Journal Home > Volume 28 , Issue 3

A Location-Based Service (LBS) refers to geolocation-based services that bring both convenience and vulnerability. With an increase in the scale and value of data, most existing location privacy protection protocols cannot balance privacy and utility. To solve the revealing problems in LBS, we propose a differential privacy protection protocol based on location entropy. First, we design an algorithm of the best-assisted user selection for constructing anonymity sets. Second, we employ smart contracts to evaluate the credibility of participants, which ensures the honesty of participants. Moreover, we provide a comprehensive experiment; the theoretical analysis and experiments show that the proposed protocol effectively resists background knowledge attacks. Generally, our protocol improves data availability. Particularly, it realizes user-controllable privacy protection, which improves privacy protection and strengthens security.


menu
Abstract
Full text
Outline
About this article

A Differential Privacy Protection Protocol Based on Location Entropy

Show Author's information Ping Guo1Baopeng Ye2Yuling Chen1( )Tao Li1Yixian Yang3Xiaobin Qian4Xiaomei Yu5
State Key Laboratory of Public Big Data, School of Computer Science and Technology, Guizhou University, Guiyang 550025, China
Information Technology Innovation Service Center of Guizhou Province, Guiyang 550025, China
School of Cyberspace Security, Beijing University of Posts and Telecommnuications, Beijing 100000, China
Guizhou CoVision Science & Technology Co., Ltd., Guiyang 550025, China
School of Information Science and Engineering, Shandong Normal University, Jinan 250000, China

Abstract

A Location-Based Service (LBS) refers to geolocation-based services that bring both convenience and vulnerability. With an increase in the scale and value of data, most existing location privacy protection protocols cannot balance privacy and utility. To solve the revealing problems in LBS, we propose a differential privacy protection protocol based on location entropy. First, we design an algorithm of the best-assisted user selection for constructing anonymity sets. Second, we employ smart contracts to evaluate the credibility of participants, which ensures the honesty of participants. Moreover, we provide a comprehensive experiment; the theoretical analysis and experiments show that the proposed protocol effectively resists background knowledge attacks. Generally, our protocol improves data availability. Particularly, it realizes user-controllable privacy protection, which improves privacy protection and strengthens security.

Keywords:

Location-Based Services (LBS), smart contract, location entropy, differential privacy, privacy protection
Received: 09 November 2021 Revised: 02 December 2021 Accepted: 08 January 2022 Published: 05 June 2023 Issue date: June 2023
References(43)
[1]
X. Pan, Z. Huo, and X. F. Meng, Location Big Data Privacy Management, (in Chinese). Beijing, China: Machine Press, 2017.
[2]
J. Li, X. Pei, X. J. Wang, D. Y. Yao, Y. Zhang, and Y. Yue, Transportation mode identification with GPS trajectory data and GIS information, Tsinghua Science and Technology, vol. 26, no. 4, pp. 403–416, 2021.
[3]
M. Azrour, J. Mabrouki, A. Guezzaz, and Y. Farhaoui, New enhanced authentication protocol for internet of things, Big Data Mining and Analytics, vol. 4, no. 1, pp. 1–9, 2021.
[4]
L. Y. Qi, C. H. Hu, X. Y. Zhang, M. R. Khosravi, S. Sharma, S. N. Pang, and T. Wang, Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment, IEEE Trans. Industr. Inform., vol. 17, no. 6, pp. 4159–4167, 2021.
[5]
Y. L. Chen, J. Sun, Y. X. Yang, T. Li, X. X. Niu, and H. Y. Zhou, PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs, Int. J. Intell. Syst., vol. 37, no. 2, pp. 1204–1221, 2022.
[6]
J. Mabrouki, M. Azrour, D. Dhiba, Y. Farhaoui, and S. El Hajjaji, IoT-based data logger for weather monitoring using arduino-based wireless sensor networks with remote graphical application and alerts, Big Data Mining and Analytics, vol. 4, no. 1, pp. 25–32, 2021.
[7]
Y. Khazbak, J. Y. Fan, S. C. Zhu, and G. H. Cao, Preserving personalized location privacy in ride-hailing service, Tsinghua Science and Technology, vol. 25, no. 6, pp. 743–757, 2020.
[8]
Y. W. Liu, A. X. Pei, F. Wang, Y. H. Yang, X. Y. Zhang, H. Wang, H. N. Dai, L. Y. Qi, and R. Ma, An attention-based category-aware GRU model for the next poi recommendation, Int. J. Intell. Syst., vol. 36, no. 7, pp. 3174–3189, 2021.
[9]
P. Nitu, J. Coelho, and P. Madiraju, Improvising personalized travel recommendation system with recency effects, Big Data Mining and Analytics, vol. 4, no. 3, pp. 139–154, 2021.
[10]
R. Kumari, S. Kumar, R. C. Poonia, V. Singh, L. Raja, V. Bhatnagar, and P. Agarwal, Analysis and predictions of spread, recovery, and death caused by covid-19 in India, Big Data Mining and Analytics, vol. 4, no. 2, pp. 65–75, 2021.
[11]
H. S. Chen, Y. P. Zhang, Y. R. Cao, and J. Xie, Security issues and defensive approaches in deep learning frameworks, Tsinghua Science and Technology, vol. 26, no. 6, pp. 894–905, 2021.
[12]
S. Y. Xu, X. Chen, and Y. H. He, EVchain: An anonymous blockchain-based system for charging-connected electric vehicles, Tsinghua Science and Technology, vol. 26, no. 6, pp. 845–856, 2021.
[13]
C. Dwork, Differential privacy, in Proc. 33rd Int. Colloquium on Automata, Languages and Programming, Venice, Italy, 2006, pp. 1–12.
[14]
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, Our data, ourselves: Privacy via distributed noise generation, in Proc. 24th Annu. Int. Conf. on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 2006, pp. 486–503.
[15]
C. Dwork and G. N. Rothblum, Concentrated differential privacy, arXiv preprint arXiv: 1603.01887, 2016.
[16]
P. Austrin, Towards sharp inapproximability for any 2-CSP, in Proc. 48th Annu. IEEE Symp. on Foundations of Computer Science (FOCS’07), Providence, RI, USA, 2007, pp. 307–317.
[17]
Q. Geng and P. Viswanath, The optimal noise-adding mechanism in differential privacy, IEEE Trans. Inf. Theory, vol. 62, no. 2, pp. 925–951, 2016.
[18]
C. Li, G. Miklau, M. Hay, A. McGregor, and V. Rastogi, The matrix mechanism: Optimizing linear counting queries under differential privacy, VLDB J., vol. 24, no. 6, pp. 757–781, 2015.
[19]
Y. L. Chen, S. Dong, T. Li, Y. L. Wang, and H. Y. Zhou, Dynamic multi-key FHE in asymmetric key setting from LWE, IEEE Trans. Inf. Foren. Sec., vol. 16, pp. 5239–5249, 2021.
[20]
R. Shokri, G. Theodorakopoulos, C. Troncoso, J. P. Hubaux, and J. Y. Le Boudec, Protecting location privacy: Optimal strategy against localization attacks, in Proc. 2012 ACM Conf. on Computer and Communications Security, Raleigh, NC, USA, 2012, pp. 617–627.
[21]
K. Chatzikokolakis, C. Palamidessi, and M. Stronati, Geo-indistinguishability: A principled approach to location privacy, in Proc. 11th Int. Conf. on Distributed Computing and Internet Technology, Bhubaneswar, India, 2015, pp. 49–72.
[22]
R. Shokri, Privacy games: Optimal user-centric data obfuscation, Proc. Priv. Enhanc. Technol., vol. 2015, no. 2, pp. 299–315, 2015.
[23]
L. N. Ni, C. Li, X. Wang, H. L. Jiang, and J. G. Yu, DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data, IEEE Access, vol. 6, pp. 21053–21063, 2018.
