Professional Documents
Culture Documents
Location Privacy in Processing Location Dependent
Location Privacy in Processing Location Dependent
I. INTRODUCTION
Wired links
• Mobile hosts
f
Fixed hosts
« ,)
Base station
/--,
\ I Wireless cell
Database
server
Database
182
A. Query Processing Architecture
Mobile As a query processing point of view, there are three layers
User in a mobile database system: the application layer, the
middleware layer and the database layer (Fig. 2) [10]. The
Application
application layer accepts user queries. The middleware layer is
Layer the core of the mobile database system. Queries are processed
by the middleware and transmitted to the middleware of other
MHs in the network. The middleware of a MH sends queries to
the local database system for execution. After the database
fInishes executing a query, the results are transmitted to the
Middleware
application layer and then returned to the user. The
Layer middleware layer which is transparent to users is divided into
three sub-layers: the query layer, the cache layer and the
network layer.
The query layer parses the syntax of user queries and
determines the query types. If it is a local query, the answer is
Database produced using local database. If not, fIrst it searches the local
Layer
cache. If the entire result is found, the query ends. Otherwise, it
Figure 2. Architecture of query processing in a mobile database system searches the results from remote nodes. For join queries, the
(adapted from [10]). query layer evaluates the query cost and generates some
distributed query plans. In such situations, the network layer is
responsible for the communications in the system. The cache
III. QUERY PROCESSING IN MOBILE DATABASE SYSTEMS
layer stores data accessed frequently by non-local queries. This
Special characteristics of mobile computing and mobile decreases the query response time and improves the data
database systems differentiate mobile query processing from accessibility when node disconnection occurs [10].
traditional distributed one. The query processing in a mobile
environment involves join processing among different sites IV. LOCATION PRIVACY
which include static and mobile stations [23]. In many cases, Mobile database system is a suitable platform for providing
performing several joins across the relations residing in Location based services (LBS). Privacy protection is an
multiple mobile units, leads to complex situations [24]. important issue in this context. Revealing location information
In conventional distributed database systems, the site at raises privacy concerns. Moreover, as a user becomes more
which a query is issued is also the site to which the result is dependent on such systems, they become more knowledgeable
sent. However, in a mobile system these two sites are often about herlhis movements and habits. This information can be
different due to the user's mobility. The longer the query takes put to a variety of unpleasant uses such as targeted spams [28].
to be processed, the more likely the MU moves to a new Broadcasting is a very appropriate way for mobile users in this
location [25]. Also approximate answers are more acceptable context; because they do not need to issue queries or
in mobile databases than in traditional databases due to the communicate their locations [11]. But this strategy is not
frequent disconnection and long-time transaction executions proper for many cases. Recent research efforts have been
[26]. Traditional query processing techniques based on global dedicated to deal with this challenge. Existing solutions can be
data schema and collected statistics are no more adequate [8]. divided into two general approaches:
In general, two types of queries can be distinguished in a
mobile environment: Non-Location Related queries (NLRQ) A. Utilizing a Trusted Third Party
and Location Related queries (LRQ). In fact, a NLRQ is a In this approach, a trusted third party (usually called
traditional query whose answer does not depend on locations location anonymizer) is located between the users and the
and none of the predicates and attributes used in it are location service provider. All users subscribe to it and specify their own
related [27]. Example: "Retrieve the names of the servants of a desired level of privacy through a user-specifIed privacy
Hotel". Contrary to NLRQs, LRQs have at least one location profIle. Users send their queries to servers via anonymizer [29,
related predicate or attribute. 30]. Its main function is to blur a user's exact location using
There are two categories of LRQs. The fIrst one is Location either spatial or temporal cloaking [31].
