Skip to main content

Pricing Privacy Leakage in Location-Based Services

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

  • 3601 Accesses

Abstract

Quantifying location privacy is an interesting and hot topic in Location-Based Services (LBSs). However, existing schemes only consider the privacy leakage to the untrusted LBS servers, leaving out the leakage during the transportation phase. In this paper, we propose a privacy-preserving scheme to help the LBS user to select optimal privacy strategy with considering the aforementioned problem for the first time. In order to measure the efficacy of different kinds of Privacy-Preserving Mechanisms (PPMs) including cryptographic and non-cryptographic types, we first quantify the revenue of two kinds of aforementioned PPMs by considering the privacy loss and privacy leakage probability on the channel and LBS server, as well as the accumulated leakage previously, simultaneously. Then, we take the consumption of different PPMs into account, to compute the investment. Evaluation results illustrate the effectiveness and efficiency of our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bilogrevic, I., Huguenin, K., Mihaila, S., Shokri, R., Hubaux, J.P.: Predicting users’ motivations behind location check-ins and utility implications of privacy protection mechanisms. In: Proceedings of ISOC NDSS (2015)

    Google Scholar 

  2. Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, J.-P., Aad, I.: Privacy in mobile computing for location-sharing-based services. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 77–96. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22263-4_5

    Chapter  Google Scholar 

  3. Bindschaedler, V., Shokri, R.: Synthesizing plausible privacy-preserving location traces. In: Proceedings of IEEE S&P (2016)

    Google Scholar 

  4. Fawaz, K., Feng, H., Shin, K.G.: Anatomization and protection of mobile apps’ location privacy threats. In: Proceedings of USENIX Association USENIX Security (2015)

    Google Scholar 

  5. Fechner, T., Kray, C.: Attacking location privacy: exploring human strategies. In: Proceedings of ACM UbiComp (2012)

    Google Scholar 

  6. Gervais, A., Shokri, R., Singla, A., Capkun, S., Lenders, V.: Quantifying web-search privacy. In: Proceedings of ACM CCS (2014)

    Google Scholar 

  7. Li, H., Zhu, H., Du, S., Liang, X., Shen, X.: Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans. Dependable Secure Comput. (2016)

    Google Scholar 

  8. Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: Proceedings of IEEE INFOCOM (2014)

    Google Scholar 

  9. Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: Proceedings of IEEE INFOCOM (2015)

    Google Scholar 

  10. Niu, B., Zhu, X., Lei, X., Zhang, W., Li, H.: Eps: encounter-based privacy-preserving scheme for location-based services. In: Proceedings of IEEE Globecom (2013)

    Google Scholar 

  11. Niu, B., Zhu, X., Li, W., Li, H.: Epcloak: an efficient and privacy-preserving spatial cloaking scheme for lbss. In: Proceedings of IEEE MASS (2014)

    Google Scholar 

  12. Olteanu, A.M., Huguenin, K., Shokri, R., Humbert, M., Hubaux, J.P.: Quantifying interdependent privacy risks with location data. IEEE Trans. Mob. Comput. 10(1109), 1536–1233 (2016)

    Google Scholar 

  13. Piorkowski, M., Sarafijanovoc-Djukic, N., Grossglauser, M.: A parsimonious model of mobile partitioned networks with clustering. In: Proceedings of COMSNETS (2009). http://www.comsnets.org

  14. Rizoiu, M.A., Xie, L., Caetano, T., Cebrian, M.: Evolution of privacy loss in wikipedia. In: Proceedings of ACM WSDM (2015)

    Google Scholar 

  15. Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 8(6), 838–852 (2013)

    Article  Google Scholar 

  16. Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proceedings of IEEE S&P (2011)

    Google Scholar 

  17. Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Le Boudec, J.Y.: Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of IEEE CCS (2012)

    Google Scholar 

  18. Zhang, S., Yang, H., Singh, L.: Anonymizing query logs by differential privacy. In: Proceedings ACM SIGIR (2016)

    Google Scholar 

  19. Zhang, Y., Tong, W., Zhong, S.: On designing satisfaction-ratio-aware truthful incentive mechanisms for k-anonymity location privacy. IEEE Trans. Inf. Forensics Secur. 11(11), 2528–2541 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by the General Program of National Natural Science Foundation of China (61672515), the National Key Research and Development Program of China (2016YFB0800303) and the National Natural Science Foundation of China (61502489).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kui Geng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Li, F., Liu, J., Fang, L., Niu, B., Geng, K., Li, H. (2017). Pricing Privacy Leakage in Location-Based Services. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics