You are currently viewing a new version of our website. To view the old version click .
ISPRS International Journal of Geo-Information
  • Article
  • Open Access

26 June 2020

A Symbiotic Relationship Based Leader Approach for Privacy Protection in Location Based Services

,
,
and
1
Communication and Computer Engineering Department, Faculty of Engineering, NAHDA University, Beni Suef 62511, Egypt
2
Faculty of Engineering and Applied Science, University of Regina, Regina, SK S4S 0A2, Canada
3
Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
*
Author to whom correspondence should be addressed.

Abstract

Location-based services (LBS) form the main part of the Internet of Things (IoT) and have received a significant amount of attention from the research community as well as application users due to the popularity of wireless devices and the daily growth in users. However, there are several risks associated with the use of LBS-enabled applications, as users are forced to send their queries based on their real-time and actual location. Attacks could be applied by the LBS server itself or by its maintainer, which consequently may lead to more serious issues such as the theft of sensitive and personal information about LBS users. Due to this fact, complete privacy protection (location and query privacy protection) is a critical problem. Collaborative (cache-based) approaches are used to prevent the LBS application users from connecting to the LBS server (malicious parties). However, no robust trust approaches have been provided to design a trusted third party (TTP), which prevents LBS users from acting as an attacker. This paper proposed a symbiotic relationship-based leader approach to guarantee complete privacy protection for users of LBS-enabled applications. Specifically, it introduced the mutual benefit underlying the symbiotic relationship, dummies, and caching concepts to avoid dealing with untrusted LBS servers and achieve complete privacy protection. In addition, the paper proposed a new privacy metric to predict the closeness of the attacker to the moment of her actual attack launch. Compared to three well-known approaches, namely enhanced dummy location selection (enhanced-DLS), hiding in a mobile crowd, and caching-aware dummy selection algorithm (enhanced-CaDSA), our experimental results showed better performance in terms of communication cost, resistance against inferences attacks, and cache hit ratio.

1. Introduction

Under swift and mesmerizing developments in the world of technology and Internet networking, specifically the commercial success of mobile devices, lives of people have become easier and more enjoyable. Location-based services (LBS) form a main part of the Internet of Things (IoT) [1,2,3,4,5,6], where a wide spectrum of IoT applications relies on LBS, including smart cars, wearable devices (smart watches, sleep tracker bracelets, clothes, etc.), and reward-based LBS applications [7,8,9]. Moreover, in the e-Health field, LBS plays a significant role in monitoring the patient’s health conditions (pulse rate and blood pressure level) and avoiding disasters [10,11]. A further advantage of LBS is enabling people to search for points of interests (POI) such as nearby restaurants, hotels, hospitals, and sport clubs.

1.1. Statement of Problem

Using LBS requires sending queries based on the real geographical locations of LBS users, where LBS users obtain their real locations through GPS. After manipulating these queries from the service provider, the results are returned to the users as shown in Figure 1.
Figure 1. The classical scenario of LBS applications.
This simple and traditional scenario includes risks, even as users are carried away by the advantages of LBS. The underlying reason behind these risks is that the services the LBS users are wanting to use, and the places they are most likely visiting or trying to find, reflect important aspects that are directly related to their personal lives (such as their customs, habits, or religious persuasion). Furthermore, in light of existing advanced methods that could be used to track users, such as [12,13], gathering private information has become more serious. In the work [12], the authors presented a survey on indoor wireless tracking of mobile nodes from a signal processing perspective. In addition, they stated that it will not be surprising if we witness a widespread use of indoor tracking technologies to complement and empower pedestrian and vehicular systems in the fields of intelligent transportation systems, automated vehicles, robotics, and location-based services. Zhang, et al. [13] developed Montage for real-time multi-user formation tracking and localization. Montage achieves high tracking accuracy by integrating temporal and spatial constraints from user movement vector estimation and distance measuring. Beyond tracking, the authors in [14] showed that such information on these sensitive aspects could be obtained, as attackers could track the locations of users or analyze their queries. After gathering sensitive data about the victim, the attacker can establish and trigger an actual attack in several forms, such as burglary, blackmail, or mugging. In the worst case, if the LBS server or the LBS server maintainer himself is the attacker, the danger will have more of a negative impact on privacy since all information related to the activities of the LBS users is accessible. Thus, privacy protection is a problem of great importance, and the need for a revolution in privacy protection methods is pressing.

