Comparative Analysis of Privacy Preserving Location Based Services Mechanisms

Authors

  • Muzamil Hussain Department of Computer Systems Engineering, QUEST Nawabshah, Pakistan
  • Fizza Abbas Alvi Associate Professor, Department of Computer Systems Engineering, QUEST Nawabshah, Pakistan
  • Ubaidullah Rajput Department of Computer Systems Engineering, QUEST Nawabshah, Pakistan

DOI:

https://doi.org/10.21015/vtcs.v11i1.1379

Abstract

Recent trends in computing have enabled the provision of location-based services, offering practicality and convenience to users. Moreover, this has also given rise to new challenges and vulnerabilities that can potentially compromise user privacy. As these services are predominantly used on handheld devices, the risk of security breaches is higher. This research collates existing studies that have conducted quantitative and qualitative comparisons and analyses on how to address related challenges, with a particular focus on protecting user privacy in location-based services.

References

M. B. Rajashekar and S. M. Sundaram, “A survey on user’s location detail privacy-preserving models,” SN Comput. Sci., vol. 1, no. 3, 2020.

H. Jiang, J. Li, P. Zhao, F. Zeng, Z. Xiao, and A. Iyengar, “Location privacy-preserving mechanisms in location-based services: A comprehensive survey,” ACM Comput. Surv., vol. 54, no. 1, pp. 1–36, 2022.

M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes,” J. Netw. Comput. Appl., vol. 101, pp. 55–82, 2018.

S. Ji, P. Mittal, and R. Beyah, “Graph data anonymization, DE-anonymization attacks, and DEanonymizability quantification: A survey,” IEEE Commun. Surv. Tutor., vol. 19, no. 2, pp. 1305–1326, Secondquarter 2017.

J. Cortes, G. E. Dullerud, S. Han, J. L. Ny, S. Mitra, and G. J. Pappas, “Differential privacy in control and network systems,” in 2016 IEEE 55th Conference on Decision and Control (CDC), 2016, pp. 4252–4272.

K. G. Shin, X. Ju, Z. Chen, and X. Hu, “Privacy protection for users of location-based services,” IEEE Wirel. Commun., vol. 19, no. 1, pp. 30–39, 2012.

F. Li, S. Wan, B. Niu, H. Li, and Y. He, “Time obfuscation-based privacy-preserving scheme for LocationBased Services,” in 2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2016, pp. 465–470.

W. Enck et al., “TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones,” ACM Trans. Comput. Syst., vol. 32, no. 2, pp. 1–29, 2014.

C. Rechberger and R. Walch, “Privacy-preserving machine learning using cryptography,” in Security and Artificial Intelligence, Cham: Springer International Publishing, 2022, pp. 109–129.

S. Amini, J. Lindqvist, J. Hong, J. Lin, E. Toch, and N. Sadeh, “Caché: Caching location-enhanced content to improve user privacy,” in Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys ’11, 2011.

R. Shokri, G. Theodorakopoulos, P. Papadimitratos, E. Kazemi, and J.-P. Hubaux, “Hiding in the mobile crowd: LocationPrivacy through collaboration,” IEEE Trans. Dependable Secure Comput., vol. 11, no. 3, pp. 266–279, 2014.

A. Bashanfar, E. Al-Zahrani, M. Alutebei, W. Aljagthami, and S. Alshehri, “A survey on location privacypreserving mechanisms in mobile crowdsourcing,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 7, 2019.

B. Liu, L. Chen, X. Zhu, Y. Zhang, C. Zhang, and W. Qiu, Protecting location privacy in spatial crowdsourcing using encrypted data. 2017.

B. Zhu, S. Zhu, X. Liu, Y. Zhong, and H. Wu, “A novel location privacy preserving scheme for spatial crowdsourcing,” in 2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC), 2016, pp. 34–37.

B. Jia, T. Zhou, W. Li, Z. Liu, and J. Zhang, “A blockchain-based location privacy protection incentive mechanism in crowd sensing networks,” Sensors (Basel), vol. 18, no. 11, p. 3894, 2018.

K. Yang, K. Zhang, J. Ren, and X. Shen, “Security and privacy in mobile crowdsourcing networks: challenges and opportunities,” IEEE Commun. Mag., vol. 53, no. 8, pp. 75–81, 2015.

Y. Wang, Z. Cai, X. Tong, Y. Gao, and G. Yin, “Truthful incentive mechanism with location privacypreserving for mobile crowdsourcing systems,” Comput. Netw., vol. 135, pp. 32–43, 2018.

K. Mouratidis and M. L. Yiu, “Shortest path computation with no information leakage,” arXiv [cs.DB], 2012.

A. Alamer, J. Ni, X. Lin, and X. Shen, “Location privacy-aware task recommendation for spatial crowdsourcing,” in 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), 2017, pp. 1–6.

J. Li et al., “Drive2friends: Inferring social relationships from individual vehicle mobility data,” IEEE Internet Things J., vol. 7, no. 6, pp. 5116–5127, 2020.

L. Zheng, H. Yue, Z. Li, X. Pan, M. Wu, and F. Yang, “K-anonymity location privacy algorithm based on clustering,” IEEE Access, vol. 6, pp. 28328–28338, 2018.

P. Jagwani and S. Kaushik, “Privacy in location based services: Protection strategies, attack models and open challenges,” in Information Science and Applications 2017, Singapore: Springer Singapore, 2017, pp. 12–21.

B. Ying, D. Makrakis, and Z. Hou, “Motivation for protecting selfish vehicles’ location privacy in vehicular networks,” IEEE Trans. Veh. Technol., vol. 64, no. 12, pp. 5631–5641, 2015.

Y. Shen, L. Huang, L. Li, X. Lu, S. Wang, and W. Yang, “Towards preserving worker location privacy in spatial crowdsourcing,” in 2015 IEEE Global Communications Conference (GLOBECOM), 2015, pp. 1–6.

R. Al-ani, B. Zhou, Q. Shi, and A. Sagheer, “A survey on secure safety applications in VANET,” in 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2018, pp. 1485–1490.

Y. Qiu, Y. Liu, X. Li, and J. Chen, “A novel location privacy preserving approach based on blockchain,” Sensors (Basel), vol. 20, no. 12, p. 3519, 2020.

B. Li, R. Liang, D. Zhu, W. Chen, and Q. Lin, “Blockchain-based trust management model for location privacy preserving in VANET,” IEEE Trans. Intell. Transp. Syst., vol. 22, no. 6, pp. 3765–3775, 2021.

X. Wang, Y. Xing, Y. Wei, Q. Zheng, and G. Xing, “Public opinion information dissemination in mobile social networks – taking Sina Weibo as an example,” Inf. Discov. Deliv., vol. 48, no. 4, pp. 213–224, 2020.

M. K. Tefera, X. Yang, and Q. T. Sun, “A survey of system architectures, privacy preservation, and main research challenges on location-based services,” KSII Trans. Internet Inf. Syst., vol. 13, no. 6, pp. 3199–3218, 2019.

H. Liu, H. Guo, K. Yang, and H. Li, “A novel privacy-preserving location-based service framework with distributed spatial data mining,” IEEE Transactions on Cloud Computing, vol. 6, no. 4, pp. 1104–1117, 2018.

R. Lu, X. Lin, X. Liang, and X. Shen, “PALM: Privacy-enhanced and location-based messaging,” IEEE Transactions on Vehicular Technology, vol. 60, no. 4, pp. 1662–1676, 2011.

D. Zhang, H. Zhu, and R. Chen, “Private spatial data publishing with data-oblivious algorithm,” Future Generation Computer Systems, vol. 75, pp. 311–318, 2017.

Downloads

Published

2023-05-08

How to Cite

Hussain, M., Alvi, F. A., & Rajput, U. (2023). Comparative Analysis of Privacy Preserving Location Based Services Mechanisms. VAWKUM Transactions on Computer Sciences, 11(1), 142–164. https://doi.org/10.21015/vtcs.v11i1.1379