Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exploited by opponents, greatly increasing the risk of trajectory privacy leakage. This attack method is called a long-term observation attack. On the premise of ensuring lower time overhead and higher cache contribution rate, the existing methods cannot utilize cache to answer subsequent queries while also resisting long-term observation attacks. So this article proposes a trajectory privacy protection method to resist long-term observation attacks. This method combines caching technology and improves the existing differential privacy mechanism, while incorporating randomization factors that are difficult for attackers to recognize after long-term observation to enhance privacy. Search for locations in the cache of both the mobile client and edge server that can replace the user’s actual location. If there are replacement users in the cache, the query results can be obtained more quickly. Simultaneously obfuscating the spatiotemporal correlation of actual trajectories by generating confusion regions. If it does not exist, the obfuscated location generation method that resists long-term observation attacks is executed to generate the real anonymous area and send it to the service provider. The above steps can comprehensively protect the user’s trajectory privacy. The experimental results show that this method can protect user trajectories from long-term observation attacks while ensuring low time overhead and a high cache contribution rate.
References
[1]
Zhang, M., Li, X., Miao, Y., Luo, B., Ren, Y. and Ma, S. (2024) PEAK: Privacy-Enhanced Incentive Mechanism for Distributed—Anonymity in LBS. IEEE Transactions on Knowledge and Data Engineering, 36, 781-794. https://doi.org/10.1109/TKDE.2023.3295451
[2]
Jiang, H., Li, J., Zhao, P., Zeng, F., Xiao, Z. and Iyengar, A. (2021) Location Privacy-Preserving Mechanisms in Location-Based Services: A Comprehensive Survey. ACM Computing Surveys, 54, Article No. 4. https://doi.org/10.1145/3423165
[3]
Zhang, J., Xu, L. and Tsai, P.W. (2020) Community Structure-Based Trilateral Stackelberg Game Model for Privacy Protection. Applied Mathematical Modelling, 86, 20-35. https://doi.org/10.1016/j.apm.2020.04.025
[4]
Jiang, J., Han, G., Wang, H. and Guizani, M. (2019) A Survey on Location Privacy Protection in Wireless Sensor Networks. Journal of Network and Computer Applications, 125, 93-114. https://doi.org/10.1016/j.jnca.2018.10.008
[5]
Wei, J., Lin, Y., Yao, X. and Zhang, J. (2019) Differential Privacy-Based Location Protection in Spatial Crowdsourcing. IEEE Transactions on Services Computing, 15, 45-58. https://doi.org/10.1109/TSC.2019.2920643
[6]
Huang, Y., Cai, Z. and Bourgeois, A.G. (2018) Search Locations Safely and Accurately: A Location Privacy Protection Algorithm with Accurate Service. Journal of Network and Computer Applications, 103, 146-156. https://doi.org/10.1016/j.jnca.2017.12.002
[7]
Jin, W., Xiao, M., Guo, L., Yang, L. and Li, M. (2021) ULPT: A User-Centric Location Privacy Trading Framework for Mobile Crowd Sensing. IEEE Transactions on Mobile Computing, 21, 3789-3806. https://doi.org/10.1109/TMC.2021.3058181
[8]
Sun, Y., Chen, M., Hu, L., Qian, Y. and Hassan, M.M. (2017) ASA: Against Statistical Attacks for Privacy-Aware Users in Location Based Service. Future Generations Computer Systems, 70, 48-58. https://doi.org/10.1016/j.future.2016.06.017
[9]
Wang, Y., Li, M., Xin, Y., Yang, G., Tang, Q., Zhu, H., et al. (2021) Exchanging registered Users’ Submitting Reviews towards Trajectory Privacy Preservation for Review Services in Location-Based Social Networks. PLOS ONE, 16, e0256892. https://doi.org/10.1371/journal.pone.0256892
