Location Privacy-Preserving Query Scheme Based on the Moore Curve and Multi-User Cache
Abstract
:1. Introduction
- (1)
- Given the untrustworthy problem of the location servers, we introduce cache technology to effectively utilize historical query data, thereby reducing the number of times users send to LSPs and reducing the risk of user location privacy leakage.
- (2)
- Aiming at the problem of distrust among neighbor users, the authentication and trust calculation strategies are adopted to eliminate the mobile user equipment whose average weighted trust value is lower than the threshold, so as to protect the security of neighbor users.
- (3)
- We conduct sufficient experiments on the scheme on real and uniform datasets. The results show that the proposed location query privacy protection method not only protects the user’s query privacy and location privacy but also improves the query efficiency.
2. Related Works
2.1. Query Privacy
2.2. Cache Technology
3. Preliminaries
3.1. Space-Filling Curve
3.2. Trust Calculation
- Trust attribute set
- 2.
- Trust assessment set
- 3.
- Attribute weight set
- 4.
- Threshold
4. System Models
5. Location Privacy-Preserving Query Scheme
5.1. Multi-User Cache Policy Based on Trust Calculations
5.2. Query Strategies Based on Moore Transformation and Encryption
5.3. Details of the Query Scheme
5.4. Algorithm Implementation
Algorithm 1 Trust Computing |
Input: Edge Devices Set ED, Trust Attribute Set TA, Trust Weight Set Output: 1. for j = 1 to m do 2. for i = 1 to m & i ! = j do 3. computes trust evaluation set of after an interaction 4. computes weighted trust value with weight set 5. end 6. computes average weighted trust value of 7. if < 8. kicks out of group 9. end 10. end 11. return |
Algorithm 2 Moore Curve List Construction |
Input: Spatial Data Point, , Encryption Key, K |
Output: MI, PI |
1. for all in do |
2. normalize |
3. convert the coordinate and add the converted value to |
4. end for |
5. Sort the set of filled Moore cells, , in ascending order |
6. for all in do |
7. M_value = |
8. P_num = count(poi) |
9. P_info = |
10. end for |
11. Encrypt M_value, P_num, P_info using K |
12. return MI, PI |
Algorithm 3 Query processing |
1. if the Local cache concludes POI 2. precise POI 3. end if 4. get the MI published by LSP, determine the number corresponding POI type 5. query in a multi-user cache 6. if the neighbor user concludes POI 7. cache information locally 8. else 9. LSP sends MI to the user 10. The user locates the current Moore converted position 11. end else 12. end if 13. while not satisfied do 14. query by list and store 15. end while 16. finally, form a query record request vector , sent to the LBS 17. LBS calculates the result, sends it to the user, and the user decrypts the result |
6. Security Analysis
6.1. Privacy between Neighbors
6.2. Privacy for LSP
6.3. The Link Attacks
7. Experimental Evaluation and Results
7.1. The Effect of Trust Calculations
7.2. Moore Curve Construction Time
7.3. Accuracy
7.4. Communication Overhead
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Yin, C.; Xi, J.; Sun, R.; Wang, J. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2018, 14, 3628–3636. [Google Scholar] [CrossRef]
- Li, Y.; Qin, Y.; Wang, H. K-Nearest Neighbor Privacy Protection Query for Distributed Storage in Location-based Service. Wirel. Pers. Commun. 2021, 121, 1509–1532. [Google Scholar] [CrossRef]
- Yang, G.; He, Y.; Xiao, K.; Tang, Q.; Xin, Y.; Zhu, H. Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud. Secur. Commun. Netw. 2022, 2022, 9360899. [Google Scholar] [CrossRef]
- Zhang, Q.; Zhang, X.; Wang, M.; Li, X. DPLQ: Location-based service privacy protection scheme based on differential privacy. IET Inf. Secur. 2021, 15, 442–456. [Google Scholar] [CrossRef]
- Parmar, D.; Rao, U.P. Dummy generation-based privacy preservation for location-based services. In Proceedings of the 21st International Conference on Distributed Computing and Networking, Kolkata, India, 4–7 January 2020. [Google Scholar]
- Liu, Z.; Wu, L.; Meng, W.; Wang, H.; Wang, W. Accurate Range Query with Privacy Preservation for Outsourced Location-Based Service in IoT. IEEE Internet Things J. 2021, 8, 14322–14337. [Google Scholar] [CrossRef]
- Liu, Y.; Tian, J.; Du, Y.; Li, S. A Random Sensitive Area Based Privacy Preservation Algorithm for Location-Based Service. Wirel. Pers. Commun. 2021, 119, 1179–1192. [Google Scholar] [CrossRef]
- Li, L.; Lu, R.; Huang, C. EPLQ: Efficient privacy-preserving location-based query over outsourced encrypted data. IEEE Internet Things J. 2015, 3, 206–218. [Google Scholar] [CrossRef]
- Niu, B.; Li, Q.; Zhu, X.; Cao, G.; Li, H. Enhancing privacy through caching in location-based services. In Proceedings of the 2015 IEEE Conference on Computer Communication, Hong Kong, China, 24 August 2015. [Google Scholar]
