Figures
Abstract
In location-based service (LBS), private information retrieval (PIR) is an efficient strategy used for preserving personal privacy. However, schemes with traditional strategy that constructed by information indexing are usually denounced by its processing time and ineffective in preserving the attribute privacy of the user. Thus, in order to cope with above two weaknesses, in this paper, based on the conception of ciphertext policy attribute-based encryption (CP-ABE), a PIR scheme based on CP-ABE is proposed for preserving the personal privacy in LBS (location privacy preservation scheme with CP-ABE based PIR, short for LPPCAP). In this scheme, query and feedback are encrypted with security two-parties calculation by the user and the LBS server, so as not to violate any personal privacy and decrease the processing time in encrypting the retrieved information. In addition, this scheme can also preserve the attribute privacy of users such as the query frequency as well as the moving manner. At last, we analyzed the availability and the privacy of the proposed scheme, and then several groups of comparison experiment are given, so that the effectiveness and the usability of proposed scheme can be verified theoretically, practically, and the quality of service is also preserved.
Citation: Dai Z, Li J (2024) A location-based service scheme with attribute information privacy. PLoS ONE 19(9): e0309919. https://doi.org/10.1371/journal.pone.0309919
Editor: Zhiquan Liu, Jinan University, CHINA
Received: June 29, 2024; Accepted: August 20, 2024; Published: September 6, 2024
Copyright: © 2024 Dai, Li. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: The availability data is GeoLife GPS Trajectories which gets from the following URL. https://www.microsoft.com/en-us/research/publication/geolife-gps-trajectory-dataset-user-guide/.
Funding: This study was supported by the Basic Scientifics Research Operating Expenses of Heilongjiang Provincial University and Colleges (Grant No. 2021-KYYWF-0581). The funder took role in study design and preparation of the manuscript, but had no role in data collection and analysis, or decision to publish.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
In current, along with the development of wireless communication and position technology, location-based service (LBS) becomes more and more popular in people’s daily life. However, as this type of service must have the location of the user in advance to prepare the feedback, more and more people begin to pay close attention to the problem of violating personal privacy [1,2]. In general, schemes of privacy preservation can be briefly classified into two categories: the strategy of generalization [3] as well as the strategy of obfuscation [4]. However, these schemes had to confront the same problem, as during the process of preparing feedback, it is unavoidable that the LBS server must learn the purpose of the user, so as to find the result and feedback it to the user. During this procedure, the personal privacy (such as the type of point of interests (PoI), the query types and so on) will be gained by an un-trusted LBS server by inferring the purpose, so these schemes cannot preserve the personal privacy effectively. Private information retrieval (PIR) can effectively cope with this problem [5]. In PIR, the LBS server encrypted the PoIs that stored in its database, and then with the comparison of binary index or hardware index to get feedback result without violating any privacy to any entity. Then based on the differential of longitude and latitude in geography, Wightman et al. [6] proposed a mapping based PIR. Yang et al. [7] optimized the calculable PIR with a trusted central server, so the speed of blind query disposing can be accelerated.
In spite of this, as a feature of LBS is the PoIs must be feeding back in real time, but the whole process of encryption and comparing in PIR needs a large amount of time. In addition, in order to preserve the privacy, the LBS server also needs to index more results to keep the privacy, so most times PIR will affect the quality of service in LBS [8]. Based on the conception of increasing the index efficiency, Hu et al. [9] proposed a hierarchical index structure and Yi et al. [10] proposed a fuzzy index structure for PIR. However, these structures did not consider the attributes of a user can also be used in identifying the privacy. Furthermore, in LBS, the location privacy can also be inferred by some attributes, such as the velocity of moving, the query interval and so on [11]. For preserving the attribute privacy, and at the same time reduce the cost of calculation and increase the quality of service, we consider utilizing the generalized attributes as an index and compared the encryption set to retrieve the feedback. Then based on above conception, we proposed a LPPCAP scheme that used in LBS to preserve the personal privacy. In this scheme, the query set is constructed by the set of attributes and the process of comparison also based on this set, so the process of retrieving will be simplified. In addition, the attributes are also encrypted to preserve the attribute privacy. Though above two aspects and compared with traditional PIR, the superiority of this scheme can be reflected in both privacy preservation and quality of service. At last, performance analysis as well as simulation experiment is given, so that the result will further demonstrate the superiority of the proposed scheme. The contribution of this paper can be summarized as the following three points.