1.2. Motivation

To address this problem and to protect the privacy of LBS users, researchers have proposed several approaches. The solutions were addressed from different perspectives, namely the server-side, user-side, and the interactive cooperation between both server-and user-sides. Figure 2 is a classification of LBS privacy protection approaches, where each category has its drawbacks.
Figure 2. Classification of LBS privacy protection approaches.
Regarding the server side, the consideration taken into account is that dealing with a server is inevitable when it comes to attaining the benefits from high computational capabilities and huge storage. Different approaches to providing privacy protection on the server level have been presented [15,16,17,18,19,20,21,22,23]. Xu, et al. [24] proposed a new way to protect the privacy of LBS users by applying temporal-spatial masks for user locations, where the server acts as an anonymizer. However, according to the sensitivity of the application the LBS user uses, the server is considered a malicious party (i.e., an attacker) that has the ability to track the motion trajectories of the LBS user and compromise privacy. Consequently, there are no satisfied guarantees regarding the total and absolute reliance on the LBS server. Beyond that, the LBS server could be considered a valuable data center in the eyes of the attacker, as all information related to the motion trajectories of the LBS users or those that describe the POI they prefer are stored in it. In other words, attracting the attention of the attackers enables them to exert less effort and minimizes time needed to initiate the attack on the victim.
From the user perspective side, to handle such critical issues, some researchers have changed their incentives and have focused on the user side (avoiding dealing with a trusted third party (TTP)). From their point of view, the consideration that must be taken into account is that the LBS user himself can determine the privacy level or even have complete control over it; the user has more awareness about where and when he will utilize a high privacy level and ask for a POI. Many proposed approaches have been provided in this aspect in [25,26,27,28,29,30,31]. In general, even these approaches avoid dealing with TTPs, but they suffer from many issues related to mobile device capacity storage limitations, low computational capabilities, and short battery life. In particular, the approaches contained in [32,33,34,35] have another major problem related to dummies generation, which is considered an open problem according to [36]. In the context of LBS privacy protection, dummy is a term that refers to a set of queries built on false locations. Since the responsibility of dummy generation is assigned to the LBS users, producing weak dummies will make them easy victims, as the attacker can easily filter weak dummies, determining the identities of the LBS users. These problems changed the direction of the research.
These new tactics depend on the principle of cooperative interaction between both LBS users, and the LBS server is proposed in [36,37]. In this category, the LBS user will take responsibility for privacy management with help provided from the LBS server aspect. Although, the LBS server helps either by arranging the data portable within the transmitted channel or supplying the LBS user with proactive information about the degree to which LBS user privacy is broken, these approaches still depend on the LBS server and the mission assigned to it, which refers to the drawbacks related to server-based category.
One of the most important cooperative ways in which LBS users can avoid dealing with TTPs is minimizing the connecting number with the LBS server [38,39,40]. The key idea relies on the cache, where the Responses of the Queries (RoQ) stored previously are exploited to answer future queries. Therefore, the LBS user tries to find the answer to his/her query in the cache, and if he/she finds his/her query answer in the cache, it is considered acceptable. Otherwise, the LBS user is forced to connect to the LBS server. However, the choice of connecting to the LBS server is still standing. This in turn means that the LBS user will be in a critical situation in case of tracking for a long time by the LBS server. Moreover, no strong trust basis can prevent users from turning to an attacker. Furthermore, the quality of the RoQ may be weak, leading to a poor system response performance.

1.3. Contribution

Focusing on cache-based approaches, a leader (that acts as a TTP) can decrease the connecting numbers to the LBS server and optimize the quality of the RoQ stored in the cache at the same time. Through building trust between LBS users and a Leader, all LBS users can be prevented from connecting to the LBS server. Implementing a leader (TTP), through which the queries of the LBS users are sent to the LBS server, means that the leader can protect his/her privacy without the need for dummies generation; real queries will be exploited as dummies on the leader side. Moreover, compared to the RoQ built on dummies, the responses of these exploited queries will be the actual results for what the LBS users are searching for. As a result, the cache will be filled with valuable information that contributes to increasing the probability of answering future queries. This in turn optimizes the response time of the system since it shortens the time of query manipulation due to the locality concept.
In this paper, a solution to optimize the privacy protection of LBS users is presented. The proposed solution is inspired by nature and depends on the symbiotic relationship exploiting the mutual benefit that could occur among animals (birds that search for food inside the opened jaws of a crocodile, for example). The projection of mutual benefit phenomenon will lead to great trust between the members of a cluster and the leader. The cluster members will be able to avoid connecting to the LBS server (a malicious party). At the same time, the leader will exploit the real queries with real positions as dummies to gain full privacy protection at his/her side. To know how the privacy of the leader is broken, we proposed a new privacy metric that could be considered as a standard metric.
In general, the contributions of this work are as follows:
  • The paper proposes a leader approach to completely prevent LBS users (members of a cluster) from connecting to the untrusted party (LBS server). A symbiotic relationship is used to form the trust base between the cluster members and their leader. Consequently, the leader is considered a strong TTP.
  • The paper introduces a solution to the dummy generation problem, which is considered as an expensive and open problem for achieving comprehensive privacy protection (i.e., location and query privacy protection).
  • Depending on location entropy, a novel privacy metric is provided. It is used to measure the closeness of the attacker to the moment of his/her attack launch.
  • To show the robustness of the proposed approach in terms of communication cost, resistance against inference attacks, and cache hit ratio, three well-known approaches, namely enhanced-DLS [34], hiding in a mobile crowd [38], and enhanced-CaDSA [40] are studied and compared.
The remainder of the paper is organized as follows: Section 2 contains a literature review. In Section 3, we present the proposed solution followed by the evaluation metrics in Section 4. Section 5 collects our experimental results with the evaluations. Finally, we conclude the paper in Section 6.

3. Proposed Privacy Protection Approach

This section expresses the scenario of the proposed approach where the criteria of the leader election is highlighted, and provides the answer to the following question: What if the elected leader behaves as an attacker?

