{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T06:17:39Z","timestamp":1696659459501},"reference-count":38,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,9,18]],"date-time":"2013-09-18T00:00:00Z","timestamp":1379462400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2015,1,10]]},"abstract":"SUMMARY<\/jats:title>While enjoying various LBS (location\u2010based services), users also face the threats of location privacy disclosure. This is because even if the communications between users and LBS providers can be encrypted and anonymized, the sensitive information inside LBS queries may disclose the exact location or even the identity of a user. The existing research on location privacy preservation in mobile peer\u2010to\u2010peer (P2P) networks assumed that users trust each other and directly share location information with each other. Nonetheless, this assumption is not practical for most of the mobile P2P scenarios, for example, an adversary can pretend to be a normal user and collect the locations of other users. Aiming at this issue, this paper presents x<\/jats:italic>\u2010region as a solution to preserve the location privacy in a mobile P2P environment where no trust relationships are assumed amongst mobile users. The main idea is to allow users to share a blurred region known as x<\/jats:italic>\u2010region instead of their exact locations so that one cannot distinguish any user from others inside the region. We propose a theoretical metric for measuring the anonymity property of x<\/jats:italic>\u2010region, together with three algorithms for generating an x<\/jats:italic>\u2010region, namely, benchmark algorithm, weighted expanding algorithm, and aggressive weighted expanding algorithm. These algorithms achieve the anonymity and QoS requirements with different strategies. Our experiments verify the performance of the algorithms against three key metrics. Copyright \u00a9 2013 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.2650","type":"journal-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T16:38:13Z","timestamp":1381250293000},"page":"167-186","source":"Crossref","is-referenced-by-count":6,"title":["X<\/i>\u2010Region: A framework for location privacy preservation in mobile peer\u2010to\u2010peer networks"],"prefix":"10.1002","volume":"28","author":[{"given":"Yanzhe","family":"Che","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology Zhejiang University Hangzhou 310027 China"}]},{"given":"Qinming","family":"He","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology Zhejiang University Hangzhou 310027 China"}]},{"given":"Xiaoyan","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Computer Science University of Alabama Tuscaloosa AL 35487 USA"}]},{"given":"Kevin","family":"Chiew","sequence":"additional","affiliation":[{"name":"School of Engineering Tan Tao University Duc Hoa Long An Province Vietnam"}]}],"member":"311","published-online":{"date-parts":[[2013,9,18]]},"reference":[{"key":"e_1_2_10_2_1","unstructured":"KathrynZ.Three\u2010quarters of smartphone owners use location\u2010based services.Technical Report 2012."},{"key":"e_1_2_10_3_1","unstructured":"Microsoft.Location based services usage and perceptions survey 2012. Available from:http:\/\/www.microsoft.com\/en\u2010us\/download\/details.aspx?id=3250[Accessed on: 03 September 2013]."},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"e_1_2_10_5_1","doi-asserted-by":"crossref","unstructured":"GruteserM GrunwaldD.Anonymous usage of Location\u2010based Services through Spatial and Temporal Cloaking.Proceedings of the First International Conference on Mobile Systems Applications and Services (MobiSys 2003) San Francisco CA USA 2003;31\u201342.","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_2_10_6_1","unstructured":"GedikB LiuL.Location Privacy in Mobile Systems: A Personalized Anonymization Model.Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005) Columbus OH USA 2005;620\u2013629."},{"key":"e_1_2_10_7_1","unstructured":"MokbelMF ChowCY ArefWG.The new Casper: Query Processing for Location Services without Compromising Privacy.Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB 2006) Seoul Korea 2006;763\u2013774."},{"key":"e_1_2_10_8_1","doi-asserted-by":"crossref","unstructured":"BambaB LiuL PestiP WangT.Supporting Anonymous Location Queries in Mobile Environments with Privacygrid.Proceedings of the 17th International World Wide Web Conference (WWW 2008) Beijing China 2008;237\u2013246.","DOI":"10.1145\/1367497.1367531"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.28"},{"key":"e_1_2_10_10_1","doi-asserted-by":"crossref","unstructured":"ChowCY MokbelMF LiuX.A Peer\u2010to\u2010Peer Spatial Cloaking Algorithm for Anonymous Location\u2010based Service.Proceedings of 14th ACM International Symposium on Geographic Information Systems (ACM\u2010GIS 2006) Arlington Virginia USA 2006;171\u2013178.","DOI":"10.1145\/1183471.1183500"},{"key":"e_1_2_10_11_1","doi-asserted-by":"crossref","unstructured":"GhinitaG KalnisP SkiadopoulosS.PRIVE: Anonymous Location\u2010based Queries in Distributed Mobile Systems.Proceedings of the 16th International World Wide Web Conference (WWW 2007) Banff Alberta Canada 2007;371\u2013380.","DOI":"10.1145\/1242572.1242623"},{"key":"e_1_2_10_12_1","doi-asserted-by":"crossref","unstructured":"GhinitaG KalnisP SkiadopoulosS.Mobihide: A mobilea peer\u2010to\u2010peer system