Abstract
In Location-Based Social Networks (LBSNs), registered users submit their reviews for visited point-of-interests (POIs) to the system providers (SPs). The SPs anonymously publish submitted reviews to build reputations for POIs. Unfortunately, the user profile and trajectory contained in reviews can be easily obtained by adversaries who SPs has compromised with. Even worse, existing techniques, such as cryptography and generalization, etc., are infeasible due to the necessity of public publication of reviews and the facticity of reviews. Inspired by pseudonym techniques, we propose an approach to exchanging reviews before users submit reviews to SPs. In our approach, we introduce two attacks, namely review-based location correlation attack (RLCA) and semantic-based long-term statistical attack (SLSA). RLCA can be exploited to link the real user by reconstructing the trajectory, and SLSA can be launched to establish a connection between locations and users through the difference of semantic frequency. To resist RLCA, we design a method named User Selection to Resist RLCA (USR-RLCA) to exchange reviews. We propose a metric to measure the correlation between a user and a trajectory. Based on the metric, USR-RLCA can select reviews resisting RLCA to exchange by suppressing the number of locations on each reconstructed trajectory below the correlation. However, USR-RLCA fails to resist SLSA because of ignoring the essential semantics. Hence, we design an enhanced USR-RLCA named User Selection to Resist SLSA (USR-SLSA). We first propose a metric to measure the indistinguishability of locations concerning the difference of semantic frequency in a long term. Then, USR-SLSA can select reviews resisting SLSA to exchange by allowing two reviews whose indistinguishability is below the probability difference after the exchange to be exchanged. Evaluation results verify the effectiveness of our approach in terms of privacy and utility.
Funder
foundation of guizhou provincial key laboratory of public big data
Major Scientific and Technological Special Project of Guizhou Province
Foundation of Guizhou Provincial Key Laboratory of Public Big Data
basic ability improvement program for young and middle-aged teachers of guangxi
Publisher
Public Library of Science (PLoS)
Reference35 articles.
1. Scellato S, Noulas A, Lambiotte R, Mascolo C. Socio-spatial properties of online location-based social networks. Fifth international AAAI conference on weblogs and social media, Barcelona, Spain.2012; 329–336.
2. Xu Z, Cai ZP, Li JZ, Gao H. Location-privacy-aware review publication mechanism for local business service systems. IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA. 2017; 1–9.
3. Bindschaedler, V.; Shokri, R. Synthesizing Plausible Privacy-Preserving Location Traces. IEEE Symposium on Security and Privacy (S&P) IEEE, San Jose, CA, USA. 2016; 22–26. https://doi.ieeecomputersociety.org/10.1109/SP.2016.39.
4. Improving accessibility of the Australian My Health Records while preserving privacy and security of the system;P Vimalachandran;Health Information Science and Systems,2020
5. Distributed Memetic Algorithm for Outsourced Database Fragmentation;YF Ge;IEEE Transactions on Cybernetics,2020
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献