3.1. Proposed Approach (Leader)

For a given region divided into ( n × n ) cells, a number of users are distributed over this region so that ( g ) users are located in each cell, and each cell includes ( p ) POIs. The general scenario, which cache-based approaches follow to minimize the connecting number to the untrusted LBS server is illustrated by Figure 3.
Figure 3. General scenario of cache-based approach.
In Figure 3, the traditional way (i.e., a user who is not concerned about privacy) is to send real queries with real positions to the LBS server with a direct privacy threat, denoted by the dotted line (asking nearest hotels for an example). To protect location privacy, the LBS user deliberately issues many queries with dummy positions asking for the same POI (i.e., the nearest hotels) denoted by continuous lines. LBS server responses are cached to obtain benefits from answering incoming queries with the progress of time (i.e., future queries). In cases where no answer is found in the cache, the LBS user is forced to connect with the untrusted LBS provider denoted by the dashed lines. However, query privacy protection is not assured where query analysis-based attacks can be applied. To have complete prevention for all LBS users, except the leader, from connecting to the untrusted LBS server, the leader approach is proposed. The essence of our idea depends on the mutual benefit between the leader and the other LBS users. However, the users that are located in each cell will be grouped in one cluster. From there, a leader will be elected for each cluster. For a query issuer, in case a query answer is not found in the cache, the issuer will send the query to the leader (instead of sending the query to the LBS server directly). Then, the leader in turn sends it to the untrusted LBS server. After manipulating the query on the LBS server side, the leader receives the answer and then returns the received answer to the wanted user (i.e., the query issuer). In other words, the leader exploits the real queries built on real positions (and sent by the cluster members) as dummies on his side. Then, the Leader will send his own real query with a real position without any need to produce dummies either at the location or query level. Considering three LBS users searching for three different POIs (nearest hotels, restaurants, and hospitals), Figure 4 provides a comprehensive look at the proposed system model, where the responses of queries will be stored in the cache to be used later.
Figure 4. Proposed system model scenario.
According to Figure 4, LBS users will protect their privacy (both location and query privacy) because there is no need to directly connect to the LBS server even if they do not find answers to queries within the cache. Thus, they will achieve full privacy protection under any privacy metric.
Without the need to create false locations (i.e., dummy locations) or query feature tampering to generate dummy queries, the privacy of the leader will be protected since the Leader exploits queries of the cluster member as dummies. In addition, the leader has no need to use normalized distance mentioned in [40] because LBS users will be mostly located in the cells that contain POIs users likely used to search for. However, in all cases, the attacker (LBS server) will be confused about determining the query issuer (the Leader). Moreover, even if the attacker applied analysis to those queries sent by the leader to infer some auxiliary information to launch his attack, his efforts will be a waste since this inferred information will not be related to the leader himself, but to the cluster members. For privacy metrics related to the leader, a metric that depends on a location entropy privacy metric is proposed (this will be discussed in the next section), but the main question is as follows: What are the criteria of the leader election?
From the statement that could be inferred from the scenario included in Figure 3, which states “the connection to the LBS server still stands in case no query answer is found in the cache”, a certain number of connections to the LBS server is imagined, and that is related to each LBS user in the past.
Let S represent the set of connections between the LBS users and server previously (as shown in Figure 1).
S = { C p a s t ( U i ) . C p a s t ( U i + 1 ) . C p a s t ( U g ) }
where C p a s t ( U i ) is the number of connections to the untrusted LBS server related to the u s e r i , C p a s t ( U i + 1 ) is the number of connections to the untrusted LBS server related to u s e r i + 1 , and C p a s t ( U g ) is the number of connections to the untrusted LBS server related to the u s e r g .
The criteria of the leader election will be based on the maximum number of connections to the LBS server. Therefore, the leader will be the user that satisfies the following condition:
L e a d e r _ c r e t = m a x ( S )
The reason behind this is that the probability of an attack launch against him (i.e., the user who has the maximum number of connections to the LBS server) will have the highest value compared to the other cluster members; the amount of information collected about him will be the greatest on the attacker’s side. In addition, selecting the user that has the minimum number of LBS connections (to be the Leader) leads to negative impact on the user that has the maximum number of LBS connections. This case will put the user that has the maximum number of LBS server connections in a dangerous situation, especially when it comes to talking about the frequent coercion of the LBS server connection (i.e., in the case where no query answer is found in the cache). That is because the number of connections to the LBS server (attacker) increases, which in turn allows the attacker to collect more sensitive data about him. In other words, electing the LBS user that has the minimum number of connections to the LBS server does not serve the members of the cluster to protect privacy against the malicious LBS server. In light of this discussion, the need of the LBS user, which has the maximum number of LBS server connections, to be the leader will exactly match the need for full prevention of an LBS server connection as it relates to the other cluster members. Motivated by this mutual benefit underlying the symbiotic relationship, a robust TTP (the leader) is proposed. It is worth mentioning that the TTP approach is an optimum answer for the question related to the assumption of existing TTPs in all previous works.
Another important question that arises is related to the trust of this elected leader. The question is as follows: “Why must we trust the leader and not trust the LBS server at the same time?” The answer to this question is provided in the next sub section.

