The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.12 - Dec. (2013 vol.12)
pp: 2360-2372
Rinku Dewri , University of Denver, Denver
ABSTRACT
Location privacy research has received wide attention in the past few years owing to the growing popularity of location-based applications, and the skepticism thereof on the collection of location information. A large section of this research is directed toward mechanisms based on location obfuscation enforced using cloaking regions. The primary motivation for this engagement comes from the relatively well-researched area of database privacy. Researchers in this sibling domain have indicated multiple times that any notion of privacy is incomplete without explicit statements on the capabilities of an adversary. As a result, we have started to see some efforts to categorize the various forms of background knowledge that an adversary may possess in the context of location privacy. Along this line, we consider some preliminary forms of attacker knowledge, and explore what implication does a certain form of knowledge has on location privacy. Continuing on, we extend our insights to a form of adversarial knowledge related to the geographic uncertainty that the adversary has in correctly locating a user. We empirically demonstrate that the use of cloaking regions can adversely impact the preservation of privacy in the presence of such approximate location knowledge, and demonstrate how perturbation-based mechanisms can instead provide a well-balanced tradeoff between privacy and service accuracy.
INDEX TERMS
Privacy, Approximation methods, Databases, Data privacy, Mobile computing, Context awareness,query approximations, Location privacy, differential privacy
CITATION
Rinku Dewri, "Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers", IEEE Transactions on Mobile Computing, vol.12, no. 12, pp. 2360-2372, Dec. 2013, doi:10.1109/TMC.2012.208
REFERENCES
[1] M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," Proc. First Int'l Conf. Mobile Systems, Applications, and Services, pp. 31-42, 2003.
[2] B. Gedik and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms," IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.
[3] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Trans. Knowledge and Data Eng., vol. 19, no. 12, pp. 1719-1733, Dec. 2007.
[4] R. Dewri, "Location Privacy and Attacker Knowledge: Who Are We Fighting against?" Proc. Seventh Int'l ICST Conf. Security and Privacy in Comm. Networks, pp. 96-115, 2011.
[5] C. Dwork, "Differential Privacy," Automata, Languages and Programming, vol. 4052, pp. 1-12, 2006.
[6] R. Shokri, J. Freudiger, and J.-P. Hubaux, "A Unified Framework for Location Privacy," Proc. Ninth Int'l Symp. Privacy Enhancing Technologies, pp. 203-214, 2010.
[7] B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid," Proc. 17th Int'l World Wide Web Conf., pp. 237-246, 2008.
[8] M. Xue, P. Kalnis, and H.K. Pung, "Location Diversity: Enhanced Privacy Protection in Location Based Services," Proc. Fourth Int'l Symp. Location and Context Awareness, pp. 70-87, 2009.
[9] R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, and J.-P. Hubaux, "Unraveling an Old Cloak: k-Anonymity for Location Privacy," Proc. Ninth Ann. ACM Workshop Privacy in the Electronic Soc., pp. 115-118, 2010.
[10] G. Ghinita, K. Zhao, D. Papadias, and P. Kalnis, "A Reciprocal Framework for Spatial k-Anonymity," J. Information Systems, vol. 35, no. 3, pp. 299-314, 2010.
[11] A. Khoshgozaran and C. Shahabi, "Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy," Proc. 10th Int'l Conf. Advances in Spatial and Temporal Databases, pp. 239-257, 2007.
[12] P. Golle and K. Partridge, "On the Anonymity of Home/Work Location Pairs," Proc. Seventh Int'l Conf. Pervasive Computing, pp. 390-397, 2009.
[13] H. Zang and J. Bolot, "Anonymization of Location Data Does Not Work: A Large-Scale Measurement Study," Proc. 17th Ann. Int'l Conf. Mobile Computing and Networking, pp. 145-156, 2011.
[14] R. Shokri, G. Theodorakopoulos, J.-Y.L. Boudec, and J.-P. Hubaux, "Quantifying Location Privacy," Proc. IEEE 32nd Symp. Security and Privacy, pp. 247-262, 2011.
[15] X. Liu and G. Schrack, "Encoding and Decoding the Hilbert Order," Software-Practice and Experience, vol. 26, no. 12, pp. 1335-1346, 1996.
[16] M. Duckham and L. Kulik, "A Formal Model of Obfuscation and Negotiation for Location Privacy," Proc. Third Int'l Conf. Pervasive Computing, pp. 152-170, 2005.
[17] H. Kido, Y. Yanagisawa, and T. Satoh, "An Anonymous Communication Technique Using Dummies for Location-Based Services," Proc. IEEE Int'l Conf. Pervasive Services, pp. 88-97, 2005.
[18] R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, "Preserving User Location Privacy in Mobile Data Management Infrastructures," Proc. Sixth Workshop Privacy Enhancing Technologies, pp. 393-412, 2006.
[19] M.L. Yiu, C.S. Jensen, X. Huang, and H. Lu, "SpaceTwist: Managing the Trade-Offs among Location Privacy, Query Performance, and Query Accuracy in Mobile Services," Proc. 24th Int'l Conf. Data Eng., pp. 366-375, 2008.
[20] P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov. 2001.
[21] F. Liu, K.A. Hua, and Y. Cai, "Query l-Diversity in Location-Based Services," Proc. 10th Int'l Conf. Mobile Data Management: Systems, Services and Middleware, pp. 436-442, 2009.
[22] R. Dewri, I. Ray, I. Ray, and D. Whitley, "On the Formation of Historically K-Anonymous Anonymity Sets in a Continuous LBS," Proc. Sixth Int'l ICST Conf. Security and Privacy in Comm. Networks, pp. 71-88, 2010.
[23] R. Dewri, I. Ray, I. Ray, and D. Whitley, "Query M-Invariance: Preventing Query Disclosures in Continuous Location-Based Services," Proc. 11th Int'l Conf. Mobile Data Management, pp. 95-104, 2010.
[24] H. Shin, J. Vaidya, and V. Atluri, "A Profile Anonymization Model for Location Based Services," J. Computer Security, vol. 19, no. 5, pp. 795-833, 2011.
[25] C.B.D. Riboni, L. Pareschi, and S. Jajodia, "Preserving Anonymity of Recurrent Location-Based Queries," Proc. 16th Int'l Symp. Temporal Representation and Reasoning, 2009.
[26] G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems," Proc. 16th Int'l Conf. World Wide Web, pp. 371-380, 2007.
[27] A.R. Beresford and F. Stajano, "Mix Zones: User Privacy in Location-Aware Services," Proc. IEEE Second Ann. Conf. Pervasive Computing and Comm. Workshops, pp. 127-131, 2004.
[28] B. Palanisamy and L. Liu, "MobiMix: Protecting Location Privacy with Mix-Zones over Road Networks," Proc. 27th Int'l Conf. Data Eng., pp. 494-505, 2011.
[29] M.F. Mokbel, C. Chow, and W.G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy," Proc. 32nd Int'l Conf. Very Large Data Bases, pp. 763-774, 2006.
[30] K.C.K. Lee, W.-C. Lee, H.V. Leong, and B. Zheng, "OPAQUE: Protecting Path Privacy in Directions Search," Proc. 25th Int'l Conf. Data Eng., pp. 1271-1274, 2009.
[31] T. Xu and Y. Cai, "Exploring Historical Location Data for Anonymity Preservation in Location-Based Services," Proc. IEEE INFOCOM, pp. 1220-1228, 2008.
[32] T. Xu and Y. Cai, "Feeling-Based Location Privacy Protection for Location-Based Services," Proc. 16th ACM Conf. Computer and Comm. Security, pp. 348-357, 2009.
[33] M. Soriano, S. Qing, and J. Lopez, "Time Warp: How Time Affects Privacy in LBSs," Proc. 12th Int'l Conf. Information and Comm. Security, pp. 325-339, 2010.
[34] A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr, "Location Privacy: Going Beyond k-Anonymity, Cloaking and Anonymizers," J. Knowledge and Information Systems, vol. 26, no. 3, pp. 435-465, 2011.
[35] S. Papadopoulos, S. Bakiras, and D. Papadias, "Nearest Neighbor Search with Strong Location Privacy," Proc. VLDB Endowment, vol. 3, nos. 1/2, pp. 619-629, 2010.
34 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool