OMCPR: Optimal Mobility Aware Cache Data Pre-fetching and Replacement Policy Using Spatial K-Anonymity for LBS | Wireless Personal Communications
Skip to main content

OMCPR: Optimal Mobility Aware Cache Data Pre-fetching and Replacement Policy Using Spatial K-Anonymity for LBS

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Location-based services are an important category of context-aware computing, which play an important role in providing the continuous, local and spatially confined information systems very efficiently and accurately to their clients. The key component in location-based services is the current location of a mobile user. Thus, to protect mobile users’ location and their other information to an untrusted party with consideration of minimal waiting time, Optimal Mobility Aware Cache data Pre-fetching and Replacement policy (OMCPR) is being proposed here. In this continuous location-based services model, the system introduces a mediator namely Anonymizer by employing the prefetching facility for spatial K-anonymity that resides in between the user and Query Analyser to form a cloaking region using mobile user inputs (data freshness, the contribution rate of cell’s cache and location). It provides high-quality lossless location-based services by the utilization of the frequent pattern mining of mobile users’ trajectories to forecast their next position as per mobility and multiple constraints. A client–server based queueing model is used to simulate the proposed OMCPR platform. It provides higher privacy protection than the current state of the art strategies available, also minimizes the overhead of the LBS server and waiting time of mobile users by the addition of the prefetching facilities to Anonymizer.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Gupta, A. K., & Shanker, U. (2018). Location dependent information system’s queries for mobile environment. In 23rd international conference on database systems for advanced applications (DASFAA) international workshops, Gold Coast, QLD, Australia, May 21–24, pp. 1–9.

  2. Ilayaraja, N., Mary Magdalene Jane, F., Safar, M., & Nadarajan, R. (2016). WARM based data pre-fetching and cache replacement strategies for location dependent information system in wireless environment. Wireless Personal Communications, 90(4), 1811–1842.

    Article  Google Scholar 

  3. Xu, T., & Cai, Y. (2009). Feeling-based location privacy protection for location-based services. In Proceedings of ACM CCS.

  4. Pingley, A., Yu, W., Zhang, N., Fu, X., & Zhao, W. (2009). Cap: A contextaware privacy protection system for location-based services. In Proceedings of IEEE ICDCS.

  5. Manweiler, J., Scudellari, R., & Cox, L. P. (2009). Smile: Encounter-based trust for mobile social services. In Proceedings of ACM CCS.

  6. Hu, H., & Xu, J. (2009). Non-exposure location anonymity. In Proceedings of IEEE ICDE.

  7. Zhu, X., Chi, H., Niu, B., Zhang, W., Li, Z., & Li, H. (2013). Mobicache: When k-anonymity meets cache. In Proceedings of IEEE GLOBECOM.

  8. Niu, B., Zhu, X., Li, W., & Li, H. (2014). Epcloak: An efficient and privacypreserving spatial cloaking scheme for LBSS. In Proceedings of IEEE MASS.

  9. Chow, C.-Y., Mokbel, M. F., & Aref, W. G. (2009). Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems, 34(4), 1–48.

    Article  Google Scholar 

  10. Zhang, S., Choo, K.-K. R., Liu, Q., & Wang, G. (2018). Enhancing privacy through uniform grid and caching in location-based services. Future Generation Computing Systems, 86, 881–892.

    Article  Google Scholar 

  11. Niu, B., Li, Q., Zhu, X., Cao, G., & Li, H. (2014). Achieving k-anonymity in privacy-aware location-based services. In Proceedings of the IEEE international conference on computer communications (INFOCOM ‘14), pp. 754–762, IEEE, Toronto, Canada, April–May 2014.

  12. Ghinita, G., Zhao, K., Papadias, D., & Kalnis, P. (2010). A reciprocal framework for spatial K-anonymity. Information Systems, 35(3), 299–314.

    Article  Google Scholar 

  13. Chen, J., He, K., Yuan, Q., Chen, M., Du, R., & Xiang, Y. (2018). ‘Blind filtering at third parties: an efficient privacy-preserving framework for location-based services’. IEEE Transactions on Mobile Computing, 17(11), 2524–2535.