3.2. Trusting in The Leader

This sub section discusses the trust issues related to the elected Leader. It provides additional criteria that depend on the reputation of the elected Leader, taking into consideration the impact of the previous condition expressed by (2).
To make this work more distinctive with respect to previous works, an answer to the previous question above is provided to scale up the cluster members’ trust level in their elected leader. In short, the problem can be described by supposing that there is a probability of converting the leader himself to an attacker. Since there is no difference between the elected leader and the LBS server as TTP, any LBS user contained in each cluster can expect to be tracked and attacked by the leader.
To manipulate this problem, we based things on the scenario proposed in [38] since their idea could be locally applied to the cluster members. Each LBS user located within each cell can store information about some of his/her visited POIs in their mobile devices’ cache and can send this information as a kind of a helping hand to the neighbors to avoid dealing with untrusted third parties. The key idea is to construct a trust level for each cluster member as follows: Each LBS user will deliberately send a query (that previously has its answer in his/her mobile device cache) called a test query to all the cluster members. Based on the received answer, the trust level related to each user, except the sender, will be decreased or increased.
In general, let T L i ( v a l u e ) represent the trust level value of a u s e r i , where it is located at u s e r i + 1 . If the received answer is true, then T L i ( v a l u e ) = T L i ( v a l u e + 1 ) . If the received answer is fake, then T L i ( v a l u e ) = T L i ( v a l u e 1 ) . The resultant new value is called local reputation ( u s e r _ L _ r e p ) related to u s e r i that u s e r i + 1 constructed about him/her. By each cluster member applying this process on the remainders, the local reputations can be obtained. In other words, each user included in the cluster will have pairs of sets of size ( g 1 ) about local reputations related to each of the remainders, and these local reputations could be increased or decreased depending on the credibility of the test query answer. As a result, we obtain the following pairs of sets:
{ u s e r i _ L _ r e p u s e r i + 1 _ L _ r e p u s e r g _ L _ r e p = { [ L _ r e p ( u s e r i + 1 ) . L _ r e p ( u s e r g ) ] [ L _ r e p ( u s e r i ) . L _ r e p ( u s e r g ) ] [ L _ r e p ( u s e r i ) . L _ r e p ( u s e r i + 1 ) ]
where u s e r i _ L _ r e p is the local reputation constructed about u s e r i by both u s e r i + 1 and u s e r g , u s e r i + 1 _ L _ r e p is the local reputation constructed about u s e r i + 1 by both u s e r i and u s e r g , and u s e r g _ L _ r e p is the local reputation constructed about u s e r g by both u s e r i and u s e r i + 1 .
Relying on the sum of the local reputation values constructed by other cluster members, the reputation of u s e r i is obtained. So, u s e r i _ r e p ( v a l ˜ u e ) , u s e r i + 1 _ r e p ( v a l ˜ u e ) , and u s e r g _ r e p ( v a l ˜ u e ) are calculated as it is illustrated in Figure 5 below. Note that this process will be repeated over all the clusters (or cells) involved in our system model.
Figure 5. Local reputations of cluster members.
Based on the representation in formula (1), each u s e r _ r e p ( v a l ˜ u e ) will match a certain number of LBS server connections in the past related to each cluster member as follows:
{ [ u s e r i ] [ u s e r i + 1 ] [ u s e r g ] = { [ u s e r i _ r e p ( v a l ˜ u e ) . C p a s t ( U i ) ] [ u s e r i + 1 _ r e p ( v a l ˜ u e ) . C p a s t ( U i + 1 ) ] [ u s e r g _ r e p ( v a l ˜ u e ) . C p a s t ( U g ) ]
By multiplying the two components related to each user in (4), the general reputation G _ r e p of each user is calculated as follows:
{ G _ r e p _ u s e r i G _ r e p _ u s e r i + 1 G _ r e p _ u s e r g = { [ u s e r i _ r e p ( v a l ˜ u e ) × C p a s t ( U i ) ] [ u s e r i + 1 _ r e p ( v a l ˜ u e ) × C p a s t ( U i + 1 ) ] [ u s e r g _ r e p ( v a l ˜ u e ) × C p a s t ( U g ) ]
As a result, the new criteria of Leader election will be:
l e a d e r _ r e p = a r g m a x { G _ r e p _ u s e r i G _ r e p _ u s e r i + 1 G _ r e p _ u s e r g .0 }
It is worth mentioning that a special case may occur when the maximum general reputation is the same for two users or more. In this case, the leader is elected randomly based on the same criteria. After electing a leader under the new criteria, all cluster members will be trusted for receiving the true answers to their queries sent to the LBS server by their own leader. The corresponding pseudo code for electing the leader is included in Algorithm 1.
Algorithm 1: Leader Election Algorithm
Input: n × n (number of cells or clusters), g (number of LBS users in a cell or cluster), C p a s t _ u (number of connections to the LBS server in the past for user u ), H a s h T a b l e ( k e y = u s e r , v a l = G r e p ) .
Output: G L e a d e r C (general reputation of the leader in cell c )
Ijgi 09 00408 i001
Algorithm 2 shows the pseudo code for calculating the local reputation.
Algorithm 2: Calculating the Local Reputation ( local rep )
Function local rep ( revciever   u . sender   i )
Input: T Q S , A T Q S
Output: l o c a l r e p
1: Answersreciever_u = Testi(TQS,u)
2: ( N R A ) = Number of Matching ( A n s w e r s r e c i e v e r _ u , A T Q S )
3: (NWA) = Number (TQS) − NRA
4: new ( T L r e c i e v e r _ u ) = old ( T L r e c i e v e r _ u ) + N R A N W A
5: l o c a l r e p = new ( T L r e c i e v e r _ u )
6: return l o c a l r e p
where T Q S is the test queries, A T Q S is the answers to the test queries, ( N R A ) is the number of right answers, ( N W A ) is the number of wrong answers, and T L is the trust level of the receiver.
Although electing the leader depends on his general reputation, the probability of converting into an attacker still stands. Specifically, there are no guarantees that cluster members will not be tracked or that queries analyzed and then attacked by the elected leader himself. On the one hand, this probability will be minimized since both the leader and the cluster members are considered moving objects. So, they can leave their cluster and pass on to other clusters or cells. On the other hand, if we reset the global reputation of the leader in cases where he leaves his cluster, we can ensure that he will not be a leader anymore. Figure 6 summarizes what is discussed in this paragraph.
Figure 6. Resetting global reputation of moving Leader.
According to Figure 6, two leaders are elected in two clusters depending on the maximum general reputation among the cluster members, and this global reputation is reset for both leaders after passing their cells. Then, two new leaders will be elected based on the same criteria, and any cluster member that leaves his cluster will act under the control of the new elected leader. As a result, the cluster members’ concern (about their leader acting as an attacker) is minimized. Thus, our second and final steps are achieved in the proposed model.

4. Used Privacy Metrics

In general, the final and actual attack (i.e., mugging, stealing, threat, or blackmail) that an attacker triggers against his victim will occur after a complete profile is obtained that is full of malicious content and holds sensitive personal information. This malicious content is gathered over time through sub inferences attacks. Any useful information that can help the attacker to determine the suitable moment of his actual attack will be added to the previous malicious content.

4.1. Inferences Attacks

In inferences attacks, the attacker depends on his intuition utilization to gain personal information about his victim. Some of the most advanced inference attacks are briefly explored in this sub section.
A Homogeneity attack [42] means that if the users are located in a place that represents a landmark (they hide their real positions through the circumference of this landmark) such as a hospital, the attacker can infer that those users have problems related to their health without needing to accurately identify their positions, as shown in Figure 7.
Figure 7. Homogeneity attack [42].
A query sampling attack [15,43,44] is where the attacker employs the unfair location distribution of the LBS users for his own malicious purpose. This type of inference attack targets isolated users in a sparse region, as illustrated in Figure 8.
Figure 8. Query sampling attack [15].
A semantic location attack [45] is where the attacker can infer semantic meanings related to the behavior of the user by exploiting the amount of time the user stays in one place, such as a laboratory, bank, or university.
In each moment that an attacker applies one inference attack, he will have little success. These small successful attempts are related to many different sub inference attacks at various moments. Adding these small successful attempts enables the attacker to reach a suitable moment at which to launch an actual attack. Once this occurs, the goal of any privacy protection approach is to insert contradictory information into the profile, as mentioned previously regarding the state of the user who is concerned about his privacy. This confuses the attacker and obstructs his ability to determine his actual attack, as illustrated in Figure 9.
Figure 9. The profile of the LBS user specialized on the attacker side.
From Figure 9, it is obvious that on the attacker side there a clear conflict regarding whether this LBS user has a health problem and must participate in sports.

