Synonyms
Location blurring; Location perturbation; Location anonymization; Privacy; Location‐privacy; Anonymity; Location-based services; Nearest neighbor; Peer to peer
Definition
Spatial cloaking is a technique to blur a user's exact location into a spatial region in order to preserve her location privacy. The blurred spatial region must satisfy the user's specified privacy requirement. The most widely used privacy requirements are k-anonymity and minimum spatial area. The k-anonymity requirement guarantees that a user location is indistinguishable among k users. On the other hand, the minimum spatial area requirement guarantees that a user's exact location must be blurred into a spatial region with an area of at least \( \mathcal{A} \), such that the probability of the user being located in any point within the spatial region is \( \frac{1}{\mathcal{A}} \). A user location must be blurred by a spatial cloaking algorithm either on the client side or a trusted third-party before it is...
This is a preview of subscription content, log in via an institution.
Recommended Reading
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Proceedings of Privacy Enhancing Technology Workshop. pp. 393–412. Cambridge, UK (2006)
Chow, C.Y., Mokbel, M.F., Liu, X.: A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In: Proceedings of the ACM Symposium on Advances in Geographic Information Systems (ACM GIS), pp. 171–178. Arlington, Virginia, USA (2006)
Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. In: Proceedings of the International Conference on Distributed Computing Systems (ICDCS), pp. 620–629. Columbus, OH, USA (2005)
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 31–42. San Francisco, CA, USA (2003)
Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location‐Tracking Applications. IEEE Secur. Priv. 2(2), 28–34 (2004)
Bayardo Jr., R.J., Agrawal, R.: Data Privacy through Optimal k-Anonymization. In: Proceedings of the International Conference on Data Engineering (ICDE), pp. 217–228. Tokyo, Japan (2005)
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Anonymity in Location Based Services. Technical Report TRB6/06, Department of Computer Science, National University of Singapore (2006)
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian Multidimensional k-Anonymity. In: Proceedings of the International Conference on Data Engineering (ICDE), Atlanta, GA, USA (2006)
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain k-Anonymity. In: Proceedings of the ACM International Conference on Management of Data (SIGMOD), pp. 29–60. Baltimore, Maryland, USA (2005)
Meyerson, A., Williams, R.: On the Complexity of Optimal K-Anonymity. In: Proceedings of the ACM Symposium on Principles of Database Systems (PODS), pp.223–228. Paris, France (2004)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proceedings of the International Conference on Very Large Data Bases (VLDB), pp. 763–774, Seoul, Korea (2006)
Sweeney, L.: Achieving k-anonymity Privacy Protection using Generalization and Suppression. Int. J. Uncertain. Fuzziness Knowl. Sys. 10(5), 571–588 (2002)
Sweeney, L.: k-anonymity: A Model for Protecting Privacy. Intern. J. Uncertain., Fuzziness Knowl.-based Syst. 10(5), 557–570 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag
About this entry
Cite this entry
Chow, CY. (2008). Cloaking Algorithms for Location Privacy. In: Shekhar, S., Xiong, H. (eds) Encyclopedia of GIS. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35973-1_136
Download citation
DOI: https://doi.org/10.1007/978-0-387-35973-1_136
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30858-6
Online ISBN: 978-0-387-35973-1
eBook Packages: Computer ScienceReference Module Computer Science and Engineering