for anonymous location\u2010based queries.Proceedings of 10th International Symposium on Advances in Spatial and Temporal Databases (SSTD 2007) Boston Massachusetts USA 2007;221\u2013238.","DOI":"10.1007\/978-3-540-73540-3_13"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-009-0099-y"},{"key":"e_1_2_10_14_1","doi-asserted-by":"crossref","unstructured":"CheY YangQ HongX.A Dual\u2010Active Spatial Cloaking Algorithm for Location Privacy Preserving in Mobile Peer\u2010to\u2010Peer Networks Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC 2012) Paris France April2012;2543\u20132548.","DOI":"10.1109\/WCNC.2012.6214137"},{"key":"e_1_2_10_15_1","doi-asserted-by":"crossref","unstructured":"CheY ChiewK HongX HeQ.Sals: Semantics\u2010aware location sharing based on Cloaking Zone in Mobile Social Networks.Proceedings of the 1st ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems (MobiGIS 2012) Redondo Beach CA USA 6 November2012;49\u201356.","DOI":"10.1145\/2442810.2442820"},{"key":"e_1_2_10_16_1","article-title":"Modeling and analysis of access transparency and scalability in p2p distributed systems","author":"Khaneghah EM","journal-title":"International Journal of Communication Systems"},{"key":"e_1_2_10_17_1","doi-asserted-by":"crossref","unstructured":"TiwariS KaushikS JagwaniP TiwariS.A Survey on LBS: System Architecture Trends and Broad Research Areas.Proceedings of the 7th International Workshop on Databases in Networked Information Systems (DNIS 2011) Aizu\u2010Wakamatsu Japan 2011;223\u2013241.","DOI":"10.1007\/978-3-642-25731-5_18"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1021"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1222"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.617"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1158"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1252"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2409"},{"key":"e_1_2_10_26_1","unstructured":"KidoH YanagisawaY SatohT.An Anonymous Communication Technique using Dummies for Location\u2010based Services.Proceedings of the IEEE International Conference on Pervasive Services 2005 (ICPS'05) Santorini Greece 2005;88\u201397."},{"key":"e_1_2_10_27_1","doi-asserted-by":"crossref","unstructured":"YiuML JensenCS HuangX LuH.Spacetwist: Managing the Trade\u2010offs among Location Privacy Query Performance and Query Accuracy in Mobile Services.Proceedings of the 24th International Conference on Data Engineering (ICDE 2008) Canc\u00fan M\u00e9xico 2008;366\u2013375.","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"e_1_2_10_28_1","doi-asserted-by":"crossref","unstructured":"ShankarP GanapathyV IftodeL.Privately Querying Location\u2010based Services with Sybilquery.Proceedings of the 11th International Conference on Ubiquitous Computing (Ubicomp 2009) Orlando Florida USA 2009;31\u201340.","DOI":"10.1145\/1620545.1620550"},{"key":"e_1_2_10_29_1","doi-asserted-by":"crossref","unstructured":"PopaRA BlumbergAJ BalakrishnanH LiFH.Privacy and Accountability for Location\u2010based Aggregate Statistics.Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011) Chicago Illinois USA 2011;653\u2013666.","DOI":"10.1145\/2046707.2046781"},{"key":"e_1_2_10_30_1","unstructured":"ShokriR PapadimitratosP TheodorakopoulosG HubauxJP.Collaborative Location Privacy.Proceedings of 8th IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS 2011) Valencia Spain 2011;500\u2013509."},{"key":"e_1_2_10_31_1","unstructured":"ISACA.Geolocation: Risk Issues and Strategies ISACA Emerging Technology White Paper 2011."},{"key":"e_1_2_10_32_1","doi-asserted-by":"crossref","unstructured":"PerkinsCE RoyerE DasS.Ad hoc on\u2010demand distance vector (aodv).Request For Comments RFC 3651 2003. Available athttp:\/\/www.ietf.org\/rfc\/rfc3561.txt[Accessed on 3 September 2013].","DOI":"10.17487\/rfc3561"},{"key":"e_1_2_10_33_1","unstructured":"PeiG GerlaM HongX.LANMAR: Landmark Routing for Large Scale Wireless ad hoc Networks with Group Mobility.Proceedings of 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2000) Boston Massachusetts USA 2000;11\u201318."},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.15"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"e_1_2_10_36_1","doi-asserted-by":"crossref","unstructured":"LuoX JiX ParkMS.Location Privacy against Traffic Analysis attacks in Wireless Sensor Networks.Proceedings of the 10th International Conference on Information Science and Applications (ICISA 2010) Seoul South Korea 2010;1\u20136.","DOI":"10.1109\/ICISA.2010.5480564"},{"key":"e_1_2_10_37_1","doi-asserted-by":"crossref","unstructured":"DingledineR MathewsonN SyversonP.Tor: The second\u2010Generation Onion Router.Proceedings of the 13th USENIX Security Symposium (Security'04) San Diego CA USA 2004;303\u2013320.","DOI":"10.21236\/ADA465464"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015231126594"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.2650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.2650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T13:41:30Z","timestamp":1696599690000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.2650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,18]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1,10]]}},"alternative-id":["10.1002\/dac.2650"],"URL":"https:\/\/doi.org\/10.1002\/dac.2650","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,18]]}}}