4.2. Types of Used Privacy Metrics

Many privacy metrics were examined in the survey provided in [14], where these privacy metrics are presented to assess how much the LBS user privacy has been broken for both location and query privacy. As the target is to achieve both location and query privacy, location entropy is selected since this metric could be used for both aspects. For location privacy, location entropy measures uncertainty in identifying the real position of a query issuer by quantifying the information obtained from the attacker side from location updates related to the trajectories of LBS users’ motion. For query privacy, location entropy measures the unobservability when an LBS user visits a POI. This work focused on protecting the privacy of the leader (both location and query privacy) since the leader is considered the only LBS user that connects to the LBS server (a malicious party).
According to the proposed scenario in Figure 4, the queries involved in the system could be classified into two major groups. The first one includes queries that are answered by the cache, and the second one includes queries that are sent and answered by the LBS server through the leader. According to these two groups, two privacy metrics are needed in the proposed model.

4.2.1. Leader Privacy Metric

Since real queries sent to the Leader that act as dummies on his side, the concept of k a n o n y m i t y is automatically achieved to protect Leader privacy. Let k denote to the k a n o n y m i t y level (i.e., number of dummies or real queries that reach the Leader and are sent to the LBS server at τ moment). Let p i ( i = 1 , 2 , , k ) denote the probability of recognizing the i t h location as a real location among ( k 1 ) dummies, and let q i denote the query probability of i t h location as follows:
p i = q i j = 1 k q i
Thus, location entropy at τ moment could be presented as follows:
E ( τ ) = i = 1 k P i × l o g 2 × P i
When all the k possible locations have the same query probability, E ( τ ) achieves a maximum value. In this case, the location entropy will be:
E ( τ ) m a x = l o g 2 ( k )
Consider that E ( τ ) max = b . For a given E ( τ ) value (equal to 2, for example) where E ( τ ) < b , this E ( τ ) value could be read from both viewpoints (i.e., the Leader side and attacker side). On the Leader side, he will state, for instance, “I have achieved privacy protection for my real position to be revealed by an attacker with ( 2 ) value and as high as E ( τ ) value for high privacy protection”. For the attacker side, it will be stated “I identify my victim’s real position with ( b 2 ) value and as low E ( τ ) value as I became able to accurately identify my victim’s real position, and thus I become closer to the moment of my attack launch”. In general, Figure 10 illustrates our new proposed privacy metric at a certain moment of time.
Figure 10. Our proposed privacy metric.
Let Γ = ( τ 1 , τ 2 , τ 3 , , τ n ) refer to the moments at which the Leader connects to the LBS server where some of the inference attacks are applied. Thus, λ represents the closeness of the attacker to the moment of his attack launch.
According to Figure 10, it is clear that the location entropy value varies, ranging from a to b , E represents the amount of privacy protection on the leader side, and ( b a E ) represents the closeness of the attacker to his attack launch against the leader. As a result, the new privacy metric can be given as:
λ = τ ( Γ ) ( b a E ( τ ) )
= τ ( Γ ) ( l o g 2 ) k ) a E ( τ ) )
where τ Γ .
Note that the proposed privacy metric, which is specialized for the Leader, could be considered a standard one; this privacy metric could be applied to any approach that belongs to any class provided in the literature review. The reason behind this is that any user included in any LBS system could be considered a Leader for himself.

4.2.2. System Privacy Metric

In general, users that are finding their query answers in the cache will achieve a full privacy value under any privacy metric, as they won full prevention from dealing with untrusted LBS servers through the Leader, and no information could be inferred about both real positions and real queries. We used the privacy metric proposed in [40] called the cache hit ratio (CHR), which measures the queries answered by the cache as a proportion of the total number of queries involved in the system as follows:
C H R = | Q a n s w e r e d _ c a c h e | | Q a n s w e r e d _ s e r v e r | + | Q a n s w e r e d _ c a c h e |

5. Experimental Results and Evaluation

In this paper, Matlab software is used to implement the proposed approach. The simulation inputs are assumed to be that the targeted area is divided into a ( 160 × 160 ) cell and the number of users included in the system equals (10,000). The cache is represented through a data base consisting of one table only, where the information about POIs, included in the cells, is stored through the queries that are answered by the LBS server. The information stored in the cache mainly included the type of POI and the position of the cell that is located within. A timestamp is attached for both stored information in the cache and the queries so that these timestamps will be used, through a simple comparison, to achieve the data freshness term. In addition, timestamps are also attached to the LBS users since they are considered to be moving objects. For query probability, it is generated randomly with help provided by Google Maps API. The POIs are considered static, and we did not deal with moving queries.
Three previous approaches are selected for the comparison with the proposed approach; they include enhanced-DLS [34], hiding in a mobile crowd [38], and enhanced-CaDSA [40].

5.1. Communication Cost Results Evaluation

Based on the communication costs (number of queries sent to the LBS server), the proposed approach is evaluated in two respects, which are the impact of time as it progresses and the impact of the k anonymity value. The bloom filter is used for searching the answers of the queries in the cache since it effectively minimizes the search time. By doing so, the system response will be enhanced, and the gap will be filled since the Leader must waste some time receiving real queries from some of his cluster members to protect his privacy.
Figure 11 shows a snapshot taken at a time progress of 120 min. It can be shown that the enhanced-DLS provides the worst performance among the other approaches; it does not use query response caching. Thus, all queries related to users are sent to the LBS server. In other approaches, the number of queries sent to the LBS server is decreased since many queries find their answers in the cache. Mobile Crowd approach achieved better performance compared to enhanced-DLS, but its performance was worse than that of the enhanced-CaDSA, while enhanced-CaDSA selects dummy locations that can hit more contributions in the cache based on both normalized distance and data freshness terms, and mobile crowd took none of them into consideration. The proposed approach overtakes it with respect to the time progress term; as the proposed approach does not need to generate dummies since it exploits real ones as dummies, and enhanced-CaDSA needs to create dummies for each query forced to connect to the LBS server.
Figure 11. Communication cost VS. Time progress.
Figure 12 supports the results obtained in the first aspect (i.e., the time progress), where the number of queries sent to the LBS server in enhanced-DLS increases linearly as k increases, and again enhanced-DLS gives the worst results among the other approaches. Enhanced-CaDSA performs better than both enhanced-DLS and Mobile Crowd due to its good cache design. Compared to enhanced-CaDSA, the proposed approach gives better results. Each real query, which acts as a “dummy” in the proposed approach, maps several generated dummies in enhanced-CaDSA. Consequently, the number of queries sent to the LBS server, to achieve the k anonymity concept, will obviously be less.
Figure 12. Communication cost VS. Anonymity level.

