Agent-Based System for Efficient kNN Query Processing with Comprehensive Privacy Protection
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 1
Abstract
Recently, location based services (LBSs) have become increasingly popular due to advances in mobile devices and their positioning capabilities. In an LBS, the user sends a range of queries regarding his k-nearest neighbors (kNNs) that have common points of interests (POIs) based on his real geographic location. During the query sending, processing, and responding phases, private information may be collected by an attacker, either by tracking the real locations or by analyzing the sent queries. This compromises the privacy of the user and risks his/her safety in certain cases. Thus, the objective of this paper is to ensure comprehensive privacy protection, while also guaranteeing the efficiency of kNN query processing. Therefore, we propose an agent-based system for dealing with these issues. The system is managed by three software agents (selectorDL, fragmentorQ, and predictor). The selectorDL agent executes a Wise Dummy Selection Location (WDSL) algorithm to ensure the location privacy. The mission of the selectorDL agent is integrated with the mission of the fragmentorQ agent, which is to ensure the query privacy based on Left-Right Fragmentation (LRF) algorithm. To guarantee the efficiency of kNN processing, the predictor agent executes a prediction phase depending on a Cell Based Indexing (CBI) technique. Compared to similar privacy protection approaches, the proposed WDSL and LRF approaches showed higher resistance against location homogeneity attacks and query sampling attacks. In addition, the proposed CBI indexing technique obtains more accurate answers to kNN queries than the previous indexing techniques.
Authors and Affiliations
Mohamad Shady Alrahhal, Maher Khemakhem, Kamal Jambi
Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication
Wireless sensor networks allow attackers to inject false reports by compromising sensor nodes due to the use of wireless communication, the limited energy resources of the sensor nodes, and deployment in an open environm...
Predicting Return Donor and Analyzing Blood Donation Time Series using Data Mining Techniques
Since blood centers in most countries typically rely on volunteer donors to meet the hospitals' needs, donor retention is critical for blood banks. Identifying regular donors is critical for the advance planning of blood...
Mutual Exclusion Principle for Multithreaded Web Crawlers
This paper describes mutual exclusion principle for multithreaded web crawlers. The existing web crawlers use data structures to hold frontier set in local address space. This space could be used to run more crawler thre...
E-Participation Modeling and Developing with Trust for Decision Making Supplement Purpose
ICT has been employed in various areas, including e-Participation to support citizen participation and achieve democracy ideal. Trust as a social behavior can be used as a method to model preferences and facilitate...
Implementation of a Beowulf Cluster and Analysis of its Performance in Applications with Parallel Programming
In the Image Processing Research Laboratory (INTI-Lab) of the Universidad de Ciencias y Humanidades, the permission to use the embedded systems laboratory was obtained. INTI-Lab researchers will use this laboratory to do...