This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications
October-December 2011 (vol. 10 no. 4)
pp. 64-72
Geosocial networking applications magnify the concern for location privacy because a user's position can be disclosed to diverse untrusted parties. The Privacy Preserving Obfuscation Environment (Probe) framework supports semantic-location cloaking to protect this information.

1. M. Xue, P. Kalnis, and H.K. Pung, "Location Diversity: Enhanced Privacy Protection in Location Based Services," Proc. 4th Int'l Symp. Location and Context Awareness (LoCA 09), Springer-Verlag, 2009, pp. 70–87.
2. M. Gruteser and X. Liu, "Protecting Privacy in Continuous Location Tracking Applications," IEEE Security and Privacy, vol. 2, no. 2, 2004, pp. 28–31.
3. M.L. Damiani, E. Bertino, and C. Silvestri, "The PROBE Framework for the Personalized Cloaking of Private Locations," Trans. Data Privacy, vol. 3, no. 2, 2010, pp. 123–148.
4. M.L. Damiani, C. Silvestri, and E. Bertino, "Analyzing Semantic Location Cloaking in a Probabilistic Grid-Based Map," Proc. 18th ACM SIGSpatial Int'l Conf. Advances in Geographic Information Systems (ACM GIS), ACM Press, 2010, pp. 522–523.
5. G. Ghinita et al., "Preventing Velocity-Based Linkage Attacks in Location-Aware Applications," Proc. 17th ACM SIGSpatial Int'l Conf. Advances in Geographic Information Systems (ACM GIS), ACM Press, 2009, pp. 246–255.
1. G. Iachello and J. Hong, "End-User Privacy in Human-Computer Interaction," Foundations and Trends in Human-Computer Interaction, vol. 1, no. 1, 2007, pp. 1–137.
2. E. Toch et al., "Analyzing Use of Privacy Policy Attributes in a Location Sharing Application," Proc. 5th Symp. Usable Privacy and Security (SOUP 09), ACM Press, 2009, article 32.
3. J.Y. Tsai et al., "Who's Viewed You?: The Impact of Feedback in a Mobile Location-Sharing Application," Proc. 27th Int'l Conf. Human Factors in Computing Systems (CHI 09), ACM Press, 2009, pp. 2003–2012.
4. Geographic Location/Privacy Working Group (GeoPriv), www.ietf.org/html.chartersgeopriv-charter.html .
5. M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," Proc. 1st Int'l Conf. Mobile Systems, Applications, and Services, ACM Press, 2003, pp. 31–42.
6. A.R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 2, no. 1, 2003, pp. 46–55.
7. C.S. Jensen, H. Lu, and M.L. Yiu, "Location Privacy Techniques in Client-Server Architectures." Privacy in Location-Based Applications, LNCS 5599, Springer-Verlag, 2009, pp. 31–58.
8. C. Bettini et al., "Anonymity and Historical-Anonymity in Location-Based Services," Privacy in Location-Based Applications, LNCS 5599, Springer-Verlag, 2009, pp. 1–30.
9. M. Duckham and L. Kulik, "Location Privacy and Location Aware Computing," Dynamic and Mobile GIS: Investigating Change in Space and Time, J. Drummond, ed., CRC Press, 2006, pp. 35–51.
10. J. Krumm, "A Survey of Computational Location Privacy," Personal and Ubiquitous Computing, vol. 13, no. 6, 2009, pp. 391–399.
11. A. Machanavajjhala et al., "l-Diversity: Privacy Beyond k-Anonymity," Proc. 22nd IEEE Int'l Conf. Data Eng. (ICDE 06), IEEE CS Press, 2006, p. 24.
12. P. Kalnis et al., "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Trans. Data and Knowledge Eng., vol. 19, no. 12, 2007, pp. 1719–1733.
13. C. Chow, M.F. Mokbel, and W.G. Aref, "Casper*: Query Processing for Location Services without Compromising Privacy," ACM Trans. Database Systems, vol. 34, no. 4, 2009, article 24.
14. B. Bamba et al., "Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid," Proc. 17th Int'l World Wide Web Conf. (WWW), ACM Press, 2008, pp. 237–246.
15. M. Xue, P. Kalnis, and H.K. Pung, "Location Diversity: Enhanced Privacy Protection in Location Based Services," Proc. 4th Int'l Symp. Location and Context Awareness (LoCA 09), Springer-Verlag, 2009, pp. 70–87.
16. R. Cheng et al., "Preserving User Location Privacy in Mobile Data Management Infrastructures," Proc. 6th Workshop Privacy Enhancing Technologies, Springer, 2006, pp. 393–412.

Index Terms:
social networking (online),mobile computing,security of data,information protection,fine-grained cloaking,sensitive position,location-sharing applications,geosocial networking applications,location privacy,privacy preserving obfuscation environment framework,semantic-location cloaking,Mobile radio mobility management,Semantics,Wireless sensor networks,Privacy,privacy profile,location-based services,cloaked region,sensing,sensitive semantic locations,large-scale opportunistic sensing,pervasive computing,location privacy,privacy personalization
Citation:
M. L. Damiani, C. Silvestri, E. Bertino, "Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications," IEEE Pervasive Computing, vol. 10, no. 4, pp. 64-72, Oct.-Dec. 2011, doi:10.1109/MPRV.2011.18
Usage of this product signifies your acceptance of the Terms of Use.