- We proposed a LPPCAP scheme, which can preserve the personal privacy for using location based service, and without any information be leaked to other entities.
- We utilized the set of attributes and the process of comparison to retrieve the query result, so as to simplify the process of retrieving back the requiring result with privacy preservation, and further strengthen the resist ability of LPPCAP which makes the maximum uncertainty for the adversary to identify the user.
- We conduct comprehensive experiments on efficiency and utility and with the results the superiority of the proposed scheme is demonstrated, then the results show the level of privacy preservation and the quality of service is better than other schemes.
The organizational structure of this paper can be briefly summarized as follows. In Section 1, we analyze related works such as anonymity and encryption in location privacy preservation. Section 2 shows the system environment and the requirement of privacy preservation. In Section 3, the specific strategy and workflow of LPPCAP is shown. Section 4 shows the experimental settings, comparison results as well as the reason for these results. At last, we conclude this work and analyze future works in Section 5.
2 Related works
In location-based privacy protection processing, existing privacy protection methods can be simply classified into two main strategies: anonymous and encryption.
Anonymous privacy protection is mainly divided into two categories: k-anonymity [12] and ε-indistinguishability [13]. The former finds at least k similar users through a central server [14] or user cooperation [15], and submits the information of all k users to the location service provider to disrupt the attacker’s accurate identification of the user, thus protecting the user’s personal privacy through the attacker’s misidentification. In the central server method, privacy protection is mainly achieved by k-anonymity generalization of user movement positions [16], online collaborative k-anonymity privacy protection for cloud services [17], and anonymous allocation of multiple tasks for differential privacy protection [18]. In the user cooperation method, current research focuses more on building collaborative anonymous groups through blockchain [19], providing effective feedback under anonymous collaboration [20], and privacy protection for multi-cooperative user perception under anonymity [21].
In privacy protection methods mainly based on differential privacy, various noises satisfying differential privacy are mainly added to achieve the indistinguishability between user sensitive information and other information [22]. Current research results mainly include road network indistinguishable algorithms for privacy protection in road environments [23], 3D geographic indistinguishable algorithms for indoor environments [24], spatial crowdsourcing indistinguishable algorithms for vehicle network crowd sensing [25], and personalized local location indistinguishable algorithms for user differences [26] etc.
Undoubtedly, in addition to the above two main applications, there are other similar strategies that adopt different strategies depending on the focus of privacy protection, such as multi-anonymous privacy protection methods for online ride-hailing privacy protection [27], semantic privacy protection anonymity for data sharing [28], and privacy protection methods for inadvertent sharing of indoor privacy navigation [29]. Liu et al. [30] also proposed a fully-distributed context-aware trust model for location based service. These methods further enrich the application environment and scope of anonymous privacy protection strategies.
Based on encryption techniques, information can be hidden to make it more difficult for attackers to obtain user personal information, thereby providing effective privacy protection [1]. According to the differences in the use of encryption methods, they can be divided into encryption comparison and privacy information retrieval [31]. In the encryption comparison, the main strategy is to compare two encrypted quantities with each other, so as to complete the privacy protection task or location matching without obtaining any additional information between each other, such as the parking lot allocation algorithm for privacy-protected path matching [32], geographic range query matching algorithm for mobile crowdsensing, and access authorization for edge computing [33]. In privacy information retrieval, decentralized asynchronous retrieval feedback [34], privacy information retrieval for semantic information [35], and intermittent privacy information retrieval in location privacy processing [36] are mainly used. For schemes utilize the conception of PIR, Vithana et al. [35] utilized semantic as the index to generalize the user with similar semantic to preserve the privacy of the user. Then based on the differential of longitude and latitude in geography, Wightman et al. [6] proposed a mapping based PIR. Yang et al. [7] optimized the calculable PIR with a trusted central server, so the speed of blind query disposing can be accelerated. For schemes utilize the conception of CP-ABE, Li et al. [37] utilized adversarial attacks to protect personal attribute privacy. Huang et al. [38] utilized ABE to hidden policy in cloud services. Lai et al. [8] proposed a scheme with CP-ABE to achieve PIR.
Since classify of the privacy protection scheme of generalization is always a traceable way, there will always be a risk probability of producing location or location sets, so there is still a high privacy risk when the attacker has sufficient background knowledge. In the privacy protection strategy using encryption techniques, the comparison method in location privacy is difficult to implement throughout the entire service stage, so the PIR strategy that can complete information retrieval in a dense environment without displaying any plaintext user information is more practical and has better privacy protection effectiveness in location privacy protection.