- Cui, Y.; Gao, F.; Li, W.; Shi, Y.; Zhang, H.; Wen, Q.; Panaousis, E. Cache-Based Privacy-Preserving Solution for Location and Content Protection in Location-Based Services. Sensors 2020, 20, 4651. [Google Scholar] [CrossRef]
- Zhang, C.; Almpanidis, G.; Hasibi, F.; Fan, G. Gridvoronoi: An efficient spatial index for nearest neighbor query processing. IEEE Access 2019, 7, 120997–121014. [Google Scholar] [CrossRef]
- Zhu, H.; Liu, F.; Li, H. Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services. IEEE Internet Things J. 2017, 4, 536–545. [Google Scholar] [CrossRef]
- Zeng, M.; Zhang, K.; Chen, J.; Qian, H. P3gq: A practical privacy-preserving generic location-based services query scheme. Pervasive Mob. Comput. 2018, 51, 56–72. [Google Scholar] [CrossRef]
- Biswas, P.; Dandapat, S.K.; Sairam, A.S. Ripple: An approach to locate k nearest neighbours for location-based. Inf. Syst. 2022, 105, 101933. [Google Scholar] [CrossRef]
- Wang, Y.; Hassan, A.; Duan, X.; Zhang, X. An efficient multiple-user location-based query authentication approach for social networking. J. Inf. Secur. Appl. 2019, 47, 284–294. [Google Scholar] [CrossRef]
- Lian, H.; Qiu, W.; Yan, D.; Huang, Z.; Tang, P. Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment. In Proceedings of the 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), Hangzhou, China, 23–25 June 2019. [Google Scholar]
- Kim, H.I.; Hong, S.; Chang, J.W. Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl. Eng. 2016, 104, 32–44. [Google Scholar] [CrossRef]
- Miao, Q.; Jing, W.; Song, H. Differential privacy-based location privacy enhancing in edge computing. Concurr. Comput. Pract. Exp. 2019, 31, e4735. [Google Scholar] [CrossRef]
- Zhang, S.; Choo, K.K.R.; Liu, Q.; Wang, G. Enhancing privacy through uniform grid and caching in location-based services. Future Gener. Comput. Syst. 2018, 86, 881–892. [Google Scholar] [CrossRef]
- Zhang, S.; Li, X.; Tan, Z.; Peng, T.; Wang, G. A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Gener. Comput. Syst. 2019, 94, 40–50. [Google Scholar] [CrossRef]
- Jung, K.; Park, S. Collaborative caching techniques for privacy-preserving location-based services in peer-to-peer environments. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–17 December 2017. [Google Scholar]
- Wang, J.; Wang, F.; Li, H. Differential Privacy Location Protection Scheme Based on Hilbert Curve. Secur. Commun. Netw. 2021, 2021, 5574415. [Google Scholar] [CrossRef]
- Zhang, L.; Zou, Y.; Wang, W.; Jin, Z.; Su, Y.; Chen, H. Resource allocation and trust computing for blockchain-enabled edge computing system. Comput. Secur. 2021, 105, 102249. [Google Scholar] [CrossRef]
- Zhang, P.; Wang, Y.; Kumar, N.; Jiang, C.; Shi, G. A Security- and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems. IEEE Trans. Comput. Soc. Syst. 2022, 9, 97–108. [Google Scholar] [CrossRef]
- Lian, H.; Qiu, W.; Yan, D.; Guo, J.; Li, Z.; Tang, P. Privacy-preserving spatial query protocol based on the Moore curve for location-based service. Comput. Secur. 2020, 96, 101845. [Google Scholar] [CrossRef]
- Cheon, J.H.; Choe, H.; Lee, D.; Son, Y. Faster Linear Transformations in HElib, Revisited. IEEE Access 2019, 7, 50595–50604. [Google Scholar] [CrossRef]
- Imam, R.; Areeb, Q.M.; Alturki, A.; Anwer, F. Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status. IEEE Access 2021, 9, 155949–155976. [Google Scholar] [CrossRef]
- Utsunomiya, Y.; Toyoda, K.; Sasase, I. LPCQP: Lightweight private circular query protocol with divided POI-table and somewhat homomorphic encryption for privacy-preserving k-NN search. J. Inf. Processing 2016, 24, 109–122. [Google Scholar] [CrossRef]
- Lian, H.; Qiu, W.; Yan, D.; Huang, Z.; Guo, J. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service. Complexity 2017, 2017, 1490283. [Google Scholar] [CrossRef] [Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, Z.; Liu, Q.; Wei, J.; Miao, D.; Wang, J. Location Privacy-Preserving Query Scheme Based on the Moore Curve and Multi-User Cache. Information 2022, 13, 417. https://doi.org/10.3390/info13090417
Liu Z, Liu Q, Wei J, Miao D, Wang J. Location Privacy-Preserving Query Scheme Based on the Moore Curve and Multi-User Cache. Information. 2022; 13(9):417. https://doi.org/10.3390/info13090417
Chicago/Turabian StyleLiu, Zhenpeng, Qiannan Liu, Jianhang Wei, Dewei Miao, and Jingyi Wang. 2022. "Location Privacy-Preserving Query Scheme Based on the Moore Curve and Multi-User Cache" Information 13, no. 9: 417. https://doi.org/10.3390/info13090417
APA StyleLiu, Z., Liu, Q., Wei, J., Miao, D., & Wang, J. (2022). Location Privacy-Preserving Query Scheme Based on the Moore Curve and Multi-User Cache. Information, 13(9), 417. https://doi.org/10.3390/info13090417