Aware queries (LAQ) which has an explicit indication of This is usually achieved by a technique which is called k-
location. For example: "Select the names of hotels in Tehran". anonymity [32]. In this model, the exact location of the user is
The second one is Location Dependant queries (LDQ). The cloaked into an area that contains at least k users. Fig. 3
location value in these queries is not explicitly known when the illustrates this technique.
query is asked. Their answers are dependent to MU's location; This approach has several drawbacks. For example the
i.e. the mobility affects their processing. For example, "Find anonymizer becomes a bottleneck and also it is a single point
the hotels within 5 km of here" or "Find me the nearest hotel". of attack [29, 33]
In order to provide the answer to the query, fIrst we have to
know the location of the query issuer. When we fInd out the B. No Trusted Third Party
issuer's location (Location Binding), the query becomes Users manage their own privacy by some tricks such as: (a)
location-aware [27]. False dummies [34]. For each location based query, the user
183
towards context-aware data management, sensor networks,
continuous queries and web-based services [13].
There are some commercial products proposing database
solutions for mobile environments [20]. Some of them are:
FastObjects (Versant Co., object-oriented DB, Java platform,
ACID nested and parallel transactions, single offline
application, [38]); Oracle Database Lite (Oracle Corporation,
relational DB, ACID transactions, offline applications, [39]);
Anonymizer
DB2 Everyplace (IBM, relational DB, flat transactions, offline
1,2= Query (MyLocation= Point P) Protocol: applications, [40]); WebSphere Everyplace Access (IBM,
3= Query (MyLocation= Area A) K-Anonymity online web application access, [41]); PointBase (DataMirror
K=4
4,5,6= Result Co., relational DB, Java platform, flat transactions in micro
Figure 3. Location privacy with k-anonymity. version, distributed transactions in the embedded version,
single offline application, [42]).
sends n different locations to the server which only one of them B. Query Processing in Mobile Database Systems
is true and the rest are dummies. The server sends an answer
Several research efforts have been dedicated to query
set for all of them and can not distinguish the real one. (b)
processing issues in mobile databases. The paper [26]
False location (Landmark objects) [35]. Sending the location
introduces query optimization and transaction models related
of a nearby certain landmark or a significant object instead of
to mobile database systems. [43] combines the problem of
the exact location.
location management and query processing. It discusses
several strategies for efficient processing of queries to obtain
The first approach needs a trusted third party which users
the location or activeness of an MU. the authors in [24]
really trust it and also subscribe to it. Moreover, becoming a
proposed several query processing schemes that are able to
bottleneck and also a single point of attack are disadvantages of
divide the query processing into several sub-query processing
this approach. The second one is very easy but increases
modules, appropriate to the network topology. In [23] and [4],
processing overhead in mobile units. In false location
various challenging issues in querying in a mobile distributed
technique, mobile users should have information about nearby
environment are presented. Papers such as [6, 23] discussed
certain landmarks or a comprehensive map. In some situations
about query processing strategies.
it may be unavailable.
Many researches are about location dependent queries. One
V. RELATED WORK of the most noticeable surveys in this subject is [11]. However
investigation about this subject started in 90's. [44] presented
A. Mobile Databases the concept of queries with location constraints. Location-
aware query processing technique has been studied in [45].
In recent years, there has been a remarkable surge of
Some of research efforts studied processing a specific type of
research in the area of data management in mobile computing.
query and introducing new methods and improving the
Work on mobile databases started in the early 90's [16]. The
performance such as [46].
topic of mobile database systems was introduced by Imielinski
and Badrinath in 1993 in [36] and also [37]. They categorize C. Privacy Protection in Location Based Services
research into the areas of mobility (e.g. locating users),
Recently some research efforts have been dedicated to deal
disconnection (e.g. handoff effect on transaction processing),
with getting anonymous services from location-based
new data access modes (e.g. wireless medium or power), and
applications such as [30, 31, 34]. Most existing approaches for
scale. Alonso and Korth [26] concentrate on the impact that
private location-dependent queries follow the anonymizer
mobile computing has on various database processing activities
approach. Location cloaking is one typical approach to
such as optimization, transaction models, and security.
protecting user location privacy in LBS [30, 31]. The paper
In 1995, Dunham and Helal [1] argued that data
[47] combines spatial with temporal cloaking. In [30], the
management in mobile computing environments is similar to
anonymizer maintains the locations of the clients using a
that of a distributed system and presented open challenges in
pyramid data structure, similar to a Quad-tree. [48] uses a P2P
mobile database systems. Sistla and others in [17] proposed a
system to support distributed anonymization; although a
mobile database architecture.
centralized anonymizer is not required, all users must trust each
One of the most noticeable mobile database surveys was in
other.