3 Preliminaries
3.1 System architecture and privacy threat
In general, there are two types of system architectures used for preserving privacy in LBS: they are centralized architecture and distributed architecture. The centralized architecture usually employs a trusted central server that disposes the generalization or obfuscation, so the central server may become the attack focus or service bottleneck. The distributed architecture usually utilizes the mobile device and collaborates with other users or generates a generalized query set to conceal the real intention. As PIR is a scheme that whole process of query and feedback is encrypted, it does not need any central server or collaborative users, so the system architecture is a distributed architecture and the detail structure can be seen in Fig 1.
From Fig 1, two entities can be seen and they are called the user as well as the LBS server. The user is the moving user equipped with location and communication device, so that he/she can send the service request to a LBS provider and gets the result. The LBS server is the service provider. This entity usually gets the request from a user and finds the result from historical data then feedback it to the user with service module. In most times, the LBS server is usually seen as a trusted entity, as it is usually established by the government or large enterprises. However, as the LBS server stores mass of personal data, it may become the attack focus and once breached by an adversary, and then the personal privacy will be violated. In addition, in case of attract by some huge commercial interests, the enterprise may also violate the privacy. Thus, in this paper, we assume the LBS server is a semi-trusted entity, as it may be curious about the privacy of the user, but can abide the agreement and find the result from historical data and feeds back the query result to the user.
Based on architecture mentioned above, the process of LBS can be depicted as the following. First, the user sends <id, location, query> to the LBS server and requires for the result (such as where is the nearest restaurant or the oil station along our journey). Secondly, the LBS server finds the result with <id, location, query>, and feeds back the result to the user. During this process the LBS server will get the privacy (such as location, query) of the user. In a classic model of k-anonymity, the location, the query is generalized with other locations, queries, so as the LBS server cannot distinguish which is the precise location or query of the user, and then the probability of guessing the precise user is p(id→l,q) = 1/k. However, as LBS server can get some background knowledge to make the probability of guessing the precise user become p(id→l,q|b)≪1/k. In addition, as the probability of guessing satisfy p(id1→l,q|b)≠p(id2→l,q|b) in these k users, the LBS server will be easier to get the privacy.
3.2 Requirements for privacy preservation
According to the threat introduced in section 3.1, we consider the LBS server as the adversary, so in order to preserve the personal privacy an efficient scheme must satisfy the following conditions.
- During the process of getting LBS result, there will be less or nearly no personal information published to the LBS server.
- Without any precise information about the query, the LBS server has the ability to find out the result and feedback it to the user.
- The LBS server cannot identify any special attributes from the query request and the id has the same probability to correlate to others, so as
.
- The feedback result must be sent to the user in an endurable time.
Thus, based on above requirements and with the help of CP-ABE and PIR conception, in this paper, we propose a LPPCAP scheme to preserve the personal privacy of the user.
3.3 The conception of LPPCAP
In general, if a user wants to use the LBS, he/she must send a query to the LBS server, and then the LBS server finds result with the query and sends back the result to the user, the query may be “where is the nearest restaurant”, “find the shortest path to gas station”, “show me the service point every 5 minutes” and so on. So the query can be formalized as Q = {(x,y),t,c}, where (x,y) denotes the current location of the user, t is the query time and c is the content of query. If we see these elements as attributes, then the query can be seen as A = {A1,A2,…,An}, where Ai,0≤i≤n denotes an element used in query. As a result, the set of attributes can be used to retrieve the feedback result. In addition, if this set is obfuscate with other similar sets and encrypted by an encryption scheme, it will be more secure than other schemes. Meanwhile, the consistency of encrypted attributes will facilitate the process of finding the result in the LBS server. Thus, based on these ideas, the brief process of LPPCAP can be summarized as shown in Fig 2.
4 LPPCAP
4.1 The parameters used in LPPCAP
According to the conception of LPPCAP, the whole process can be divided into two parts: the part of disposing attribute by the user and the part of disposing result retrieving by the LBS server. In order to facilitate the comprehension of disposing PIR, the parameters used in LPPCAP are shown in Table 1. Then based on the execution sequence of PIR proposed in literature [8], a detailed introduction on how the requirement changed into the feedback result is shown in follows.
4.2 The process of LPPCAP
Before sending the requirement, the user as well as the LBS server must predispose the query information and the PoIs stored in the server. For the LBS server, the whole data of PoIs stored in this server must be encrypted with ,
,g1←gα. Then the LBS server publishes the public parameter
. Where g is the generator of
,
is a p order large prime cyclic group, F(∙) is a polynomial time probability algorithm. The key generation algorithm is given in algorithm 1.
Algorithm 1. The key generation algorithm.
Input:
Output: the public parameter
1 The LBS server chooses
2
3 g1←gα
4
5 Return
In the process of disposing PoIs, suppose that all attributes of PoIs can be denoted as A. The LBS server has to choose the secure parameter λ, the order of prime number p as well as the public parameter params in advance. At the same time, for the user, he/she has to generate the set of selected attributes with the private key, and sends the encrypted set to the LBS server. In order to get the encrypted set of selected attributes, the user has to complete the following operations. Suppose that the selected attributes of the user can be denoted as , where n is the number of attributes that the user selected. With the set of attributes G = {A1,A2,…,An}⊂A as well as a random number β←ℤp, the user calculates the following parameters.
Then for each i the calculates:
,
,
,
With parameters calculated by above operations, the user sends the encrypted attribute information T(G) = {Ui,Vi,Xi,Yi}, i = 1,2,…,n to the LBS server, and at the same time preserve the private key β. Where denotes the process of selecting an element from the set of a and assigns it to the set b. We elaborate above process in algorithm 2.
Algorithm 2. The query encryption.
Input: The set of attributes converted from user’s query G and the private key β←ℤp
Output: The encrypted query information T(G)
1 Randomly choose the initial parameters ,
,
;
2 Calculates h←gβ;
3 for(i = 1,i< = n,i++)
4 ,
;
5 ,
;
6 ;
7 ;
8 end
9 return T(G) = {Ui,Vi,Xi,Yi};
In algorithm 1, line 3–9 shows the process of encrypting each attribute that corresponds to the query for LBS. During the process of getting the encrypted information T(G), the time complexity seems equal to O(n), but as the multiplicative calculation in lines 6–8, the real time complexity may be O(n2).
Once the LBS server receives the encrypted query T(G) from the user, for the data set of PoIs M as well as the attributes set , the LBS server has to calculate the following parameters according to the attribute set
.
At the same time the LBS server calculates:
With parameters calculated by above operations, the LBS server gets the encrypted result set CT = (C0,C1,C2,C3) and sends this set to the user, the whole process of preparing the encrypted result is shown in algorithm 3.
Algorithm 3. The process of information retrieval in the LBS server.
Input: The encrypted information from the user T(G)
Output: The set of encrypted results CT established by the LBS server
1 for(i=1,i<=k,i++)
2 Calculates Pi,Qi,Wi;
3 end
4 Randomly chooses l1∼lk,t;
5 Repeat calculates the result of P×W;
6 Calculates C0,C1,C2,C3;
7 return CT = (C0,C1,C2,C3)
In algorithm 3, all probable PoIs is selected with the encrypt attributes sent by the user. In addition, as the scale of encrypted attributes is much higher than the user k≫n, the time complexity of algorithm 3 is O(k)+O(n) = O(k).
The user has to decrypt the plaintext from the encrypted set of results CT sent from the LBS server with the following calculation.
At last, the user refines the real result that he/she needs. The process of the user decrypts the plaintext is shown in Algorithm 4.
Algorithm 4. Decrypt the set of feedback results.
Input: The encrypted results set CT that sends from the LBS server,
Output: The plaintext M’
1 ;
2
3 Return M’
In algorithm 4, each attribute is calculated by iterate addition, so as to get the plaintext of query result, as a result the time complexity of algorithm 4 is O(n).
With three algorithms mentioned in above, the process of LPPCAP is shown, and the user can utilize this scheme to get the service without leaking any private information.
5 Performance evaluation
5.1 Security and availability analysis
The security of LPPCAP depends on the security of attribute encryption scheme that is mentioned in literature [8], so we do not focus the features of encryption. In addition, LPPCAP can be seen as a practical of the theory produced in literature [8]. In security analysis, we mainly focus on the difficulty of adversary identifies the real attributes. In availability analysis, we focus on the accuracy of feedback as well as the running time in security retrieval.
