scispace - formally typeset
Open AccessProceedings ArticleDOI

The new Casper: query processing for location services without compromising privacy

TLDR
Zhang et al. as mentioned in this paper presented Casper1, a new framework in which mobile and stationary users can entertain location-based services without revealing their location information, which consists of two main components, the location anonymizer and the privacy-aware query processor.
Abstract
This paper tackles a major privacy concern in current location-based services where users have to continuously report their locations to the database server in order to obtain the service. For example, a user asking about the nearest gas station has to report her exact location. With untrusted servers, reporting the location information may lead to several privacy threats. In this paper, we present Casper1; a new framework in which mobile and stationary users can entertain location-based services without revealing their location information. Casper consists of two main components, the location anonymizer and the privacy-aware query processor. The location anonymizer blurs the users' exact location information into cloaked spatial regions based on user-specified privacy requirements. The privacy-aware query processor is embedded inside the location-based database server in order to deal with the cloaked spatial areas rather than the exact location information. Experimental results show that Casper achieves high quality location-based services while providing anonymity for both data and queries.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Geo-indistinguishability: A Principled Approach to Location Privacy

TL;DR: The starting point of the approach is the principle of geo-indistinguishability, a formal notion of privacy that protects the user's exact location, while allowing approximate information typically needed to obtain a certain desired service to be released.
Journal ArticleDOI

Location privacy-preserving k nearest neighbor query under user's preference

TL;DR: A novel location privacy model (s, e)-anonymity is devised from perspective of minimum inferred region and candidate answer region, which present location protection strength and scale of intermediate results, respectively and delivers well trade-off among location protection, query performance and query user's privacy preference.
Proceedings ArticleDOI

Protecting Privacy in Location-Based Services Using K-Anonymity without Cloaked Region

TL;DR: This paper proposes a framework, called KAWCR (K-anonymity Without Cloaked Region), which only needs the server to process INN queries and can guarantee that the users issuing the query is indistinguishable from at least K-1 other users.
Journal ArticleDOI

Achieving location privacy through CAST in location based services

TL;DR: This paper is a research attempt to extend the realm of collaborative communication among peers belonging to a mobile user group in a decentralized or trusted third party free architecture called CAST, that employs the series of trust among peers and peers use their cached mobile data to collaborate with each other in order to get the results locally.
Journal ArticleDOI

An anonymous entropy-based location privacy protection scheme in mobile social networks

TL;DR: An anonymous entropy-based location privacy protection scheme in mobile social networks (MSN), which includes two algorithms K-DDCA in a densely populated region and K-SDCA in an sparsely populated region to tackle the problem of location privacy leakage.
References
More filters
Journal ArticleDOI

k -anonymity: a model for protecting privacy

TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Proceedings ArticleDOI

Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

TL;DR: A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.
Journal ArticleDOI

Protecting respondents identities in microdata release

TL;DR: This paper addresses the problem of releasing microdata while safeguarding the anonymity of respondents to which the data refer and introduces the concept of minimal generalization that captures the property of the release process not distorting the data more than needed to achieve k-anonymity.
Journal ArticleDOI

Achieving k -anonymity privacy protection using generalization and suppression

TL;DR: This paper provides a formal presentation of combining generalization and suppression to achieve k-anonymity and shows that Datafly can over distort data and µ-Argus can additionally fail to provide adequate protection.
Journal ArticleDOI

Location privacy in pervasive computing

TL;DR: The mix zone is introduced-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity, based on frequently changing pseudonyms.
Related Papers (5)