Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Beresford A.R. and Stajano F. Location privacy in pervasive computing. IEEE Pervasive Comput., 2(1):46–55, 2003.
Cheng R., Zhang Y., Bertino E., and Prabhakar S. Preserving user location privacy in mobile data management infrastructures. In Proceedings of Privacy Enhancing Technologies, 2006, pp. 393–412.
Chow C.-Y. and Mokbel M.F. Enabling private continuous queries for revealed user locations. In Proc. 10th Int. Symp. Advances in Spatial and Temporal Databases, 2007, pp. 258–275.
Chow C.-Y., Mokbel M.F., and Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In Proc. 14th ACM Int. Symp. on Geographic Inf. Syst., 2006, pp. 171–178.
Gedik B. and Liu L. Location privacy in mobile systems: a personalized anonymization model. In Proc. 23rd Int. Conf. on Distributed Computing Systems, 2005, pp. 620–629.
Ghinita G., Kalnis P., and Skiadopoulos S. PRIVE: anonymous location-based queries in distributed mobile systems. In Proc. 16th Int. World Wide Web Conference, 2007, pp. 371–380.
Gruteser M. and Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. 1st Int. Conf. Mobile Systems, Applications and Services, 2003, pp. 31–42.
Hoh B. and Gruteser M. Protecting location privacy through path confusion. In Proc. 1st Int. Conf. on Security and Privacy for Emerging Areas in Communication Networks, 2005.
Kalnis P., Ghinita G., Mouratidis K., and Papadias D. Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowledge and Data Eng., 19(12):1719–1733, 2007.
Kamat P., Zhang Y., Trappe W., and Ozturk C. Enhancing source-location privacy in sensor network routing In Proc. 23rd Int. Conf. on Distributed Computing Systems, 2005, pp. 599–608.
Khoshgozaran A. and Shahabi C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In Proc. 10th Int. Symp. Advances in Spatial and Temporal Databases, 2007, pp. 239–257.
Mokbel M.F., Chow C. Y., and Aref W.G. The new Casper: query processing for location services without compromising privacy. In Proc. 32nd Int. Conf. on Very Large Data Bases, 2006, pp. 763–774.
Moon B., Jagadish H.V., and Faloutsos C. Analysis of the clustering properties of the hilbert space-filling curve. IEEE Trans. Knowledge and Data Eng., 13(1):124–141, 2001.
Samet, H. The Design and Analysis of Spatial Data Structures. Addison-Wesley, New York, 1990.
Sweeney L. k-Anonymity: a model for protecting privacy. Int. J. Uncertain., Fuzziness Knowledge-based Syst., 10(5):557–570, 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this entry
Cite this entry
Kalnis, P., Ghinita, G. (2009). Spatial Anonymity. In: LIU, L., ÖZSU, M.T. (eds) Encyclopedia of Database Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-39940-9_352
Download citation
DOI: https://doi.org/10.1007/978-0-387-39940-9_352
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-35544-3
Online ISBN: 978-0-387-39940-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering