Skip to main content
Log in

A privacy-enhancing model for location-based personalized recommendations

  • Published:
Distributed and Parallel Databases Aims and scope Submit manuscript

Abstract

To receive personalized recommendation, users of a location-based service (e.g., a Location-Based Social Network, LBSN) have to provide personal information and preferences to the location-based service. However, detailed personal information could be used to identify the users, and hence compromise user privacy. In this paper, we consider an untrusted third party recommendation service used by the location-based service that may attempt to identify the sender of a recommendation query from the query log or may publish the query log. To protect user identity, anonymization must be done “online” before a query reaches the recommendation service. This is different from the usual “offline” scenario where a trusted recommendation service will receive all unanonymized queries and the focus is to anonymize the collected query log. We propose the notion of online anonymity to formalize this online requirement. The challenge for providing online anonymity is dealing with unknown and dynamic location-based service users who can get online and offline at any time. We define this problem, discuss its implications and differences from the problems in the literature, and propose a solution. Our experimental study shows that it is feasible to achieve personalized recommendation while preserve user privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. http://www.choicestream.com/news/.

  2. http://www.anonymizer.com.

  3. http://www.openid.net.

  4. http://archive.ics.uci.edu/ml/.

References

  1. Adar, E.: User 4xxxxx9: Anonymizing query logs. In: Proceedings of the 16th International Conference on World Wide Web (WWW) (2007)

  2. Byun, J.W., Li, T., Bertino, E., Li, N., Sohn, Y.: Privacy-preserving incremental data dissemination. J. Comput. Secur. 17(1), 43–68 (2009)

    Google Scholar 

  3. Chow, C.Y., Mokbel, M.F.: Trajectory privacy in location-based services and data publication. SIGKDD Explor. Newsl. 13(1), 19–29 (2011)

    Article  Google Scholar 

  4. Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 15(2), 351–380 (2011)

    Article  Google Scholar 

  5. Danezis, G., Diaz, C.: A survey of anonymous communication channels. Tech. Rep. MSR-TR-2008-35, Microsoft Research (2008)

  6. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium (USENIX Security), pp. 21–21 (2004)

  7. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14:1–14:53 (2010)

    Article  Google Scholar 

  8. Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.J.: How to make personalized web browising simple, secure, and anonymous. In: Proceedings of the First International Conference on Financial Cryptography (FC), pp. 17–32 (1997)

  9. Goldreich, O.: Foundations of Cryptography: Basic Tools, vol. 1. Cambridge University Press, Cambridge (2001)

    Book  Google Scholar 

  10. Gunawardana, A., Shani, G.: A survey of accuracy evaluation metrics of recommendation tasks. J. Mach. Learn. Res. 10, 2935–2962 (2009)

    MATH  MathSciNet  Google Scholar 

  11. Hu, H., Xu, J., On, S.T., Du, J., Ng, J.K.Y.: Privacy-aware location data publishing. ACM Trans. Database Syst. 35(3), 18:1–18:42 (2010)

    Article  Google Scholar 

  12. Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the 8th ACM International Conference on Knowledge Discovery and Data Mining (KDD), pp. 279–288 (2002)

  13. Kobsa, A.: Privacy-enhanced personalization. Commun. ACM 50(8), 24–33 (2007)

    Article  Google Scholar 

  14. Kobsa, A., Schreck, J.: Privacy through pseudonymity in user-adaptive systems. ACM Trans. Internet Technol. 3(2), 149–183 (2003)

    Article  Google Scholar 

  15. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE), pp. 25- (2006)

  16. Li, D., Lv, Q., Xia, H., Shang, L., Lu, T., Gu, N.: Pistis: a privacy-preserving content recommender system for online social communities. In: Proceedings of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT), pp. 79–86 (2011)

  17. Liu, J., Xiong, L., Luo, J.: A privacy framework: Indistinguishable privacy. In: Proceedings of the Joint EDBT/ICDT 2013 Workshops (EDBT), pp. 131–136 (2013)

  18. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-Diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)

    Article  Google Scholar 

  19. Mascetti, S., Freni, D., Bettini, C., Wang, X.S., Jajodia, S.: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. 20(4), 541–566 (2011)

    Article  Google Scholar 

  20. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), pp. 763–774 (2006)

  21. Navarro-Arribas, G., Torra, V., Erola, A., Castellí-Roca, J.: User k-anonymity for privacy preserving data mining of query logs. Inf. Process. Manage. 48(3), 476–487 (2012)

    Article  Google Scholar 

  22. Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506–1519 (2012)

    Article  Google Scholar 

  23. Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66–92 (1998)

    Article  Google Scholar 

  24. Stenneth, L., Yu, P.S.: Mobile systems privacy: ’mobipriv’ a robust system for snapshot or continuous querying location based mobile systems. Trans. Data Priv. 5(1), 333–376 (2012)

    MathSciNet  Google Scholar 

  25. Sweeney, L.: k-Anonymity a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  26. Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. Proc. VLDB Endow. 1(1), 115–125 (2008)

    Article  Google Scholar 

  27. von Ahn, L., Bortz, A., Hopper, N.J.: k-anonymous message transmission. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pp. 122–130 (2003)

  28. Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the ACM international Conference on Management of Data (SIGMOD), pp. 229–240 (2006)

  29. Xu, Y., Wang, K., Fu, A.W.C., Yu, P.S.: Anonymizing transaction databases for publication. In: Proceedings of the 14th ACM International Conference on Knowledge Discovery and Data Mining (KDD), pp. 767–775 (2008)

  30. Xu, Y., Wang, K., Yang, G., Fu, A.W.: Online anonymity for personalized web services. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM), pp. 1497–1500 (2009)

  31. Xue, M., Papadimitriou, P., Raïssi, C., Kalnis, P., Pung, H.K.: Distributed privacy preserving data collection. In: Proceedings of the 16th International Conference on Database Systems for Advanced Applications (DASFAA), pp. 93–107 (2011)

  32. Zhong, S., Yang, Z., Wright, R.N.: Privacy-enhancing k-anonymization of customer data. In: Proceedings of the 24th ACM Symposium on Principles of Database Systems (PODS), pp. 139–147 (2005)

Download references

Acknowledgments

Dr. Jin Huang is supported by the National Natural Science Foundation of China (Grant No. 61370229), the National Key Technology R&D Program of China (Grant No. 2013BAH72B01), and the Science-Technology Project of DEGP (Grant No.2012KJCX0037). A/Prof. Yabo Xu is supported by the National Natural Science Foundation of China (Grant No. 61100003). Prof. Jian Chen is supported by the National Natural Science Foundation of China (Grant No. 61272065), the Natural Science Foundation of Guangdong Province, China (Grant No. S2012010009311), and the Fundamental Research Funds for the Central Universities, SCUT (Grant No. 2012ZZ0088).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yabo Xu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, J., Qi, J., Xu, Y. et al. A privacy-enhancing model for location-based personalized recommendations. Distrib Parallel Databases 33, 253–276 (2015). https://doi.org/10.1007/s10619-014-7148-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10619-014-7148-8

Keywords

Navigation