1999 by Barbar'a [2]. This paper surveys each distinctive
feature of mobile computing and how they impact the VI. CONCLUSIONS AND FURTHER WORK
implementation of databases for mobile computers. Barbar'a
Today, mobile devices are inseparable part of everyday life.
indicates several open research areas in mobile database
Emergence of the mobile computing paradigm helped people to
systems: prototyping, effective bandwidth utilization,
work in a much more convenient and efficient way, anywhere
transactional properties, optimization of location dependent
and anytime. The field of data management is also extended
query processing, and data visualization.
with such new services and applications. Mobile database
At the turn of the century the focus of mobile data
system is a special heterogonous multidatabase system that
management research has shifted from human interaction and
supports mobile computing. In this paper, we presented some
distributed activities in mobile computing environments
184
preliminaries on mobile computing and mobile database
[16] L. Gruenwald and F. Olken, "Mobile database research: What is to be
system and its architecture. done?," Proc. of the 1st Workshop on Research Directions in
There are several demands and challenges in mobile Situational-Aware Self-managed Proactive Computing in Wireless
database query processing that should be considered. One of Adhoc Networks,2009.
the most important types of queries in mobile environments is [17] P. Sistla, O. Wolfson, S. Chamberlain, and S. Dao, "Modeling and
location dependant query. Its answer is dependent to the querying moving objects," Proc. of the 13th Int. Conf. on Data
Engineering (ICDE 97),IEEE Press,1997,pp. 422-432.
mobile user's location. However, revealing location information
[18] R. Malladi and K. C. Davis, "Applying multiple query optimization in
raises privacy concerns. There are some techniques to deal with
mobile databases," Proc. of the 36th Annual Hawaii Int. Conf. on System
this challenge. One approach is that each mobile unit handles Sciences (HICSS 03),vol. 9,IEEE Press,2003,pp. 294.2.
this problem itself by some available tricks. Another approach
[19] X. Gao and A. R. Hurson, "Location dependent query proxy," Proc. of
is to use a trusted third party. One of the most noticeable the ACM Symp. on Applied Computing (SAC 05), 2005, pp. 1120-
techniques in this context is k-anonymity. Each of these 1124.
approaches has advantages and disadvantages. Privacy [20] P. S. Alvarado, C. Ronancio, and M. Adiba, "A survey of mobile
concerns in processing location dependant queries are still transaction," Distributed and Parallel Databases, vol. 16, pp. 193-230,
open area of research; due to lack of efficient algorithms. 2004.
Comparing the efficiency of different approaches via simulation [21] Y. Luo and O. Wolfson, "Mobile P2P databases," in Encyclopedia of
GIS,S. Shekhar and H. Xiong,Eds. Springer,2008,pp. 671-677.
models can be very helpful.
[22] A. Bouguettaya, "On the construction of mobile database management
systems," Proc. of the 1st Australian Workshop on Mobile Computing &
REFERENCES
Databases & Applications (MCDA 96),1996.
