Proceedings ArticleDOI
Location Privacy in Mobile Systems: A Personalized Anonymization Model
Bugra Gedik,Ling Liu +1 more
- Vol. 1, pp 620-629
TLDR
A suite of scalable and yet efficient spatio-temporal cloaking algorithms, called CliqueCloak algorithms, are developed to provide high quality personalized location k-anonymity, aiming at avoiding or reducing known location privacy threats before forwarding requests to LBS provider(s).Abstract:
This paper describes a personalized k-anonymity model for protecting location privacy against various privacy threats through location information sharing. Our model has two unique features. First, we provide a unified privacy personalization framework to support location k-anonymity for a wide range of users with context-sensitive personalized privacy requirements. This framework enables each mobile node to specify the minimum level of anonymity it desires as well as the maximum temporal and spatial resolutions it is willing to tolerate when requesting for k-anonymity preserving location-based services (LBSs). Second, we devise an efficient message perturbation engine which runs by the location protection broker on a trusted server and performs location anonymization on mobile users' LBS request messages, such as identity removal and spatio-temporal cloaking of location information. We develop a suite of scalable and yet efficient spatio-temporal cloaking algorithms, called CliqueCloak algorithms, to provide high quality personalized location k-anonymity, aiming at avoiding or reducing known location privacy threats before forwarding requests to LBS provider(s). The effectiveness of our CliqueCloak algorithms is studied under various conditions using realistic location data synthetically generated using real road maps and traffic volume dataread more
Citations
More filters
Proceedings ArticleDOI
Geo-indistinguishability: differential privacy for location-based systems
TL;DR: In this article, the authors introduce geoind, a formal notion of privacy for location-based systems that protects the user's exact location, while allowing approximate information -typically needed to obtain a certain desired service -to be released.
Journal ArticleDOI
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Bugra Gedik,Ling Liu +1 more
TL;DR: A scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs is described, including the development of a personalized location anonymization model and a suite of location perturbation algorithms.
Proceedings ArticleDOI
Private queries in location based services: anonymizers are not necessary
TL;DR: This work proposes a novel framework to support private location-dependent queries, based on the theoretical work on Private Information Retrieval (PIR), which achieves stronger privacy for snapshots of user locations and is the first to provide provable privacy guarantees against correlation attacks.
Proceedings ArticleDOI
Secure kNN computation on encrypted databases
TL;DR: A new asymmetric scalar-product-preserving encryption (ASPE) that preserves a special type of scalar product and is shown to resist practical attacks of a different background knowledge level, at a different overhead cost.
Journal ArticleDOI
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
TL;DR: This work proposes transformations based on the well-established K-anonymity concept to compute exact answers for range and nearest neighbor search, without revealing the query source.
References
More filters
Journal ArticleDOI
k -anonymity: a model for protecting privacy
TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Journal ArticleDOI
The active badge location system
TL;DR: A novel system for the location of people in an office environment is described, where members of staff wear badges that transmit signals providing information about their location to a centralized location service, through a network of sensors.
Proceedings ArticleDOI
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Marco Gruteser,Dirk Grunwald +1 more
TL;DR: A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.
Journal ArticleDOI
Achieving k -anonymity privacy protection using generalization and suppression
TL;DR: This paper provides a formal presentation of combining generalization and suppression to achieve k-anonymity and shows that Datafly can over distort data and µ-Argus can additionally fail to provide adequate protection.
Journal ArticleDOI
Cyberguide: a mobile context-aware tour guide
TL;DR: The Cyberguide project is presented, in which the authors are building prototypes of a mobile context‐aware tour guide that is used to provide more of the kind of services that they come to expect from a real tour guide.
Related Papers (5)
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Marco Gruteser,Dirk Grunwald +1 more