[24]
B. Niu, Q. H. Li, X. Y. Zhu, G. H. Cao, and H. Li, Achieving k-anonymity in privacy-aware location-based services, in Proc. IEEE Conf. on Computer Communications, Toronto, Canada, 2014, pp. 754–762.
[25]
B. Niu, Q. H. Li, X. Y. Zhu, G. H. Cao, and H. Li, Enhancing privacy through caching in location-based services, in Proc. 2015 IEEE Conf. on Computer Communications (INFOCOM), Hong Kong, China, 2015, pp. 1017–1025.
[26]
H. To, K. Nguyen, and C. Shahabi, Differentially private publication of location entropy, in Proc. 24th ACM SIGSPATIAL Int. Conf. on Advances in Geographic Information Systems, Burlingame, CA, USA, 2016, p. 35.
[27]
Y. L. Wang, G. Y. Yang, T. Li, F. Y. Li, Y. L. Tian, and X. M. Yu, Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices, J. Netw. Comput. Appl., vol. 161, p. 102641, 2020.
[28]
G. J. Han, H. Wang, M. Guizani, S. Chan, and W. B. Zhang, KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT, IEEE Wirel. Commun., vol. 25, no. 6, pp. 84–90, 2018.
[29]
L. N. Ni, F. L. Tian, Q. H. Ni, Y. Yan, and J. Q. Zhang, An anonymous entropy-based location privacy protection scheme in mobile social networks, EURASIP J. Wirel. Commun. Netw., vol. 2019, p. 93, 2019.
[30]
H. Liu, X. H. Li, B. Luo, Y. W. Wang, Y. B. Ren, J. F. Ma, and H. F. Ding, Distributed k-anonymity location privacy protection scheme based on blockchain, (in Chinese), Chin. J. Comput., vol. 42, no. 5, pp. 942–960, 2019.
[31]
T. Li, Z. J. Wang, G. Y. Yang, Y. Cui, Y. L. Chen, and X. M. Yu, Semi-selfish mining based on hidden Markov decision process, Int. J. Intell. Syst., vol. 36, no. 7, pp. 3596–3612, 2021.
[32]
T. Li, Z. J. Wang, Y. L. Chen, C. M. Li, Y. L. Jia, and Y. X. Yang, Is semi-selfish mining available without being detected? Int. J. Intell. Syst., .
[33]
Y. L. Wang, G. Y. Yang, A. Bracciali, H. F. Leung, H. B. Tian, L. S. Ke, and X. M. Yu, Incentive compatible and anti-compounding of wealth in proof-of-stake, Inf. Sci., vol. 530, pp. 85–94, 2020.
[34]
T. Li, Y. L. Chen, Y. L. Wang, Y. L. Wang, M. H. Zhao, H. J. Zhu, Y. L. Tian, X. M. Yu, and Y. X. Yang, Rational protocols and attacks in blockchain system, Sec. Commun. Netw., vol. 2020, p. 8839047, 2020.
[35]
X. J. Zhu, E. Ayday, and R. Vitenberg, A privacy-preserving framework for outsourcing location-based services to the cloud, IEEE Trans. Dependable Secure Comput., vol. 18, no. 1, pp. 384–399, 2021.
[36]
Z. Huo and X. F. Meng, A trajectory data publication method under differential privacy, (in Chinese), Chin. J. Comput., vol. 41, no. 2, pp. 400–412, 2018.
[37]
X. D. Bi, Y. Liang, H. Z. Shi, and H. Tian, A parameterized location privacy protection method based on two-level anonymity, (in Chinese), J. Shandong Univ. (Nat. Sci.), vol. 52, no. 5, pp. 75–84, 2017.
[38]
C. E. Shannon, A mathematical theory of communication, ACM Sigmobile Mobile Comput. Commun. Rev., vol. 5, no. 1, pp. 3–55, 2001.
[39]
Y. F. Wang, Y. L. Luo, Q. Y. Yu, Q. Q. Liu, and W. Chen, Trajectory privacy-preserving method based on information entropy suppression, (in Chinese), J. Comput. Appl., vol. 38, no. 11, pp. 3252–3257, 2018.
[40]
L. W. Ouyang, S. Wang, Y. Yuan, X. C. Ni, and F. Y. Wang, Smart contracts: Architecture and research progresses, (in Chinese), Acta Automat. Sin., vol. 45, no. 3, pp. 445–457, 2019.
[41]
F. Y. Li, D. F. Wang, Y. L. Wang, X. M. Yu, N. Wu, J. G. Yu, and H. Y. Zhou, Wireless communications and mobile computing blockchain-based trust management in distributed internet of things, Wirel. Commun. Mobile Comput., vol. 2020, p. 8864533, 2020.
[42]
F. Y. Li, R. Ge, H. Y. Zhou, Y. L. Wang, Z. X. Liu, and X. M. Yu, Tesia: A trusted efficient service evaluation model in internet of things based on improved aggregation signature, Concurr. Comput.: Pract. Exp., .
[43]
B. K. Samanthula, D. Karthikeyan, B. X. Dong, and K. A. Kumari, ESPADE: An efficient and semantically secure shortest path discovery for outsourced location-based services, Cryptography, vol. 4, no. 4, p. 29, 2020.
Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 09 November 2021
Revised: 02 December 2021
Accepted: 08 January 2022
Published: 05 June 2023
Issue date: June 2023

Copyright

© The author(s) 2023.

Acknowledgements

This study was supported by the National Natural Science Foundation of China (No. 61962009), Major Scientific and Technological Special Project of Guizhou Province (No. 20183001), Science and Technology Support Plan of Guizhou Province (No. [2020] 2Y011), and the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No. 2018BDKFJJ005).

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return