%0 Journal Article %A LYU Xin %A ZHAO Liancheng %A YU Jiyuan %A TAN Bin %A ZENG Tao %A CHEN Juan %T Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS %D 2021 %R 10.3778/j.issn.1002-8331.2008-0087 %J Computer Engineering and Applications %P 104-112 %V 57 %N 2 %X

In reality, users usually submit queries continuously to LBS providers, inevitably, some background information, such as time sequence of query, location area, moving trend, is collected and analyzed by the attackers to obtain the real location or trajectory, which will lead to the exposure of user’s habits and other privacy information. In this paper, a trajectory-clustering based privacy protection method is proposed for continuous query application. The core of the method is to design an effective mechanism for constructing anonymous region, on the basis of the collaboration of the neighboring users. During the query process, users firstly retrieve the target results from the shared cache, if it missed, then it launches a query request to the LBS server. Meanwhile, a location updating algorithm for the adjacent users is proposed to improve the collaboration efficiency and guarantee the availability of cache information. Besides, for cache hitting, a region of interest extraction algorithm based on density clustering is utilized to generate fake query with high confusion to disturb the order of the whole query sequence, thereby enhancing the performance of trajectory privacy protection. The experimental results show that the time cost of continuous query is reduced, and the confusion degree is improved at the same time.

%U http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2008-0087