TY - JOUR AU - Hasan, Milu Md Khaled AB - 1. Introduction Various applications and services utilizing mobile devices have emerged alongside the continuous advancement of mobile networks. Location-based services (LBS) have gained particularly significant traction. Although LBS offer convenience, they also tend to result in users inadvertently leaving extensive location and trajectory data on service platforms. This data, if analyzed and combined with additional background knowledge by malicious third parties, can severely compromise users’ privacy. For instance, attackers might deduce a user’s health conditions by analyzing queries made near medical facilities. Researchers have developed several methods to mitigate the privacy risks associated with LBS, including location confusion, trajectory offset, dummy information, and k-anonymity. However, these methods generally adhere to a rigid “all-or-nothing” privacy standard, offering either complete and uniform privacy protection or none at all. This fails to meet users’ demands for personalized and multi-level privacy protection. Data cannot be restored to its original state after it has been anonymized, rendering it less useful for a variety of user requirements. Existing privacy protection methods are predominantly single-layered and coarse-grained, providing a uniform level of privacy that fails to support personalized or multi-level protection. Moreover, these methods are typically unidirectional and irreversible. Dummy data cannot be removed once it is integrated into the dataset, leading to a permanent reduction in data quality and decreased utilization efficiency. While some methods do offer reversible privacy protection, their excessively complex data encryption processes and anonymity algorithms can significantly impede data processing. To address these issues, this paper proposes a bidirectional, multi-layer reversible location privacy protection method based on attribute encryption. This method provides layered, bidirectional, and fine-grained privacy safeguards. Multi-level privacy protection for location data is achieved through a hierarchical privacy scheme that incorporates varying levels of dummy information. It utilizes ciphertexts of dummy information identifiers to control the degree of de-anonymization based on users’ individual trust levels, enabling reversible transformations between data anonymization and de-anonymization. Furthermore, the method uses an attribute-based encryption access control system to manage resources and streamline key generation and distribution, further enhancing the granularity of privacy protection. The proposed method is applicable three distinct scenarios: when users with varying trust levels access the same data resources, when user identity must remain unknown for granting permissions, or when anonymized data needs to be restored. Thus, users with different trust levels can obtain data with varying degrees of precision from the same anonymized dataset. Even without prior knowledge of a user’s identity, access control authorization is necessary. Importantly, this ensures that data anonymization does not lead to a permanent degradation of data quality, allowing for the restoration of anonymous data to its original state. The main contributions of this work can be summarized as follows: Firstly, a multi-level location privacy protection method is proposed that addresses the limitations of “all-or-nothing” privacy standards. It includes multiple privacy levels, incorporating varying levels of dummy information and generating a series of dummy information identifiers for multi-level protection of private location data. This method enhances privacy protection effectiveness by constructing a position adjacency table and selecting random location points via a hash function. Dummy information identifiers are encrypted using an access structure tree, which controls the degree of de-anonymization based on users’ trust levels, thus balancing privacy protection with data utilization efficiency. Secondly, a novel bidirectional method is introduced that resolves the issue of irreversible data loss. An access policy is defined using an attribute encryption access control mechanism, incorporating an access structure tree, where user attributes are employed as encryption parameters. A trusted third party authenticates user attributes and generates decryption keys for the ciphertext of the identifier files, enabling privileged users to perform de-anonymization operations. This allows for reversible transformations between data anonymization and de-anonymization, streamlines resource control, and reduces complexities associated with key generation and distribution, thus achieving fine-grained privacy protection. Thirdly, experiments conducted on real datasets confirm the feasibility and effectiveness of the proposed method. By comparison against existing methods, it is shown to offer more efficiently safeguard user location and trajectory data while ensuring bidirectional, multi-level, and multi-granular privacy protection. The rest of paper is as follows: section 2 introduces the related work, section 3 systematically introduces the research contents and methods, and the safety is analyzed in section 4. The experiment and result analysis are shown in section 5. The section 6 summarizes the research contents of the paper and puts forward the next research direction. 