Title :
A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks
Author :
Che, Yanzhe ; Yang, Qiang ; Hong, Xiaoyan
Author_Institution :
Coll. of Comput. Sci. & Technol., Zhejiang Univ., Hangzhou, China
Abstract :
Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of current solutions are designed with a centralized architecture in mind and rely on a third trustworthy party, i.e. a location anonymizing server (LAS). Unfortunately, these solutions cannot be directly applied to the mobile peer-to-peer (P2P) networks where no centralized servers are possible. In this paper, we present a dual-active spatial cloaking algorithm for mobile P2P networks. The key difference between the suggested algorithm and two existing algorithms, on-demand and proactive, is that: our algorithm allows peers not only actively collect but also actively disseminate location information to others. The three approaches are assessed through extensive simulation experiments for a range of P2P network scenarios. The experimental result shows that the dual-active approach uses the least anonymizing time and has the best anonymization success rate at the price of acceptable communicating cost.
Keywords :
computer network security; information dissemination; invisibility cloaks; mobility management (mobile radio); peer-to-peer computing; access service; active spatial cloaking algorithm; centralized architecture; location anonymization server; location based service; location information dissemination; location privacy preservation; mobile P2P network; on-demand algorithm; peer-to-peer network; proactive algorithm; user location; Databases; Delay; Mobile communication; Mobile computing; Peer to peer computing; Privacy; Servers; Dual-active; Location Based Service; Peer-to-Peer; Privacy Preserving; Spatial Cloaking;
Conference_Titel :
Wireless Communications and Networking Conference (WCNC), 2012 IEEE
Conference_Location :
Shanghai
Print_ISBN :
978-1-4673-0436-8
DOI :
10.1109/WCNC.2012.6214137