This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.
|
|
1 | (16) |
|
|
1 | (1) |
|
1.2 Definition of Location Privacy |
|
|
2 | (4) |
|
1.2.1 Location-Based Services |
|
|
2 | (1) |
|
1.2.2 Representation of Location Information |
|
|
3 | (2) |
|
1.2.3 The Definition of Location Privacy |
|
|
5 | (1) |
|
1.2.4 Location Privacy Versus Data Privacy |
|
|
6 | (1) |
|
1.3 Location Attacks and Adversaries |
|
|
6 | (4) |
|
1.3.1 Location Information Obtaining Methods |
|
|
7 | (1) |
|
1.3.2 Types of Adversarial Knowledge |
|
|
7 | (1) |
|
|
8 | (1) |
|
1.3.4 Types of Attack Methods |
|
|
9 | (1) |
|
|
10 | (1) |
|
1.4 People's View About Location Privacy |
|
|
10 | (1) |
|
1.4.1 Do People Really Know How Much of Their Location Information Has Been Collected or Revealed? |
|
|
10 | (1) |
|
1.4.2 How Do People Care About Their Location Privacy? |
|
|
11 | (1) |
|
1.5 Location-Based Services in Practical Applications |
|
|
11 | (2) |
|
1.6 The Unified Location Privacy Research Framework |
|
|
13 | (1) |
|
1.7 Outline and Book Overview |
|
|
14 | (3) |
|
|
14 | (3) |
|
2 Location Privacy-Preserving Mechanisms |
|
|
17 | (16) |
|
2.1 Cryptographic Mechanism |
|
|
17 | (1) |
|
2.2 Anonymization Mechanisms |
|
|
18 | (2) |
|
|
18 | (1) |
|
|
19 | (1) |
|
2.3 Obfuscation Mechanisms |
|
|
20 | (2) |
|
|
20 | (1) |
|
2.3.2 Location Obfuscation |
|
|
20 | (1) |
|
2.3.3 Differential Privacy-Based Methods |
|
|
21 | (1) |
|
2.4 Reducing Location Information Sharing |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
2.5 Comparisons and Discussions |
|
|
22 | (3) |
|
2.5.1 LPPMs Versus Other Privacy Preservation Techniques |
|
|
22 | (2) |
|
2.5.2 Comparisons of the Four Different Groups |
|
|
24 | (1) |
|
2.6 Performance Evaluation: Location Privacy Metrics |
|
|
25 | (8) |
|
|
25 | (1) |
|
|
26 | (1) |
|
2.6.3 Information Gain or Loss |
|
|
26 | (1) |
|
2.6.4 Geo-Indistinguishability |
|
|
27 | (1) |
|
|
27 | (1) |
|
2.6.6 Discussion on Performance Metrics |
|
|
28 | (1) |
|
|
28 | (5) |
|
3 Location Privacy in Mobile Social Network Applications |
|
|
33 | (14) |
|
|
33 | (1) |
|
3.2 Sensitive Location Prediction by Users Social Network Data |
|
|
34 | (3) |
|
3.2.1 Content-Based Approach |
|
|
34 | (1) |
|
3.2.2 Check-In-Based Approach |
|
|
34 | (1) |
|
3.2.3 Check-In Behavior of Users in Mobile Social Networks |
|
|
35 | (1) |
|
3.2.4 Home Location Prediction Algorithms |
|
|
36 | (1) |
|
3.2.5 The Adversary and Attack Models |
|
|
36 | (1) |
|
|
37 | (1) |
|
3.3 Protecting Important Locations in Social Networks |
|
|
37 | (5) |
|
3.3.1 Community-Based Geo-Location Information Sharing Scheme |
|
|
37 | (2) |
|
3.3.2 Aggregated Check-In Behavior of Users in a Community |
|
|
39 | (1) |
|
3.3.3 Datasets and Evaluation Setup |
|
|
39 | (1) |
|
3.3.4 Impact on Spatial Feature of the Check-Ins |
|
|
40 | (1) |
|
3.3.5 Impact on Home Location Prediction Algorithms |
|
|
40 | (2) |
|
|
42 | (5) |
|
|
45 | (2) |
|
4 Location Privacy in Mobile Crowd Sensing Applications |
|
|
47 | (30) |
|
|
47 | (2) |
|
4.2 System Model and Problem Formulation |
|
|
49 | (5) |
|
4.2.1 The General Mobile Crowd Sensing System |
|
|
49 | (1) |
|
4.2.2 The Basic Idea of Privacy-Preserving MCS Application Framework |
|
|
49 | (2) |
|
4.2.3 Location Privacy Metric |
|
|
51 | (1) |
|
4.2.4 Economic Models for the MCS Application |
|
|
51 | (2) |
|
4.2.5 Problem Formulation |
|
|
53 | (1) |
|
4.3 Privacy-Preserving MCS Schemes Based on Economic Models |
|
|
54 | (8) |
|
4.3.1 The Monopoly Model-Based Scheme (MMBS) |
|
|
55 | (3) |
|
4.3.2 Cournot's Oligopoly Model-Based Scheme (COMBS) |
|
|
58 | (2) |
|
4.3.3 Privacy Analysis of Our Proposed Schemes |
|
|
60 | (2) |
|
4.4 Performance Evaluation |
|
|
62 | (12) |
|
|
62 | (1) |
|
4.4.2 Performance Analysis |
|
|
63 | (9) |
|
|
72 | (2) |
|
4.5 Conclusions and Future Works |
|
|
74 | (3) |
|
|
75 | (2) |
|
5 Location Privacy in Wireless Vehicular Networks |
|
|
77 | (22) |
|
|
77 | (2) |
|
|
79 | (4) |
|
|
79 | (1) |
|
5.2.2 V2R Communication Model |
|
|
80 | (2) |
|
5.2.3 Privacy Threats for In-Vehicle Users and Adversary Attack Models |
|
|
82 | (1) |
|
5.2.4 POI Query Probability |
|
|
82 | (1) |
|
5.3 Problem Formulation and the Proposed Privacy-Enhancing Scheme |
|
|
83 | (5) |
|
5.3.1 Basic Idea of Our Privacy Preservation Framework |
|
|
83 | (1) |
|