In security, as the user’s attributes are encrypted by Amodp, and p is a prime that large enough. So according to the character of modular arithmetic, although the adversary gets the number of p, with the parameter β he/she still difficult to infer the real attributes by inverse calculation. Then, suppose that, if the adversary has obtained the encryption information T(G) and the number of attributes n, without ,
and
, the adversary still difficult to infer the real attributes, in spite of this information does not disposed by modular arithmetic, because
,
and
are selected consistent with each other. At last, as the number of attributes that the LBS server stored is much higher than the user k≫n, it will be difficult for the LBS server to identify the real set from the user and the success ratio of identifying the real set will be less than 1/kn, because the process of finding at least n attributes sub-set from the set of at least k attributes is much more difficult. In addition, as the attributes sent by the user may contain some attributes that do not belong to the user, so it will be even more difficult for the adversary identify the real attributes. In addition, as the adversary cannot decrypt the query of the user, the probability of guessing the real user for each location and query will be p(id→l,q|b) = 1/k and the adversary also difficult to distinguish the probability of p(idi→l,q|b)and p(idj→l,q|b)i≠j, as
. So if we utilize entropy to measure the privacy, we have p(i) = p(idi→l,q|b),
, the entropy H(i)will get the maximum value, which means the adversary will have the maximum uncertainty of the user.
For the availability of proposed scheme, the accuracy of LPPCAP can be denoted as ,
,
and
, for parameters (params,CT,sk) the value of retrieving will be
, so the result set retrieved by attributes must be included in the storage of the LBS server and the user can obtain the real result in this set. For the running time, according to the time complexity mentioned in section 2, with the result described under three algorithms we have the running time is less than O(n2)+O(k)+O(n) = O(m2), so it can be completed in binomial time, the detailed running time will be shown in the result of experiments.
5.2 Experiment preparation
Based on the analysis of security and availability in the above sub-section, we can conclude that the proposed LPPCAP has a better performance in both privacy preservation and the availability in theoretically. In this section, we will further verify the performance of our proposed scheme with several groups of simulation experiments, and the schemes used for comparison include that the intermittent PIR [36], the semantic PIR [35] the approximate PIR [10], the attribute encryption scheme [39] as well as the correlation indistinguishable scheme [14]. We utilize the central part of the Geilife data to simulate the user in LBS. Then the simulation experiments are deployed in a laptop with Intel core I7, 8GB memories and windows10 operation system, and we utilize Matlab R2017a as the instrument to verify the performance. In addition, the results are calculated at least 500 times and utilize the average result to construct the line charts.
5.3 Results with brief explanations
Table 2 shows the performance of various schemes in both privacy preservation and execution efficiency. From this table we can see the LPPCAP has a middle accuracy in feeding back result, and has a lower running time compared with other schemes. In addition, as all information used in this scheme is encrypted during the process of querying, LPPCAP also leads zero knowledge leakage as other PIR scheme. Then this scheme also has a better performance in concealing the attribute as well as the attributes un-correlation than other schemes.
Fig 3 shows the success ratio of an adversary identifies the real attribute, which increases along with the increasing number of attributes. In this figure, we can see that the success ratio of LPPCAP does not changed dramatically, as this scheme utilize the encrypted attributes as index to find the result. Furthermore, this scheme can also add some dummy attributes in the query set to obfuscate the real attributes. For other scheme with PIR, performances of the intermittent PIR, the semantic PIR as well as the approximate PIR are similar to LPPCAP but a bit higher, as these schemes also conceal the real attribute but fail to dispose the attributes correlation, so that the results are different with each other. For the scheme of attributes encryption, although this scheme encrypts the attributes of the user, it needs to send the real attribute to the LBS server, so the success ratio is higher than others. On the other hand, the scheme mainly defined with other collaborative users, the more attributes used the more difficult to find the collaborative user, and without these user this scheme will be failed to preserve the privacy. At last, the correlation indistinguishable is mainly designed to generalize the correlation of attributes but not conceal the attributes or conceal the attribute correlation, so the success ratio is the highest.
