The new Casper: query processing for location services without compromising privacy
Mohamed F. Mokbel,Chi-Yin Chow,Walid G. Aref +2 more
- pp 763-774
TLDR
Zhang et al. as mentioned in this paper presented Casper1, a new framework in which mobile and stationary users can entertain location-based services without revealing their location information, which consists of two main components, the location anonymizer and the privacy-aware query processor.Abstract:
This paper tackles a major privacy concern in current location-based services where users have to continuously report their locations to the database server in order to obtain the service. For example, a user asking about the nearest gas station has to report her exact location. With untrusted servers, reporting the location information may lead to several privacy threats. In this paper, we present Casper1; a new framework in which mobile and stationary users can entertain location-based services without revealing their location information. Casper consists of two main components, the location anonymizer and the privacy-aware query processor. The location anonymizer blurs the users' exact location information into cloaked spatial regions based on user-specified privacy requirements. The privacy-aware query processor is embedded inside the location-based database server in order to deal with the cloaked spatial areas rather than the exact location information. Experimental results show that Casper achieves high quality location-based services while providing anonymity for both data and queries.read more
Citations
More filters
Journal ArticleDOI
Joint obfuscation of location and its semantic information for privacy protection
TL;DR: In this paper, the authors proposed a joint obfuscation approach in which the location obfuscation is performed based on the result of the semantic tag obfuscation, and they also provided a formal framework for evaluation and comparison of their joint approach with the disjoint approach.
Semantic-aware location privacy preservation on road networks
TL;DR: This paper proposes CloSed, a semantic-awareness privacy preservation model to protect users' privacy from violation, and designs cloaked sets that should cover different semantic regions of road networks as well as satisfy quality of service QoS.
Journal ArticleDOI
Location K-anonymity in indoor spaces
Joon-Seok Kim,Ki-Joune Li +1 more
TL;DR: The concept of indoor location 𝒦$\mathcal {K}$-anonymity is introduced and the requirements of ASR in indoor spaces are investigated and novel methods to determine the ASR are proposed, considering hierarchical structures of the indoor space.
Journal ArticleDOI
X-Region: A framework for location privacy preservation in mobile peer-to-peer networks
TL;DR: In this paper, the authors proposed x-region as a solution to preserve the location privacy in a mobile peer-to-peer P2P environment where no trust relationships are assumed amongst mobile users, and the main idea is to allow users to share a blurred region known as X-region instead of their exact locations so that one cannot distinguish any user from others inside the region.
Journal ArticleDOI
Spatial cloaking for location-based queries in the cloud
Hiba Jadallah,Zaher Al Aghbari +1 more
TL;DR: An efficient k-anonymity algorithm, called Aman, is proposed to compute the cloaked area with minimal number of communication rounds between the user and the cloud server and shows that Aman outperforms other state-of-the-art approaches.
References
More filters
Journal ArticleDOI
k -anonymity: a model for protecting privacy
TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Proceedings ArticleDOI
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Marco Gruteser,Dirk Grunwald +1 more
TL;DR: A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.
Journal ArticleDOI
Protecting respondents identities in microdata release
TL;DR: This paper addresses the problem of releasing microdata while safeguarding the anonymity of respondents to which the data refer and introduces the concept of minimal generalization that captures the property of the release process not distorting the data more than needed to achieve k-anonymity.
Journal ArticleDOI
Achieving k -anonymity privacy protection using generalization and suppression
TL;DR: This paper provides a formal presentation of combining generalization and suppression to achieve k-anonymity and shows that Datafly can over distort data and µ-Argus can additionally fail to provide adequate protection.
Journal ArticleDOI
Location privacy in pervasive computing
TL;DR: The mix zone is introduced-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity, based on frequently changing pseudonyms.