    Article  Google Scholar 

  14. Peng, T., Liu, Q., Meng, D., & Wang, G. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165–179.

    Article  Google Scholar 

  15. Liao, D., Sun, G., Li, H., Yu, H., & Chang, V. (2017). The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems. Cluster Computing, 20(3), 2283–2297.

    Article  Google Scholar 

  16. Michael, K. (2004). Location-based services: A vehicle for IT & T convergence. In Advances in e-Engineering and Digital Enterprise Technology. Professional Engineering Publishing, University of Wollongong Research Online UK, pp. 467–477.

  17. Zhao, P., Li, J., Zeng, F., Xiao, F., Wang, C., & Jiang, H. (2018). ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things Journal, 5(2), 1033–1042.

    Article  Google Scholar 

  18. Amini, S., Lindqvist, J., Hong, J., Lin, J., Toch, E., & Sadeh, N. (2011). Cache: Caching location-enhanced content to improve user privacy. In Proceedings of ACM MobiSys.

  19. Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., & Hubaux, J.-P. (2014). Hiding in the mobile crowd: Location privacy through collaboration. IEEE Transactions on Dependable and Secure Computing, 11, 266–279.

    Article  Google Scholar 

  20. Abowd, G. D., Atkeson, C. G., Hong, J., Long, S., Kooper, R., & Pinkerton, M. (1997). Cyberguide: A mobile context aware tour guide. Wireless Networks, 3(5), 421–433.

    Article  Google Scholar 

  21. Takeuchi, Y., & Sugimoto, M. (2006). CityVoyager: An outdoor recommendation system based on user location history (pp. 625–636). Berlin: Springer.

    Google Scholar 

  22. Park, M.-H., Hong, J.-H., & Cho, S.-B. (2007). Location-based recommendation system using Bayesian users preference model in mobile devices. In International conference on ubiquitous intelligence and computing. Springer, pp. 1130–1139.

  23. Horozov, T., Narasimhan, N., & Vasudevan, V. (2006). Using location for personalized poi recommendations in mobile environments. In Proceedings of the international symposium on applications on internet, SAINT’06, IEEE Computer Society, Washington, DC, USA, pp. 124–129.

  24. Zheng, Y., Zhang, L., Xie, X., & Ma, W.-Y. (2009). Mining interesting locations and travel sequences from GPS trajectories. In Proceedings of the 18th international conference on world wide web, WWW’09, ACM, New York, NY, USA, pp. 791–800. https://doi.org/10.1145/1526709.1526816.

  25. Li, Q., Zheng, Y., Xie, X., Chen, Y., Liu, W., & Ma, W.-Y. (2008). Mining user similarity based on location history. In Proceedings of the 16th ACM SIGSPATIAL international conference on advances in geographic information systems, GIS’08, ACM, New York, NY, USA, pp. 34:1–34:10.

  26. Giannotti, F., Nanni, M., Pinelli, F., & Pedreschi, D. (2007). Trajectory pattern mining. In Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, KDD’07, ACM, New York, NY, USA, pp. 330–339.

  27. Lara, O. D., Pérez, A. J., Labrador, M. A., & Posada, J. D. (2012). Centinela: A human activity recognition system based on acceleration and vital sign data. Pervasive and Mobile Computing, 8(5), 717–729.

    Article  Google Scholar 

  28. Fox, D. (2007). Location-based activity recognition (pp. 51–51). Berlin: Springer.

    Google Scholar 

  29. Wyatt, D., Philipose, M., & Choudhury, T. (2005). Unsupervised activity recognition using automatically mined common sense. In Proceedings of the 20th national conference on artificial intelligence—Volume 1, AAAI’05, AAAI Press, pp. 21–27

  30. Zheng, V. W., Zheng, Y., Xie, X., & Yang, Q. (2010). Collaborative location and activity recommendations with GPS history data. In Proceedings of the 19th international conference on world wide web, WWW’10, ACM, New York, NY, USA, pp. 1029–1038.