[10]
Qiu, S., Pi, D., Wang, Y. and Liu, Y. (2023) Novel Trajectory Privacy Protection Method against Prediction Attacks. Expert Systems with Applications, 213, Article 118870. https://doi.org/10.1016/j.eswa.2022.118870
[11]
Zhao, P., Liu, W., Zhang, G., Li, Z. and Wang, L. (2020) Preserving Privacy in Wifi Localization with Plausible Dummy Locations. IEEE Transactions on Vehicular Technology, 69, 11909-11925. https://doi.org/10.1109/TVT.2020.3006363
[12]
Tang, J., Zhu, H., Lu, R., Lin, X., Li, H. and Wang, F. (2021) DLP: Achieve Customizable Location Privacy with Deceptive Dummy Techniques in LBS Applications. IEEE Internet of Things Journal, 9, 6969-6984. https://doi.org/10.1109/JIOT.2021.3115849
[13]
Song, D., Song, M., Shakhov, V. and Park, K. (2021) Efficient Dummy Generation for Considering Obstacles and Protecting User Location. Concurrency and Computation: Practice and Experience, 33, e5146. https://doi.org/10.1002/cpe.5146
[14]
Siddiqie, S., Mondal, A. and Reddy, P.K. (2021) An Improved Dummy Generation Approach for Enhancing User Location Privacy. Proceedings of the 26th International Conference on Database Systems for Advanced Applications, Taipei, 11-14 April 2021, 487-495. https://doi.org/10.1007/978-3-030-73200-4_33
[15]
Zhang, S., Hu, B., Liang, W., Li, K.C. and Gupta, B.B. (2023) A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing. IEEE Internet of Things Journal, 14, 9768-9781. https://doi.org/10.1109/JIOT.2023.3235707
[16]
Zhu, S., Lv, X. and Yu, L. (2021) Location Privacy Protection Method Based on Variable Order Markov Prediction Model. Proceedings of the 4th International Conference onComputer Science and Software Engineering,Singapore, 22-24 October 2021, 25-30. https://doi.org/10.1145/3494885.3494890
[17]
Huang, Q., Xu, X., Chen, H. and Xie, L. (2022) A Vehicle Trajectory Privacy Preservation Method Based on Caching and Dummy Locations in the Internet of Vehicles. Sensors, 22, Article 4423. https://doi.org/10.3390/s22124423
[18]
Li, F., Yin, P., Chen, Y., Niu, B. and Li, H. (2020) Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs. IEEE Wireless Communications, 27, 31-37. https://doi.org/10.1109/MWC.001.1900469
[19]
Zhang, L., Zhu, S., Li, F., Li, R., Meng, J. and Li W. (2020) A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries. Wireless Algorithms, Systems, and Applications: 15th International Conference, Qingdao, 13-15 September 2020, 704-715. https://doi.org/10.1007/978-3-030-59016-1_58
[20]
Gao, Z., Huang, Y., Zheng, L., Lu, H., Wu, B. and Zhang, J. (2022) Protecting Location Privacy of Users Based on Trajectory Obfuscation in Mobile Crowdsensing. IEEE Transactions on Industrial Informatics, 18, 6290-6299. https://doi.org/10.1109/TII.2022.3146281
[21]
Gupta, A.K. and Shanker, U. (2020) OMCPR: Optimal Mobility Aware Cache Data Pre-Fetching and Replacement Policy Using Spatial K-Anonymity for LBS. Wireless Personal Communications, 114, 949-973. https://doi.org/10.1007/s11277-020-07402-2
[22]
Liu, Z., Miao, D., Li, R., Liu, Y. and Li, X. (2023) Cache-Based Privacy Protection Scheme for Continuous Location Query. Entropy, 25, Article 1569. https://doi.org/10.3390/e25121569
[23]
Wang, X. and Yang, W. (2020) Protection Method of Continuous Location Uploading Based on Local Differential Privacy. 2020 International Conference on Networking andNetwork Applications, Haikou, 10-13 December 2020, 157-161. https://doi.org/10.1109/NaNA51271.2020.00035