skip to main content
10.5555/1784462.1784475guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries

Published: 16 July 2007 Publication History

Abstract

Modern mobile phones and PDAs are equipped with positioning capabilities (e.g., GPS). Users can access public location-based services (e.g., Google Maps) and ask spatial queries. Although communication is encrypted, privacy and confidentiality remain major concerns, since the queries may disclose the location and identity of the user. Commonly, spatial K-anonymity is employed to hide the query initiator among a group of K users. However, existing work either fails to guarantee privacy, or exhibits unacceptably long response time.
In this paper we propose MobiHide, a Peer-to-Peer system for anonymous location-based queries, which addresses these problems. MobiHide employs the Hilbert space-filling curve to map the 2-D locations of mobile users to 1-D space. The transformed locations are indexed by a Chord-based distributed hash table, which is formed by the mobile devices. The resulting Peer-to-Peer system is used to anonymize a query by mapping it to a random group of K users that are consecutive in the 1-D space. Compared to existing state-of-the-art, MobiHide does not provide theoretical anonymity guarantees for skewed query distributions. Nevertheless, it achieves strong anonymity in practice, and it eliminates system hotspots. Our experimental evaluation shows that MobiHide has good load balancing and fault tolerance properties, and is applicable to real-life scenarios with numerous mobile users.

References

[1]
p2psim: The Peer-to-Peer Network Simulator, http://pdos.csail.mit.edu/p2psim.
[2]
Tor: Anonymity Online, http://tor.eff.org/
[3]
Brinkhoff, T.: A framework for generating network-based moving objects. Geoinformatica 6(2), 153-180 (2002).
[4]
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Proc. of Privacy Enhancing Technology Workshop (2006).
[5]
Chow, C.-Y., Mokbel, M.F., Liu, X.: A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In: ACM International Symposium on Advances in Geographic Information Systems, ACM Press, New York (2006).
[6]
Ganesan, P., Gummadi, K., Garcia-Molina, H.: Canon in G Major: Designing DHTs with Hierarchical Structure. In: Proc. of ICDCS, pp. 263-272 (2004).
[7]
Gedik, B., Liu, L.: Location Privacy inMobile Systems: A Personalized Anonymization Model. In: Proc. of ICDCS, pp. 620-629 (2005).
[8]
Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems. In: Proc of WWW (2007).
[9]
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of USENIX MobiSys (2003).
[10]
Hoh, B., Gruteser, M.: Protecting Location Privacy through Path Confusion. In: Proc. of SecureComm (2005).
[11]
Hu, H., Lee, D.L.: Range Nearest-Neighbor Query. IEEE TKDE 18(1), 78-91 (2006).
[12]
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Anonymity in Location Based Services. Technical Report TRB6/06, National University of Singapore (2006).
[13]
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: Proc. of ICDCS (2005).
[14]
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: Proc. of ICDE (2006).
[15]
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB (2006).
[16]
Moon, B., Jagadish, H.V., Faloutsos, C., Saltz, J.H.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE 13(1), 124-141 (2001).
[17]
Samarati, P.: Protecting Respondents' Identities in Microdata Release. IEEE TKDE 13(6), 1010-1027 (2001).
[18]
Samet, H.: The Design and Analysis of Spatial Data Structures. Addison-Wesley, Reading (1990).
[19]
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking 11(1), 17-32 (2003).
[20]
Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557-570 (2002).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SSTD'07: Proceedings of the 10th international conference on Advances in spatial and temporal databases
July 2007
478 pages
ISBN:9783540735397
  • Editors:
  • Dimitris Papadias,
  • Donghui Zhang,
  • George Kollios

Sponsors

  • ESRI
  • Oracle Spatial
  • Microsoft Research: Microsoft Research

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 16 July 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media