Skip to main content

Cloaking Algorithms for Location Privacy

  • Reference work entry

Synonyms

Location blurring; Location perturbation; Location anonymization; Privacy; Location‐privacy; Anonymity; Location-based services; Nearest neighbor; Peer to peer

Definition

Spatial cloaking is a technique to blur a user's exact location into a spatial region in order to preserve her location privacy. The blurred spatial region must satisfy the user's specified privacy requirement. The most widely used privacy requirements are k-anonymity and minimum spatial area. The k-anonymity requirement guarantees that a user location is indistinguishable among k users. On the other hand, the minimum spatial area requirement guarantees that a user's exact location must be blurred into a spatial region with an area of at least \( \mathcal{A} \), such that the probability of the user being located in any point within the spatial region is \( \frac{1}{\mathcal{A}} \). A user location must be blurred by a spatial cloaking algorithm either on the client side or a trusted third-party before it is...

This is a preview of subscription content, log in via an institution.

Recommended Reading

  1. Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Proceedings of Privacy Enhancing Technology Workshop. pp. 393–412. Cambridge, UK (2006)

    Google Scholar 

  2. Chow, C.Y., Mokbel, M.F., Liu, X.: A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In: Proceedings of the ACM Symposium on Advances in Geographic Information Systems (ACM GIS), pp. 171–178. Arlington, Virginia, USA (2006)

    Google Scholar 

  3. Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. In: Proceedings of the International Conference on Distributed Computing Systems (ICDCS), pp. 620–629. Columbus, OH, USA (2005)

    Google Scholar 

  4. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 31–42. San Francisco, CA, USA (2003)

    Chapter  Google Scholar 

  5. Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location‐Tracking Applications. IEEE Secur. Priv. 2(2), 28–34 (2004)

    Article  Google Scholar 

  6. Bayardo Jr., R.J., Agrawal, R.: Data Privacy through Optimal k-Anonymization. In: Proceedings of the International Conference on Data Engineering (ICDE), pp. 217–228. Tokyo, Japan (2005)

    Google Scholar 

  7. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Anonymity in Location Based Services. Technical Report TRB6/06, Department of Computer Science, National University of Singapore (2006)

    Google Scholar 

  8. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian Multidimensional k-Anonymity. In: Proceedings of the International Conference on Data Engineering (ICDE), Atlanta, GA, USA (2006)

    Google Scholar 

  9. LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain k-Anonymity. In: Proceedings of the ACM International Conference on Management of Data (SIGMOD), pp. 29–60. Baltimore, Maryland, USA (2005)

    Google Scholar 

  10. Meyerson, A., Williams, R.: On the Complexity of Optimal K-Anonymity. In: Proceedings of the ACM Symposium on Principles of Database Systems (PODS), pp.223–228. Paris, France (2004)

    Google Scholar 

  11. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proceedings of the International Conference on Very Large Data Bases (VLDB), pp. 763–774, Seoul, Korea (2006)

    Google Scholar 

  12. Sweeney, L.: Achieving k-anonymity Privacy Protection using Generalization and Suppression. Int. J. Uncertain. Fuzziness Knowl. Sys. 10(5), 571–588 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  13. Sweeney, L.: k-anonymity: A Model for Protecting Privacy. Intern. J. Uncertain., Fuzziness Knowl.-based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag

About this entry

Cite this entry

Chow, CY. (2008). Cloaking Algorithms for Location Privacy. In: Shekhar, S., Xiong, H. (eds) Encyclopedia of GIS. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35973-1_136

Download citation

Publish with us

Policies and ethics