2. Related work LBS provide remarkable convenience in users’ daily lives but also pose significant risks due to the potential leakage of private locations and movement trajectories. Researchers have developed various privacy protection methods to address these concerns, such as confusion techniques, location offsets, and dummy information. Among these, the k-anonymity method is known to effectively balance data availability and privacy security, while the differential privacy protection method is noted for its strict data model; both have become important topics of research in this field. Other methods, like query semantic analysis, have been found to undermine anonymity. For instance, Yang et al. [1] proposed a dual privacy protection scheme based on a multi-anonymous architecture. This method encrypts queries via the Shamir mechanism and enhances privacy by replacing sensitive semantic locations with anonymous sets that reflect user diversity. However, the encryption and decryption of query content can create excessive response times and diminish quality of service. Wang et al. [2] proposed an L-clustering algorithm based on differential privacy protection, which clusters users’ locations based on duration of stay, frequency, and sensitivity while incorporating Laplacian noise for privacy protection. However, this method’s consumption of privacy budget parameters is burdensome. Xing et al. [3] developed a distributed k-anonymous location scheme that forms anonymized groups based on users’ interests and social behaviors, reducing the risk of attacks leveraging background knowledge. These methods often rely on a central trusted server for data anonymization, however, which raises concerns about potential data breaches. This underscores the demand for more innovative, distributed privacy protection approaches. The decentralization aspect of blockchain technology offers novel solutions for privacy protection. Zhang et al. [4] suggested a method based on the (t, n) threshold scheme and smart contracts, encrypting and distributing user queries via a private blockchain and the Shamir algorithm to prevent collusion attacks. This method also incentivizes timely submission of anonymous queries through smart contracts. Although this approach integrates blockchain technology, it falls short of achieving a fully decentralized LBS. In addressing the risk of privacy breaches by untrusted collaborators and the leakage of semantic location information, Yang et al. [5] introduced a mechanism that combines blockchain with a user-related semantic location model. It leverages public chains for issuing privacy requests and private chains for selecting anonymous locations, using smart contracts to enhance the security of the collected semantic information. However, this method lack clarity in the implementation of private chains and smart contracts, which may hinder its practical application. Additionally, Zhu et al. [6] proposed a blockchain-based scheme for privacy-preserving location-sharing, in which precise locations are converted into broader areas; sharing details are varied based on the trust level of the requester with a Merkle tree for data segmentation. Shen et al. [7] proposed combining blockchain and machine learning technologies to securely store transaction and trust data, thereby protecting against malicious tampering and addressing other significant privacy concerns associated with the Internet of Vehicles. Despite their utility in some regards, the prevailing privacy protection methods generally adhere to a rigid “all-or-nothing” standard whereby they either provide complete and uniform privacy protection or none at all. This fails to address users’ needs for personalized and multi-level privacy options. Moreover, these systems do not allow user location data to be reverted to its original form once it has been anonymized, leading to irreversible loss of data quality and negatively impacting data utilization efficiency. Li et al. [8–10] proposed a reversible location anonymity method designed to restore location data for mobile device users. Their method employs a spatiotemporal anonymity model to reversibly alter location data, achieving high spatial resolution and commendable success rates. However, the complexity of the data encryption process and the choice of anonymity algorithms compromise data processing efficiency. The method continuously reconstructs links from previously selected ones during the anonymization process, adjusting selections based on current conditions and thus, unfortunately, creating excessive temporal complexity. On the one hand, it requires lengthy anonymization runtimes, while constructing conflict-free links in real-time. And on the other, it demands significant memory space foe storing conflict-free links, similarly failing to meet users’ requirements for real-time and efficient privacy protection. Buccafurri et al. [11] introduced a hierarchical location-based trusted service scheme based on the edge cloud paradigm, which distributes user information among hierarchical regions managed by different autonomous organizations. Lower-level services manage exact location data, whereas higher-level services manage only aggregated data, which addresses the potential privacy leaks caused by centralized service failures. Though these methods secure user location data in LBS, they do not offer multi-granularity privacy protection tailored to actual user needs nor do they support reversible or fine-grained safeguarding. Moreover, after anonymizing the data, it cannot be restored to the original state, which will seriously affect the efficiency of data. Other relevant privacy protection methods are summarized in Table 1. Download: PPT PowerPoint slide PNG larger image TIFF original image Table 1. Summary of relevant privacy protection methods. https://doi.org/10.1371/journal.pone.0309990.t001 As discussed above, the irreversible data anonymization process severely impairs data efficiency. The current research primarily centers on anonymization, neglecting the potential for data de-anonymization, though it is crucial in practical analysis applications where de-anonymization is crucial to fully harness the value of such data. To address these shortcomings, this paper proposes a bidirectional, multi-layer reversible location privacy protection method based on attribute encryption. This method not only supports bidirectional operations but also offers multi-layered and fine-grained, personalized privacy safeguards, catering to diverse user demands and facilitating data reversibility in multi-user and multi-demand scenarios. Important distinctions between the proposed method and existing methods are twofold: firstly, it facilitates bidirectional, reversible processing of private location data by incorporating dummy information at varying strengths across different levels. This not only provides anonymized privacy protection but also allows for the refinement of de-anonymized data. It establishes multi-level privacy protection tailored to users’ needs, enabling those with different permissions to access data at different levels of anonymity and precision. Secondly, the proposed method enhances resource control through an attribute encryption access control system. This system manages the encryption of de-anonymized identifier files and the generation and distribution of attribute keys, achieving reversible and robust privacy protection effects. 