Fig 4 shows the success ratio of an adversary identifies the real attribute, which increases along with the increasing number of queries. From this figure, we can see that success ratios of all schemes are increasing with a higher number of queries, as more queries mean more information sent to the LBS server and more risk to be identified by the adversary. Among these schemes, LPPCAP performs best, as this scheme has the advantage of both attribute encryption as well as PIR, so the possibility of revealing the real attribute is the lowest. In addition, as the correlation of attributes also obfuscated by dummies, the success ratio will be even lower. For other schemes with PIR strategy, such as the intermittent PIR, the semantic PIR as well as the approximate PIR, as they mainly utilize the encryption without disposing attribute to preserve the privacy, the success ratio is lower than the scheme without PIR, but higher than LPPCAP. Although the scheme of attributes encryption also encrypts the user’s attributes, the collaborative users lack will affect the security and the success ratio of identifying will be higher. At last, the scheme of correlation indistinguishable that without encryption performs the worst.
Fig 5 shows the running time of various schemes changes along with attributes increasing. From this figure, we can see that the running time of all schemes is increasing with a higher number of attributes, as all schemes have to conceal or generalize each attribute, no matter of encryption or generalization, and the disposition for attribute occupied the running time. Among these schemes, the LPPCAP performs better than schemes with encryption, as this scheme utilizes the set of attributes as index, and can be used to compare with multidimensional data to find the results simultaneously, so the running time is shorter than others. But the running time of LPPCAP scheme is higher than the scheme of correlation indistinguishable, as the encryption costs much more time than selecting collaborative users. For schemes with encryption, as strategies of indexing are different from each other, the running time decreasing with the enhancement of index capability.
Fig 6 shows the running time of various schemes changes along with queries increasing. From this figure, we can see that the running time of all schemes is increasing with a higher number of queries, as more queries mean more sets of attributes have to be disposed, so the running time is higher. Among these schemes, the LPPCAP performs the best, as the running time in every query is shorter. However, the running time of scheme of correlation indistinguishable is higher than LPPCAP, as more queries mean more dummies added and longer distance shifted, so the running time is higher. For other schemes, such as the intermittent PIR, the semantic PIR as well as the approximate PIR, as strategies of indexing are different from each other, the running time also decreasing with the enhancement of index capability.
Fig 7 shows the differences in algorithm success rates caused by changes in the number of user attributes during the execution process. It can be seen from the figure that privacy information retrieval algorithms (such as intermittent PIR, semantic PIR, approximate PIR, and the algorithm proposed in this paper) have relatively high success rates. This is mainly because these algorithms achieve privacy protection by encrypting their own information or attributes, without the need to find generalized users with similar attributes or features like generalization methods. Although the algorithm proposed in this chapter requires encryption of various attributes displayed by users, this processing does not cause significant fluctuations due to changes in the number of attributes. Therefore, like other PIR-based algorithms, the success rate of this algorithm is better than that of generalization algorithms. For the other two generalization algorithms participating in the comparison, both algorithms require finding generalized users with similar attributes to complete privacy protection processing for the applicant user. Therefore, as the number of attributes increases, the degree of reduction in the success rate of the algorithm is higher than that of PIR algorithms. In addition, the main reason for the reduction in the success rate of non-attribute encryption strategy algorithms in the above PIR algorithms with the increase in the number of attributes is similar to the success rate of attacks. The increase in the number of attributes increases the amount of background knowledge available to adversaries and more background knowledge directly allows attackers to guess, associate, and obtain user privacy information, leading to the failure of algorithm privacy protection. Therefore, these PIR algorithms will also experience a decrease in the success rate of algorithm execution due to an increase in the number of attributes.
Fig 8 shows the difference in algorithm success rates caused by changes in query frequency for different algorithms. It can be seen from the figure that algorithm query frequency is independent of algorithm success rate, meaning that the success rate of algorithm execution does not increase or decrease with changes in query frequency. This is mainly because each user query may or may not be successful. After averaging multiple queries, all unsuccessful executions are converted into an unsuccessful probability, which is not significant in overall comparison. Additionally, the success rate of generalization-based privacy protection algorithms (such as attribute-based encryption algorithms and probabilistic indistinguishability-based algorithms) is lower than that of PIR retrieval-based privacy protection algorithms. This is because generalization-based algorithms need to find generalized users who can generalize real users to complete privacy protection processing. If there are fewer generalized users in the current area or their willingness to participate in generalization is low, it is difficult for these algorithms to find enough generalized users, resulting in lower execution success rates for their privacy protection algorithms than for PIR retrieval-based privacy protection algorithms. Among many PIR retrieval-based privacy protection algorithms, the algorithm proposed in this article has little difference in algorithm execution success rate affected by query frequency compared with other algorithms. It can be regarded as having a high algorithm execution success rate along with changes in query frequency among similar algorithms.