[1] M. H. Dunham and A. Helal, "Mobile computing and databases: [23] W. C. Peng and M. S. Chen, "Query processing in a mobile computing
anything new?," SIGMOD Record,vol. 24,no. 4,pp. 5-9,1995.
environment: Exploiting the features of asymmetry," IEEE Trans. on
[2] D. Barbara, "Mobile computing and databases - a survey," IEEE Trans. Knowledge and Data Engineering,vol. 17,no. 7,pp. 982-996, 2005.
on Knowledge and Data Engineering,vol. 11,no. I, pp. 108-117,1999. [24] C. H. Lee and M. S. Chen, "Using remote joins for the processing of
[3] G. H. Forman and J. Zahorjan, "The challenges of mobile computing," distributed mobile queries," Proc. of the 7th Int. Conf. Database Systems
IEEE Computer,vol. 27,no. 4,pp. 38-47,1994. for Advanced Applications (DASFAA 01), IEEE Press, 2001, pp. 226-
[4] N. Marsit, A. Hameurlain, Z. Mammeri, and F. Morvan, "Query 233.
processing in mobile environments: A survey and open problems," Proc. [25] C. Lee and C. H. Ke, "A prediction-based query processing strategy in
of the 1st Int. Conf. on Distributed Frameworks for Multimedia mobile commerce systems," Database Management, vol. 12, no. 3, pp.
Applications (DFMA 05),IEEE Press,2005,pp. 150-157. 14-26,2001.
[5] F. Pinelli, A. Monreale, R. Trasarti, and F. Giannotti, "Location [26] R. Alonso and H. F. Korth, "Database system issues in nomadic
prediction within the mobility data analysis environment DAEDALUS," computing," Proc. of ACM SIGMOD Int. Conf. on Management of
Proc. of the 5th Int. Conf. on Mobile and Ubiquitous Systems: Data,1993,pp. 388-392.
Computing, Networking, and Services (MobiQuitous 08), ICST Press,
[27] A. Y. Seydim, M. H. Dunham, and V. Kumar, "Location dependent
2008.
query processing," Proc. of the 2nd ACM Int. Workshop on Data
[6] A. B. Waluyo, B. Srinivasan, and D. Taniar, "Mobile query and Engineering for Wireless and Mobile Access (MobiDE 01),ACM Press,
processing in mobile database environment," Proc. of the 1st Int. Conf. 2001,pp. 47-53.
on Advances in Mobile Multimedia (MoMM 03), vol. 171, Austrian
[28] M. Satyanarayanan, "Pervasive computing: Vision and challenges,"
Computer Society Press,2003,pp. 55-64. IEEE Personal Communications,vol. 8,no. 4,pp. 10-17,2001.
[7] M. Satyanarayanan, "Mobile computing," Computer, vol. 26, no. 9, [29] G. Ghinita, P. Kalnis, and S. Skiadopoulos, "MobiHide: A Mobilea
pp. 81-82,1993. peer-to-peer system for anonymous location-based queries," Proc. of the
[8] H. Grine, T. Delot, and S. Lecomte, "Adaptive query processing in lOth Int. Symp. on Advances in Spatial and Temporal Databases (SSTD
mobile environment," Proc. of the 3cd Int. Workshop on Middleware for 07),2007,pp. 221-238.
Pervasive and Ad-hoc Computing (MPAC 05), vol. 115, ACM Press,
[30] C. Y. Chow and W. G. Aref, "Casper*: Query processing for location
2005,pp. 1-8.
services without compromising privacy," ACM Trans. on Database
[9] Y. D. Chung,"A cache invalidation scheme for continuous partial match Systems (TODS),vol. 34,no. 4,2009.
queries in mobile computing environments," Distributed and Parallel
[31] M. Gruteser and D. Grunwald, "Anonymous usage of location-based
Databases,vol. 23,no. 3,pp. 207-234,2008.
services through spatial and temporal cloaking," Proc. of the Int.
[10] J. Li,Y. Li,M. T. Thai,and J. Li,"Data caching and query processing in Conf. on Mobile Systems, Applications, and Services (MobiSys 03),
MANETs," Pervasive Computing and Communications, vol. 1, no. 3, ACM Press,2003,pp. 31-42.
pp. 169-178,2005.
[32] L. Sweene, "k-Anonymity: A model for protecting privacy,"
[11] S. lIar, E. Mena, and A. Illarramendi, "Location-dependent query Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5,
processing: Where we are and where we are heading," ACM Computing pp. 557-570,2002.