  31. Kumar, A., Misra, M., & Sarje, A. K. (2008). A predicted region based cache replacement policy for location dependent data in mobile environment. 10th Inter-Research-Institute Student Semin Comput. Sci. IIIT Hyd., 7, 1–8.

    Google Scholar 

  32. Kumar, A., Misra, M., & Sarje, A. K. (2007). A weighted cache replacement policy for location dependent data in mobile environments. In SAC’07 Proceedings 2007 ACM Symposium Applied Computing, Seoul, Repub. Korea, vol. 7, pp. 920–924.

  33. Gupta, A. K., & Shanker, U. (2017). Modified predicted region based cache replacement policy for location dependent data in mobile environment. In Sixth international conference on smart computing and comminations, NIT Kurukshetra, India.

  34. Gupta, A. K., & Shanker, U. (2017). SPMC-CRP: A cache replacement policy for location dependent data in mobile environment. In Sixth international conference on smart computing and communications. NIT Kurukshetra, India, pp. 632–639.

  35. Zheng, B., Xu, J., Member, S., & Lee, D. L. (2002). Cache invalidation and replacement strategies for location-dependent data in mobile environments. IEEE Transactions on Computers, 51, 1141–1153.

    Article  MathSciNet  Google Scholar 

  36. Kumar, A., Misra, M., & Sarje, A. K. (2006). A new cost function based cache replacement policy for location dependent data in mobile environment. In 5th annual inter research institute student seminar computer science Indian Institute Technology Kanpur, vol. 5, pp. 1–8.

  37. Gupta, A. K., & Shanker, U. (2018). CELPB: A cache invalidation policy for location dependent data in mobile environment. In 22nd international database engineering applications symposium (IDEAS 2018), Calabria, Italy, June 18–20, 2018, pp. 302–306.

  38. Gupta, A. K., & Shanker, U. (2020). Study of fuzzy logic and particle swarm methods in map matching algorithm. SN Applied Sciences, 2, 608.

    Article  Google Scholar 

  39. Gupta, A. K. (2020). Spam mail filtering using data mining approach: A comparative performance analysis. In Handling priority inversion in time-constrained distributed databases, pp. 253–282.

  40. Lubbe, C., Brodt, A., Cipriani, N., Großmann, M., & Mitschang, B. (2011). DiSCO: A distributed semantic cache overlay for location-based services. In 2011 IEEE 12th international conference on mobile data management, Lulea, pp. 17–26.

  41. Gupta, A. K., & Shanker, U. (2017). SPMC-PRRP: A predicted region based cache replacement policy. In International conference on data and information sciences (ICDIS-2017), M.P, India.

  42. Niu, B., Li, Q., Zhu, X., Cao, G., & Li, H. (2015). Enhancing privacy through caching in location based services. In 2015 IEEE conference on computer communications (INFOCOM), IEEE, pp. 1017–1025.

  43. Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2018). ‘A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services’. Future Generation Computing Systems, 94, 40–50.

    Article  Google Scholar 

  44. Swaroop, Vishnu, & Shanker, Udai. (2011). Concept and management issues in mobile distributed real time database. International Journal of Recent Trends in Electrical and Electronics Engineering, 1(1), 31–42.

    Google Scholar 

  45. Swaroop, V., Gupta, G. K., & Shanker, U. (2011). Issues in mobile distributed real time databases: Performance & review. International Journal of Engineering Science and Technology (IJEST), 3(4), 3504–3517.

    Google Scholar 

  46. Gupta, A. K., Prakash, S. (2018). Secure communication in cluster-based ad hoc networks: A review. In: Lobiyal, D., Mansotra, V., Singh, U. (Eds.), Next-generation networks. Advances in intelligent systems and computing (Vol. 638). Springer, Singapore.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajay K. Gupta.

Ethics declarations

Conflict of interest

The corresponding author would like to declare there is no conflict of interest situation in preparing this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, A.K., Shanker, U. OMCPR: Optimal Mobility Aware Cache Data Pre-fetching and Replacement Policy Using Spatial K-Anonymity for LBS. Wireless Pers Commun 114, 949–973 (2020). https://doi.org/10.1007/s11277-020-07402-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07402-2

Keywords