5.3.2 Location Privacy Metrics |
|
|
84 | (1) |
|
5.3.3 Problem Formulation |
|
|
85 | (1) |
|
5.3.4 Privacy-Enhancing Scheme Based on LBS Content Broadcasting and Active Caching (LBS-CBAC) |
|
|
86 | (2) |
|
5.3.5 Knowledge-Based Pre-caching for RSU Broadcasting Content |
|
|
88 | (1) |
|
5.4 Performance Evaluation |
|
|
88 | (9) |
|
|
88 | (2) |
|
5.4.2 Performance Analysis |
|
|
90 | (5) |
|
5.4.3 Comparison of Privacy Level with k-Anonymity Methods |
|
|
95 | (1) |
|
5.4.4 Further Discussions |
|
|
96 | (1) |
|
|
97 | (2) |
|
|
97 | (2) |
|
6 Future Directions and Conclusions |
|
|
99 | |
|
|
99 | (1) |
|
6.1.1 Location Privacy Protection Under Correlations |
|
|
99 | (1) |
|
6.1.2 Location Privacy in Big Data and Deep Learning Era |
|
|
99 | (1) |
|
6.1.3 Location Privacy in Autonomous Systems |
|
|
100 | (1) |
|
|
100 | |
|
|
101 | |
Bo Liu received his B.S. degree from Nanjing University of Posts and Telecommunications, China, in 2004 and his M.S. and Ph.D. degrees in 2007 and 2010, respectively, from Shanghai Jiao Tong University, Shanghai, China, all in Electrical Engineering. From 2010 to 2014, he was an Assistant/Associate Research Professor at the Electrical Engineering Department, Shanghai Jiao Tong University. He was a postdoctoral research fellow at Deakin University, Melbourne, Australia, from 2014 to 2017. He is currently a lecturer at the Department of Engineering, La Trobe University, VIC 3086, Australia. His research interests include wireless communications and networking, security, and privacy issues in wireless networks. Wanlei Zhou received his B.Eng. and M.Eng. degrees from Harbin Institute of Technology, China in 1982 and 1984, respectively, and his Ph.D. degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a D.Sc. degree from Deakin University in 2002. He is currently the Head of School of school of software in University of Technology Sydney, Australia. He was an Alfred Deakin Professor and Chair of Information Technology, School of Information Technology. Professor Zhou has published more than 300 papers in refereed international journals and conference proceedings, and he has chaired numerous international conferences. Tianqing Zhu received her B.Eng. and M.Eng. degrees from Wuhan University, China, in 2000 and 2004, respectively, and her Ph.D. in Computer Science from Deakin University, Australia, in 2014. Dr. Zhu is currently a senior lecturer in the school of software in University of Technology Sydney, Australia. Before that, she was a lecturer in the School of Information Technology, Deakin University. Her research interests include privacy preservation, data mining and network security. Yong Xiang received his B.Eng. and M.E. degrees from the University of Electronic Science and Technology of China, Chengdu, China, in 1983 and 1989, respectively. In 2003, he received his Ph.D. degree from The University of Melbourne, Australia. He is currently a Professor at the School of Information Technology at Deakin University, Melbourne, Australia. He is also the Associate Head of School (Research) and Director of the Artificial Intelligence and Data Analytics Research Cluster. His research interests include information security and privacy, multimedia (speech/image/video) processing, wireless sensor networks and IoT, and biomedical signal processing. He has authored over 160 refereed journal and conference papers in these areas. Kun Wang received his B. Eng. and Ph.D. degrees from the School of Computer Science, Nanjing University of Posts and Telecommunications, China, in 2004 and 2009, respectively. From 2013 to 2015, he was a postdoctoral fellow at the Electrical Engineering Department, University of California, Los Angeles (UCLA), USA. In 2016, he was a research fellow at the School of Computer Science and Engineering, the University of AIZU, Fukushima, Japan. He is currently a research fellow at the Department of Computing, Hong Kong Polytechnic University, China, and also a Full Professor at the School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China. He has published over 100 papers in refereed international conferences and journals. He is a senior member of the IEEE and a member of the ACM. His current research interests are mainly in big data, wireless communications and networking, smart grids, and information security technologies.