5.2. Resistance Against Inferences Attacks Results Evaluation

Achieving a higher k a n o n y m i t y level is preferred since it represents a higher privacy protection level. However, this k a n o n y m i t y level is represented by the number of generated dummies attached with the original query; this k a n o n y m i t y level is tightly coupled with the quality of the generated dummies (i.e., generating strong dummies). So, even if the Leader approach achieved the minimal k a n o n y m i t y level compared to the remainders, it actually achieved the best privacy protection level under the dummy generation term. To make this idea clearer, the impact of applying a mixture of inferences attacks is discussed, taking into consideration the application of the same k a n o n y m i t y level at each approach included in our comparison.
Because the proposed new privacy metric λ relates to the Leaders involved in the system, we evaluated the closeness of the attacker (LBS server or his maintainer) to the moment of his attack launch against the Leaders in the time progress. In addition, because the k-anonymity concept is achieved automatically in the proposed approach, k is set to 6 for each cluster (i.e., at any moment, the Leader will receive five real queries as dummies in addition to the real query related to the Leader himself to be sent to the LBS server). Under threat of a mixture of inferences attacks (i.e., heterogeneous attack, query sampling attack, and location semantic attack), a snapshot at ( t = 120 ) is taken. Twenty leaders’ situations are evaluated taking into account a threshold that equals ( t h r = 0.8 ) , at which the Leader is considered to be in dangerous conditions of attack by the LBS server. In order to make an identical comparison among the approaches, the same number of LBS users (i.e., 20) are randomly selected from each of the three previous approaches to be evaluated under the same threshold condition. It should be mentioned that the threat model provided in [46] is used as the basis of our approach, where every 3 min a different kind of inference attack is periodically applied. Figure 13 shows the results. It is taken into account that each LBS user involved in enhanced-DLS, Mobile Crowd, and enhanced-CaDSA is considered a leader. The comparison of the dangerous status of leaders is summarized in Table 1.
Figure 13. λ values for 20 Leaders, k = 6 .
Table 1. Comparison of dangerous status of leaders.
Table 1 shows that the proposed approach has the minimum number of LBS users that reached a dangerous state. Three-quarters of Leaders and more than half of Leaders exceeded the threshold in Mobile Crowd and Enhanced-CaDSA, respectively. For Enhanced-DLS, all leaders exceeded the threshold since they are forced to connect to the untrusted LBS server and become vulnerable to direct threats all the time. On the one hand, because of the global reputation of the leaders is reset in the proposed approach, and given the endless continuity of this mission (i.e., the leader mission) in the other approaches, we gained the minimum number of LBS users that exceeded the defined threshold. This in turn means that the leader approach has the highest resistance against the used inferences attacks. This robustness could be justified through hiding the cluster members behind their leader. In other words, LBS users are in complete silence in the eyes of the attacker under any inference attack. Thus, the LBS user that is located in an isolated place (query sampling attack) or those that are resided in a one POI (homogeneity attack) for a long time (semantic location attack) will be in complete safety since they send their queries to a leader that is located in a different POI.
On the other hand and based on the principle that states “prevention is better than the cure,” LBS users that have reached a dangerous state can be altered to give up their missions as leaders and thus keep the attacker away from the actual moment of his attack launch. Compared to Enhanced-DLS, Mobile Crowd, and Enhanced-CaDSA, this capability is not offered.
Table 2 supports the results collected in Table 1, where the threshold was redefined in different values, the simulation was re-executed at different snapshots, different leaders were randomly selected, and the percentage of the leaders that exceeded the thresholds was calculated.
Table 2. Percentage of encroachment of the predefined thresholds.

5.3. Cache Hit Ratio Results Evaluation

As is shown in Figure 14 below, the enhanced-DLS achieved zero values since it does not use a cache. For the other approaches, the cache hit ratio is enhanced during the time progress because of the cache. Enhanced-CaDSA presents better cache hit ratio values compared to the Mobile Crowd. This is because the dummy locations, generated to protect the privacy of the LBS user, use normalized distance, which in turn optimizes the quality of information stored in the cache. Moreover, the data freshness term will keep the most important information that is expected to be used to answer future queries. Furthermore, the cache contained in mobile devices of users cannot be compared to the storage of access points, which represents caches in Enhanced-CaDSA. Despite the good performance of Enhanced-CaDSA, the proposed approach provides better cache hit ratio values, where the Leader approach used a hundred POIs ( p = 100 ) in the system compared to one POI ( p = 1 ) used in the enhanced-CaDSA. The reason behind this is that the proposed approach depends on the real or actual positions to generate dummies sent to the LBS server. This means the leader approach uses the precise locations of users and exploits their actual positions, which are likely located to search for POIs. In everyday life, compared to the selection of dummies using normalized distances, exploiting actual positions as dummies has more of an impact on the quality of information stored in the cache. The answers to the dummy queries lead to a higher probability of existing future query answers in the cache.
Figure 14. Cache hit ratio vs. time progress, p=100.