3. Research methodology To achieve bidirectional, reversible, and multi-level privacy protection for mobile users’ location and trajectory data, the proposed method integrates a variety of techniques including privacy protection, data encryption, access control, and attribute encryption. The data owner first establishes privacy protection levels and incrementally adds dummy information, generating corresponding identifier files for each level. These files catalog all dummy information incorporated at that particular level. The data owner crafts an access policy for each identifier, creates an attribute access structure tree, and uses this tree as a parameter to encrypt the identifier files, producing identifier-file ciphertexts. The data owner then transmits the final anonymized dataset along with these ciphertexts to the data service center and sends the access structure tree to a trusted third party. A privileged user, whose attributes satisfy the access criteria attached to the access structure tree, can request a decryption key from the trusted third party. Upon obtaining this key, the user is able to decrypt the relevant dummy information identifier file, carry out the de-anonymization process, and access a more precise dataset at the desired level of privacy protection. 3.1 Workflow In the paper, we propose a method to achieve hierarchical privacy protection by adding dummy information layer by layer, generate and manage keys by using access control technology based on attribute encryption, and de-anonymize anonymous data sets by identifying files with dummy information, which can achieve bidirectional, reversible, multilevel and fine-grained protection of user location privacy data. The whole process includes the following seven steps: adding dummy information, generating dummy information identification files, setting access control policies, publishing anonymous data sets, encrypting identification files, generating attribute keys, and accessing data by users. The specific workflow is shown in Fig 1. Download: PPT PowerPoint slide PNG larger image TIFF original image Fig 1. Workflow of bidirectional multi-layer anonymity processing model. https://doi.org/10.1371/journal.pone.0309990.g001 Adding dummy information. According to privacy protection requirements, the anonymity data is divided into N different levels, it is represented as L0,L1,L2,L3,…,LN-1, which satisfies the condition L0>n>>e; 5 a = new ENode*[n]; 6 for (i = 0;i>u>>v; 10 t = new ENode; 11 t->adjVex = v; 12 t->nextArc = a[u]; 13 a[u] = t; 14 t = new ENode; 15 t->adjVex = u; 16 t->nextArc = a[v]; 17 a[v] = t;} 18 for (i = 0;i”<adjVex; 23 t = t->nextArc;} 24 end;} 25 return PL 3.3 Building anonymous datasets with multiple levels Based on the location adjacency table, to construct anonymous data sets. During anonymous processing, each anonymous request contains a profile identifying the user’s privacy protection requirements, which contains relevant parameters for privacy protection, denoted as (L,k,t,d), where L represents the number of levels of anonymity protection, i.e. anonymity processing is divided into several protection levels. k represents the anonymity parameter, which specifies the number of other users contained in the current level of anonymity. t denotes a time threshold that specifies the maximum tolerated time for anonymous processing, d denotes the spatial threshold which specifies the range of maximum acceptable anonymous space. In the multilevel location privacy protection model, according to the privacy protection requirements and anonymity level, the anonymity level is divided into N levels, specifically expressed as L0,L1,L2,L3,…,LN-1, and the anonymity parameter corresponding to the anonymity level Li is: (3) Where 1≤i≤N, L0 only contains real location information, and k1 is the anonymous parameter corresponding to L1. The anonymity degree satisfies L0>n>>e; 5 a = new ENode*[n]; 6 for (i = 0;i>u>>v; 10 t = new ENode; 11 t->adjVex = v; 12 t->nextArc = a[u]; 13 a[u] = t; 14 t = new ENode; 15 t->adjVex = u; 16 t->nextArc = a[v]; 17 a[v] = t;} 18 for (i = 0;i”<adjVex; 23 t = t->nextArc;} 24 end;} 25 return PL 3.3 Building anonymous datasets with multiple levels Based on the location adjacency table, to construct anonymous data sets. During anonymous processing, each anonymous request contains a profile identifying the user’s privacy protection requirements, which contains relevant parameters for privacy protection, denoted as (L,k,t,d), where L represents the number of levels of anonymity protection, i.e. anonymity processing is divided into several protection levels. k represents the anonymity parameter, which specifies the number of other users contained in the current level of anonymity. t denotes a time threshold that specifies the maximum tolerated time for anonymous processing, d denotes the spatial threshold which specifies the range of maximum acceptable anonymous space. In the multilevel location privacy protection model, according to the privacy protection requirements and anonymity level, the anonymity level is divided into N levels, specifically expressed as L0,L1,L2,L3,…,LN-1, and the anonymity parameter corresponding to the anonymity level Li is: (3) Where 1≤i≤N, L0 only contains real location information, and k1 is the anonymous parameter corresponding to L1. The anonymity degree satisfies L0