Surveys,vol. 42,no. 3,pp. 1-73,2010.
[33] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan,
[12] H. Artail, M. Shihab, and H. Safa, "A distributed mobile database "Private queries in location based services: Anonymizers are not
implementation on pocket PC mobile devices communicating over necessary," Proc. of the ACM SIGMOD Int. Conf. on Management
Bluetooth," Network and Computer Applications, vol. 32, pp. 96-115, of Data,2008,pp. 121-132.
2009.
[34] H. Kido, Y. Yanagisawa,and T. Satoh,"An anonymous communication
[13] A. Zaslavsky, P. K. Chrysanthis, and V. Kumar,"Mobility in databases technique using dummies for location-based services," Proc. of IEEE
and distributed systems: Summing up achievements of the past decade," Int. Conf. on Pervasive Services (ICPS 05),2005,pp. 88-97.
Mobile Networks and Applications,vol. 9,no. 5,pp. 455-457,2004.
[35] J. I. Hong and J. A. Landay, "An architecture for privacy-sensitive
[14] V. Kumar, Mobile Database Systems, NJ: John Wiley & Sons INC., ubiquitous computing," Proc. of the 2nd Int. Conf. on Mobile Systems,
2006. Applications, and Services (MobiSys 04), ACM Press, 2004, pp. 177-
[15] G. Bernard et al., "Mobile databases: a selection of open issues and 189.
research directions," ACM SIGMOD Record, vol. 33, no. 2, pp. 78-83, [36] T. Imielinski and B. R. Badrinath, "Data management for mobile
2004. computing," SIGMOD Record,vol. 22,no. I, pp. 34-39,1993.
185
[37] T. Imielinski and B. R. Badrinath, "Mobile wireless computing:
[44] T. Imielinski and B. R. Badrinath, "Querying in highly mobile
Challenges in data management," Communications of the ACM,vol.
distributed environments," Proc. of the 18th Int. Conf. on Very Large
37, no. 10,pp. 18-28,1994.
Data Bases (VLDB 92),1992,pp. 41-52.
[38] Versant Corporation, FastObjects, www.fastobjects.com. (Accessed in
[45] H. E. Kottkamp and O. Zukunft, "Location-aware query processing in
May 2010).
mobile database systems," Proc. of the ACM Symp. on Applied
[39] Oracle Corporation, Oracle Database Lite, Computing (SAC 98),1998,pp. 41�23.
www.oracle.comltechnology/products/lite/index.html. (Accessed in May
[46] Y. Iijima and Y. Ishikawa, "Finding probabilistic nearest neighbors for
2010).
query objects with imprecise locations," Proc. of the 10th Int. Conf.
[40] IBM Software Products, DB2 Everyplace, on
www-01.ibm.comlsoftware/dataldb2/everyplace, (Accessed in May Mobile Data Management: Systems, Services and Middleware (MDM
2010). 09),IEEE Press,2009,pp. 52-61.
[41] IBM Software Products, WebSphere Everyplace Access, www- [47] B. Gedik and L. Liu, "Location privacy in mobile systems: A
Ol.ibm.comlsoftware/pervasive/ws_everyplace_access, (Accessed in personalized anonymization model," Proc. of the 25 th IEEE Int. Conf. on
May 2010). Distributed Computing Systems (ICDCS 05),2005,pp. 620-629.
[42] PointBase Java Databases, www.pointbase.com. (Accessed in May [48] G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous
2010). location-based queries in distributed mobile systems," Proc. of the 16th
[43] M. Tsukamoto, R. Kadobayashi, and S. Nishio, "Strategies for query Int. Conf. on World Wide Web (WWW 07),ACM Press,2007,pp. 371-
processing in mobile computing," in Mobile Computing, T. Imielinski 380.
and H. F. Korth,Eds. Kluwer Academic,1996,pp. 595-620.
186