6. Conclusions

In this technological age, privacy is one of the major concerns of mobile device users. When it comes to achieving complete privacy protection for users of location-based services, the symbiotic relationship-based leader approach is proposed. Among the group of LBS users (a cluster), this Leader is elected based on a global reputation. This global reputation is valued through two aspects, which are (1) the number of connections (done by the LBS user in the past) with the LBS server and (2) the local reputations that the other cluster members created for the leader. Under the assumption that the leader himself acts as an attacker and to prevent this leader from being a leader again, her/his global reputation is deliberately reset when moving from one cluster to another, scaling up the cluster members’ trust level in their elected leader. Compared to previous approaches, the leader approach provided better performance in terms of communication cost and cache hit ratio. Moreover, according to the new privacy metric (attacker’s closeness to the moment of his/her actual attack) and under a threat mixture of advanced inferences attacks (homogeneity attack, query sampling attack, and semantic location attack), the leader approach has the highest robustness against the previous attacks, which guarantees a high level of privacy protection.
In future work, protecting the privacy of the queries sent to the cache or those exchanged among LBS users will be taken into consideration. In addition, optimizing the availability and reliability quality attributes of the system will be manipulated by fixing the disconnecting problem that could have occurred and that is related to the leader. Moreover, using cache refreshing will be taken into account to keep only interesting responses.

