Ef cient Processing of Location-Cloaked Queries Patricio Galdames 1 Ying Cai 2 Department of Computer Science Iowa State University Ames, IA 50011, USA 1 patricio@iastate.edu 2 yingcai@iastate.edu Abstract—When requesting location-based services, users can associate their queries with a purposely blurred location such as a circular or rectangular geographic region instead of their exact position. This strategy makes it possible for privacy protection, but presents problems in query processing. Since the server does not know a user’s exact position, it has to retrieve query results for each position inside the user’s cloaking region. While the server workload dramatically increases, a client downloading all query results will waste its battery power, because most of the data may be irrelevant to its query interest. This paper considers the problems of efcient processing of location-cloaked queries (LCQs). Our key observation is that queries may overlap in their cloaking regions and thus share some query results. In light of this, we propose to pro- cess queries as a batch instead of one by one independently. The technical contributions of this paper are threefold. 1) We propose to decompose queries into subqueries based on their interested region. Since the subqueries with a common region need to be processed only once, the server workload is minimized. 2) We propose a novel scheduling technique that addresses the dilemma between minimizing server latency and ensuring good fairness in query processing. 3) We present a personalized air indexing technique by which a client can lter out and download only the needed query results, thus avoiding the waste of energy in downloading irrelevant data. Index Terms—Location cloaking, query processing, scheduling, air indexing. I. I NTRODUCTION The most visible technology advance in the last decade is arguably the populous uses of cellular phones. Today’s cellular phones are no longer just for phone calls, but also for the Internet access. An important application here is location-based services (LBS), which provide information to users based on their current location. Examples of such information can be the nearest gas station, hotel, and so on. To request an LBS, users need to disclose their loca- tion to service providers. Yet the providers may not be trustworthy in keeping the data in condential. For self- protection, a user may choose a pseudonym in service uses. But simply using a pseudonym is not sufcient for privacy protection because the location data itself may reveal a subject. To address this problem, a number of location cloaking techniques have been developed. The key idea is to reduce location resolution to achieve a desired level of protection. When requesting a service, users report a cloaking region instead of their exact position. A cloaking region needs to contain a user’s current position and satisfy other constraints, depending on the types of privacy concern. For example, the techniques in ([1], [2], [3], [4], [5], [6], etc.) require a cloaking region to contain at least K users. This constraint is there to support anonymous uses of LBS. An adversary will not know who requests the service even if he manages to identify all these users by matching the cloaking region with restricted spaces such as houses and ofces or having a direction observation over the cloaking region. In contrast, the techniques in ([7], [8]) ensure that each cloaking region has been visited by at least K different users. Since these users visit the region at different times, it prevents an adversary from identifying the user who was inside the region at the service request time, thus protecting a user’s location privacy from the time dimension. Reducing location resolution reduces privacy risks, but introduces problems in query processing. Instead of a precise location, a query is now associated with a cloaking region. We will refer to such a query as a location- cloaked query (LCQ). A user submitting an LCQ could be anywhere inside the query’s cloaking region. To guarantee that the user receives the required information, the server needs to retrieve the query results for each position in the cloaking region. This workload is many times more when compared to handling a query that is associated with a precise location. In addition to more server workload in terms of CPU and disk I/O costs, the server needs to transmit all query results. A client downloading these results will waste its battery power because most of this data can be useless. This is especially problematic to users 2012 Proceedings IEEE INFOCOM 978-1-4673-0775-8/12/$31.00 ©2012 IEEE 2480