In conclusion, we can consider that the LPPCAP has a better performance in both privacy preservation and the availability, no matter in theoretically or simulation experiment, and then the superiority of LPPCAP has been verified.
6 Conclusion
In this paper, we focus on the problem of reducing the running time as well as the problem of identifying the privacy with user’s attributes in LBS, so we proposed a LPPCAP. This scheme utilizes the conception of CP-ABE and with the obfuscated attributes to provide privacy preservation for the user in LBS. In this scheme, three algorithms are proposed for the user, the LBS server as well as the decryption to complete the process of secure retrieval. Furthermore, as the index with attribute is much easier, the running time of the proposed scheme is much lower than others. At last, we analyze security as well as availability of the proposed scheme, and then the results of simulation experiment further demonstrate the superiority.
Acknowledgments
We would like to present our thanks to anonymous reviewers for their helpful suggestions.
References
- 1. Kim J.W., Edemacu K., Jang B., Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey, Journal of Network and Computer Applications, 200 (2022) 103315.
- 2. Lin S.-Y., Zhang L., Li J., Ji L.-l., Sun Y., A survey of application research based on blockchain smart contract, Wireless Networks, 28 (2022) 635–690.
- 3. Xing L., Jia X.F., Gao J.P., Wu H.H., A Location Privacy Protection Algorithm Based on Double K-Anonymity in the Social Internet of Vehicles, Ieee Communications Letters, 25 (2021) 3199–3203.
- 4. Niu B., Chen Y.H., Wang Z.B., li F.H., Wang B.Y., Li H., Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks, Ieee Transactions on Mobile Computing, 21 (2022) 125–138.
- 5. Khoshgozaran A., Shahabi C., Shirani-Mehr H., Location privacy: going beyond K-anonymity, cloaking and anonymizers, Knowledge and Information Systems, 26 (2011) 435–465.
- 6.
P.M. Wightman, M. Zurbaran, M. Rodriguez, M.A. Labrador, MaPIR: Mapping-Based private information retrieval for location privacy in LBISs, Proceedings of the 2013 38th Annual IEEE Conference on Local Computer Networks Workshops (Lcn Workshops), (2013) 964–971.
- 7. Yang Song-tao MA Chun-guang. Random anonymity method for location privacy [J]. Journal of Harbin Engineering University, 2015,36(03):374–378.
- 8. Lai J., Mu Y., Guo F., Jiang P., Susilo W., Privacy-enhanced attribute-based private information retrieval, Information Sciences, 454–455 (2018) 275–291.
- 9.
H. Haibo, X. Jianliang, X. Xizhong, K. Pei, B. Choi, Z. Shuigeng, Private search on key-value stores with hierarchical indexes, in: Data Engineering (ICDE), 2014 IEEE 30th International Conference on, 2014, pp. 628–639.
- 10. Yi X., Paulet R., Bertino E., Varadharajan V., Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy, Ieee Transactions on Knowledge and Data Engineering, 28 (2016) 1546–1559.
- 11. Han Y.L., Zhu S.S., Li Y., Lin X., APPLSS: Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption, China Communications, 18 (2021) 105–121.
- 12.
M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in: Proceedings of the 1st international conference on Mobile systems, applications and services, ACM, San Francisco, California, 2003, pp. 31–42.
- 13.
M.E. Andrés, N.E. Bordenabe, K. Chatzikokolakis, C. Palamidessi, Geo-indistinguishability: Differential privacy for location-based systems, in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ACM, 2013, pp. 901–914.
- 14. Zhang L., Ma C., Yang S., Zheng X., Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme, Wireless Personal Communications, 97 (2017) 6167–6187.
- 15. Ghaffari M., Ghadiri N., Manshaei M.H., Lahijani M.S., P(4)QS: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications, Ieee Transactions on Vehicular Technology, 66 (2017) 9458–9469.
- 16. Zhang L., Chen M.N., Liu D.S., Li J., Moving without association: an association shifting scheme for protecting destination, Journal of Ambient Intelligence and Humanized Computing, 14 (2023) 1659–1674.
- 17. Wang T., Xu L., Zhang M., Zhang H., Zhang G., A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services, Journal of Circuits Systems and Computers, 31 (2022) 2250083.