Author Contributions

Conceptualization, Hosam Alrahhal and Mohamad Shady Alrahhal; Methodology, Hosam Alrahhal and Mohamad Shady Alrahhal; Software, Mohamad Shady Alrahhal; Razan Jamous; Formal Analysis, Kamal Jambi; Writing-Review & Editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, L.; Thombre, S.; Jarvinen, K.; Simona, L.E.; Alén-Savikko, A.; Leppakoski, H.; Bhuiyan, M.Z.H.; Bu-Pasha, S.; Ferrara, G.N.; Honkala, S.; et al. Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey. IEEE Access 2017, 5, 8956–8977. [Google Scholar] [CrossRef]
  2. Elmisery, A.M.; Rho, S.; Botvich, D. A Fog Based Middleware for Automated Compliance With OECD Privacy Principles in Internet of Healthcare Things. IEEE Access 2016, 4, 8418–8441. [Google Scholar] [CrossRef]
  3. Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar]
  4. Sun, G.; Chang, V.; Ramachandran, M.; Sun, Z.; Li, G.; Yu, H.; Liao, D. Efficient location privacy algorithm for Internet of Things (IoT) services and applications. J. Netw. Comput. Appl. 2017, 89, 3–13. [Google Scholar] [CrossRef]
  5. Ullah, I.; Shah, M.A. A novel model for preserving Location Privacy in Internet of Things. In Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC), Colchester, UK, 7–8 September 2016; IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
  6. Abdelmoty, A.; Alrayes, F. Towards understanding location privacy awareness on geo-social networks. ISPRS Int. J. Geo-Inf. 2017, 6, 109. [Google Scholar] [CrossRef]
  7. Pagallo, U.; Durante, M.; Monteleone, S. What Is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges on Sharing and Control in IoT. In Data Protection and Privacy: (In) Visibilities and Infrastructures; Springer International Publishing: Cham, Switzerland, 2017; pp. 59–78. [Google Scholar]
  8. Hasan, A.S.M.; Qu, Q.; Li, C.; Chen, L.; Jiang, Q. An effective privacy architecture to preserve user trajectories in reward-based LBS applications. ISPRS Int. J. Geo-Inf. 2018, 7, 53. [Google Scholar] [CrossRef]
  9. Alrawais, A.; Alhothaily, A.; Hu, C.; Cheng, X. Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Comput. 2017, 21, 34–42. [Google Scholar] [CrossRef]
  10. Ma, Y.; Wang, Y.; Yang, J.; Miao, Y.; Li, W. Big Health Application System based on Health Internet of Things and Big Data. IEEE Access 2017, 5, 7885–7897. [Google Scholar] [CrossRef]
  11. Samarah, S.; Zamil, M.G.A.; AlEroud, A.F.; Rawashdeh, M.; Alhamid, M.F.; Alamri, A. An Efficient Activity Recognition Framework: Toward Privacy-Sensitive Health Data Sensing. IEEE Access 2017, 5, 3848–3859. [Google Scholar] [CrossRef]
  12. Dardari, D.; Closas, P.; Djuric, P.M. Indoor tracking: Theory, methods, and technologies. IEEE Trans. Veh. Technol. 2015, 64, 1263–1278. [Google Scholar] [CrossRef]
  13. Zhang, L.; Liu, K.; Jiang, Y.; Li, X.-Y.; Liu, Y.; Yang, P.; Li, Z.; Yang, P. Montage: Combine frames with movement continuity for realtime multi-user tracking. IEEE Trans. Mob. Comput. 2017, 16, 1019–1031. [Google Scholar] [CrossRef]
  14. Shin, K.G.; Ju, X.; Chen, Z.; Hu, X. Privacy protection for users of location-based services. IEEE Wirel. Commun. 2012, 19, 30–39. [Google Scholar] [CrossRef]
  15. Wernke, M.; Skvortsov, P.; Dürr, F.; Rothermel, K. A classification of location privacy attacks and approaches. Pers. Ubiquitous Comput. 2014, 18, 163–175. [Google Scholar] [CrossRef]
  16. Feng, W.; Yan, Z.; Xie, H. Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature. IEEE Access 2017, 5, 6236–6246. [Google Scholar] [CrossRef]
  17. Yu, R.; Bai, Z.; Yang, L.; Wang, P.; Move, O.A.; Liu, Y. A Location Cloaking Algorithm Based on Combinatorial Optimization for Location-Based Services in 5G Networks. IEEE Access 2016, 4, 6515–6527. [Google Scholar] [CrossRef]
  18. Gedik, B.; Liu, L. Protecting Location Privacy With Personalized k-Anonymity: Architecture and Algorithms. IEEE Trans. Mob. Comput. 2008, 7, 1–18. [Google Scholar] [CrossRef]
  19. Gruteser, M.; Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys ’03: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services; ACM: New York, NY, USA, 2003. [Google Scholar]
  20. Mokbel, M.F.; Chow, C.-Y.; Aref, W.G. The New Casper: Query Processing for Location Services Without Compromising Privacy. In Proceedings of the VLDB ‘06, Seoul, Korea, 12–15 September 2006; ACM: New York, NY, USA, 2006; pp. 763–774. [Google Scholar]
  21. Beresford, A.; Stajano, F. Location Privacy in Pervasive Computing. IEEE Pervasive Comput. 2003, 2, 46–55. [Google Scholar] [CrossRef]
  22. Hoh, B.; Gruteser, M. Protecting location privacy through path confusion. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), Athens, Greece, 5–9 September 2005; pp. 194–205. [Google Scholar]
  23. Meyerowitz, J.; Roy Choudhury, R. Hiding stars with fireworks: Location privacy through camouflage. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Beijing, China, 20–25 September 2009; pp. 345–356. [Google Scholar]
  24. Xu, T.; Cai, Y. Feeling-Based Location Privacy Protection for Location-Based Services. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, IL, USA, 9–13 November 2019; ACM: New York, NY, USA, 2009; pp. 348–357. [Google Scholar]
  25. Pingley, A.; Yu, W.; Zhang, N.; Fu, X.; Zhao, W. Cap: A context-Aware Privacy Protection System for Location-Based Services. In Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems, Montreal, QC, Canada, 22–26 June 2009; pp. 49–57. [Google Scholar]
  26. Hong, S.; Liu, C.; Ren, B.; Huang, Y.; Chen, J. Personal privacy protection framework based on hidden technology for smartphones. IEEE Access 2017, 5, 6515–6526. [Google Scholar] [CrossRef]
  27. Manweiler, J.; Scudellari, R.; Cox, L.P. Smile: Encounter-Based Trust for Mobile Social Services. In Proceedings of the CCS ’09, Chicago, IL, USA, 9–13 November 2009; ACM: New York, NY, USA, 2009; pp. 246–255. [Google Scholar]
  28. Hu, H.; Xu, J. Non-Exposure Location Anonymity. In Proceedings of the 2009 IEEE 25th International Conference on Data Engineering, Shanghai, China, 29 March–2 April 2009; pp. 1120–1131. [Google Scholar]
  29. Chen, Z. Energy-Efficient Information Collection and Dissemination in Wireless Sensor Networks. Ph.D. Thesis, University of Michigan, Ann Arbor, MI, USA, 2009. [Google Scholar]
  30. Ardagna, C.; Cremonini, M.; Damiani, E.; De Capitani di Vimercati, S.; Samarati, P. Location privacy protection through obfuscation-based techniques. In Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, 8–11 July 2007; pp. 47–60. [Google Scholar]
  31. Gutscher, A. Coordinate transformation—A solution for the privacy problem of location based services? In Proceedings of the 20th International Conference on Parallel and Distributed Processing (IPDPS ’06), Rhodes Island, Greece, 25–29 April 2006; p. 354. [Google Scholar]
  32. Kido, H.; Yanagisawa, Y.; Satoh, T. An Anonymous Communication Technique Using Dummies for Location- based Services. In Proceedings of the ICPS ’05. Proceedings. International Conference on Pervasive Services 2005, Santorini, Greece, 11–14 July 2005. [Google Scholar]
  33. Pingley, A.; Zhang, N.; Fu, X.; Choi, H.-A.; Subramaniam, S.; Zhao, W. Protection of Query Privacy for Continuous Location Based Services. In Proceedings of the 2011 proceedings IEEE INFOCOM, Shanghai, China, 10–15 April 2011. [Google Scholar]
  34. Niu, B.; Li, Q.; Zhu, X.; Cao, G.; Li, H. Achieving k-anonymity in privacy-aware location-based services. In Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014. [Google Scholar]
  35. Hara, T.; Suzuki, A.; Iwata, M.; Arase, Y.; Xie, X. Dummy-Based User Location Anonymization Under Real-World Constraints. IEEE Access 2016, 4, 673–687. [Google Scholar] [CrossRef]
  36. Sun, W.; Chen, C.; Zheng, B.; Chen, C.; Liu, P. An Air Index for Spatial Query Processing in Road Networks. IEEE Trans. Knowl. Data Eng. 2015, 27, 382–395. [Google Scholar] [CrossRef]
  37. Dewri, R.; Thurimella, R. Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 374–383. [Google Scholar] [CrossRef]
  38. Shokri, R.; Theodorakopoulos, G.; Papadimitratos, P.; Kazemi, E.; Hubaux, J.-P. Hiding in the mobile crowd: Locationprivacy through collaboration. IEEE Trans. Dependable Secur. Comput. 2014, 11, 266–279. [Google Scholar]
  39. Zhu, X.; Chi, H.; Niu, B.; Zhang, W.; Li, Z.; Li, H. Mobicache: When k-anonymity meets cache. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013. [Google Scholar]
  40. Niu, B.; Li, Q.; Zhu, X.; Cao, G.; Li, H.; Ben, N. Enhancing privacy through caching in location-based services. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015. [Google Scholar]
  41. Georgiadou, Y.; de By, R.A.; Ourania, K. Location Privacy in the Wake of the GDPR. ISPRS Int. J. Geo-Inf. 2019, 8, 157. [Google Scholar] [CrossRef]
  42. Pan, X.; Chen, W.; Wu, L.; Piao, C.; Hu, Z. Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services. Front. Comput. Sci. 2016, 10, 370–386. [Google Scholar] [CrossRef]
  43. Lin, C.; Wu, G.; Yu, C.W. Protecting location privacy and query privacy: A combined clustering approach. Concurr. Comput. Pract. Exp. 2015, 27, 3021–3043. [Google Scholar] [CrossRef]
  44. Saravanan, S.; Ramakrishnan, B.S. Preserving privacy in the context of location based services through location hider in mobile-tourism. Inf. Technol. Tour. 2016, 16, 229–248. [Google Scholar] [CrossRef]
  45. Li, Y.; Yuan, Y.; Wang, G.; Chen, L.; Li, J. Semantic-Aware Location Privacy Preservation on Road Networks. In International Conference on Database Systems for Advanced Applications; Springer International Publishing: Cham, Switzerland, 2016. [Google Scholar]
  46. Lee, B.; Oh, J.; Yu, H.; Kim, J. Protecting location privacy using location semantics. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; ACM: New York, NY, USA, 2011. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.