王洁, 王春茹, 马建峰, 等. 基于位置语义和查询概率的假位置选择算法[J]. 通信学报, 2020, 41(3): 53–61. doi: 10.11959/j.issn.1000-436x.2020061

    WANG Jie, WANG Chunru, MA Jianfeng, et al. Dummy location selection algorithm based on location semantics and query probability[J]. Journal on Communications, 2020, 41(3): 53–61. doi: 10.11959/j.issn.1000-436x.2020061
    [20]
    DEB K, PRATAP A, AGARWAL S, et al. A fast and elitist multiobjective genetic algorithm: NSGA-II[J]. IEEE Transactions on Evolutionary Computation, 2002, 6(2): 182–197. doi: 10.1109/4235.996017
    [21]
    NIU Ben, ZHU Xiaoyan, LI Weihao, et al. A personalized two-tier cloaking scheme for privacy-aware location-based services[C]. 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, USA, 2015: 94–98.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(1)

    Article Metrics

    Article views (397) PDF downloads(51) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return