- 18. Ding Y., Zhang L., Guo L., Dynamic Delayed-Decision Task Assignment Under Spatial-Temporal Constraints in Mobile Crowdsensing, Ieee Transactions on Network Science and Engineering, 9 (2022) 2418–2431.
- 19. Zhang L., Liu D., Chen M., Li H., Wang C., Zhang Y., Du Y., A user collaboration privacy protection scheme with threshold scheme and smart contract, Information Sciences, 560 (2021) 183–201.
- 20. Tao X., Hafid A.S., ChainSensing: A Novel Mobile Crowdsensing Framework With Blockchain, Ieee Internet of Things Journal, 9 (2022) 2999–3010.
- 21. Zhao P., Li C., Fu Y., Hui Y., Zhang Y., Cheng N., Blockchain-Enabled Conditional Decentralized Vehicular Crowdsensing System, Ieee Transactions on Intelligent Transportation Systems, 23 (2022) 18937–18950.
- 22. Luo H.W., Zhang H.M., Long S.G., Lin Y., Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability, Multimedia Tools and Applications, 2021 (2021) 21823–21841.
- 23. Ma B., Wang X., Ni W., Liu R.P., Personalized Location Privacy With Road Network-Indistinguishability, Ieee Transactions on Intelligent Transportation Systems, 23 (2022) 20860–20872.
- 24. Min M., Xiao L., Ding J., Zhang H., Li S., Pan M., Han Z., 3D Geo-Indistinguishability for Indoor Location-Based Services, Ieee Transactions on Wireless Communications, 21 (2022) 4682–4694.
- 25. Qiu C., Squicciarini A.C., Pang C., Wang N., Wu B., Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability, Ieee Transactions on Mobile Computing, 21 (2022) 2436–2450.
- 26. Xue Q., Zhu Y., Wang J., Mean estimation over numeric data with personalized local differential privacy, Frontiers of Computer Science, 16 (2022).
- 27. Zhang L., Lin S., Wang C., Li J., Liu Y., Sun Y., IRDP Ride system: A Privacy Preservation System for Online Ride-hailing, IEEE Internet of Things Journal, 10 (2023) 9108–9121.
- 28. Zheng Z., Li Z., Jiang H., Zhang L.Y., Tu D., Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing, Ieee Transactions on Information Forensics and Security, 17 (2022) 2256–2271.
- 29. Yang H., Vijayakumar P., Shen J., Gupta B.B., A location-based privacy-preserving oblivious sharing scheme for indoor navigation, Future Generation Computer Systems-the International Journal of Escience, 137 (2022) 42–52.
- 30. Liu Z., Ma J., Jiang Z., Miao Y., FCT: a fully-distributed context-aware trust model for location based service recommendation, Science China Information Sciences, 60 (2017) 082102.
- 31. Wazirali R., A Review on Privacy Preservation of Location-Based Services in Internet of Things, Intelligent Automation and Soft Computing, 31 (2022) 767–779.
- 32. Xu Q., Zhu H., Zheng Y., Zhao J., Lu R., Li H., An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services, IEEE Internet of Things Journal, 9 (2022) 19890–19902.
- 33. Deebak D.B., Al-Turjman F., Lightweight privacy-aware secure authentication scheme for cyber-physical systems in the edge intelligence era, Concurrency and Computation-Practice & Experience, (2021) e6510.
- 34. Liang Y., Li Y., Shin B.-S., Private decentralized crowdsensing with asynchronous blockchain access, Computer Networks, 213 (2022) 109088.
- 35. Vithana S., Banawan K., Ulukus S., Semantic Private Information Retrieval, Ieee Transactions on Information Theory, 68 (2022) 2635–2652.
- 36. Ye F., El Rouayheb S., Intermittent Private Information Retrieval With Application to Location Privacy, Ieee Journal on Selected Areas in Communications, 40 (2022) 927–939.
- 37. Li X.T., Chen L.W., Wu D.H., Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy, Acm Transactions on Knowledge Discovery from Data, 18 (2024).
- 38. Huang C., Wei S., Fu A., An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage, Journal of Circuits Systems and Computers, 28 (2019) 1950816.
- 39. Lei Z., Lili H., Desheng L., Jing L., Qingfeng J., Qi Y., An Attribute Generalization Mix-Zone Without Privacy Leakage, IEEE Access, 7 (2019) 57088–57099.