Abstract
The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users privacy concerns. In: Proc. of the 9th International Conference on Human-Computer Interaction, pp. 709–712. IOS Press, Amsterdam (2003)
Ciriani, V., di Vimercati, S.D.C., Foresti, S., Samarati, P.: k-Anonymity. In: Secure Data Management in Decentralized Systems, Springer, Heidelberg (2007)
Bettini, C., Wang, X.S., Jajodia, S.: How anonymous is k-anonymous? look at your quasi-id. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 1–15. Springer, Heidelberg (2008)
Dalenius, T.: Finding a needle in a haystack - or identifying anonymous census record. Journal of Official Statistics 2(3), 329–336 (1986)
Abul, O., Bonchi, F., Nanni, M.: Never walk alone: Uncertainty for anonymity in moving objects databases. In: Proc. of the 24th International Conference on Data Engineering, pp. 376–386. IEEE Computer Society, Los Alamitos (2008)
Bettini, C., Mascetti, S., Wang, X.S., Jajodia, S.: Anonymity in location-based services: towards a general framework. In: Proc. of the 8th International Conference on Mobile Data Management, pp. 69–76. IEEE Computer Society, Los Alamitos (2007)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. The USENIX Association (2003)
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719–1733 (2007)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proc. of the 32nd International Conference on Very Large Data Bases, VLDB Endowment, pp. 763–774 (2006)
Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: Proc. of the 2nd Annual Conference on Pervasive Computing and Communications, pp. 127–131. IEEE Computer Society, Los Alamitos (2004)
Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Proc. of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 194–205. IEEE Computer Society, Los Alamitos (2005)
Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 185–199. Springer, Heidelberg (2005)
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, p. 24. IEEE Computer Society, Los Alamitos (2006)
Mascetti, S., Bettini, C., Freni, D., Wang, X.S.: Spatial generalization algorithms for LBS privacy preservation. Journal of Location Based Services 2(1), 179–207 (2008)
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)
Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proc. of the 14th International Symposium on Geographic Information Systems, pp. 171–178. ACM, New York (2006)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: Prive: anonymous location-based queries in distributed mobile systems. In: Proc. of the 16th international conference on World Wide Web, pp. 371–380. ACM Press, New York (2007)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: Mobihide: A mobile peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221–238. Springer, Heidelberg (2007)
Hu, H., Xu, J.: Non-exposure location anonymity. In: Proc. of the 25th International Conference on Data Engineering, pp. 1120–1131. IEEE Computer Society, Los Alamitos (2009)
Chow, C.Y., Mokbel, M.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007)
Xu, T., Cai, Y.: Location anonymity in continuous location-based services. In: Proc. of ACM International Symposium on Advances in Geographic Information Systems, p. 39. ACM Press, New York (2007)
Mascetti, S., Bettini, C., Wang, X.S., Freni, D., Jajodia, S.: ProvidentHider: an algorithm to preserve historical k-anonymity in lbs. In: Proc. of the 10th International Conference on Mobile Data Management, pp. 172–181. IEEE Computer Society, Los Alamitos (2009)
Bettini, C., Jajodia, S., Pareschi, L.: Anonymity and diversity in LBS: a preliminary investigation. In: Proc. of the 5th International Conference on Pervasive Computing and Communications, pp. 577–580. IEEE Computer Society, Los Alamitos (2007)
Riboni, D., Pareschi, L., Bettini, C., Jajodia, S.: Preserving anonymity of recurrent location-based queries. In: Proc. of 16th International Symposium on Temporal Representation and Reasoning. IEEE Computer Society, Los Alamitos (2009)
Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy 2(2), 28–34 (2004)
Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)
Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proc. of the 21st International Conference on Data Engineering Workshops, p. 1248. IEEE Computer Society, Los Alamitos (2005)
Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)
Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proc. of the 24th International Conference on Data Engineering, pp. 366–375. IEEE Computer Society, Los Alamitos (2008)
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: Anonymizers are not necessary. In: Proc. of SIGMOD, pp. 121–132. ACM Press, New York (2008)
Mascetti, S., Bettini, C., Freni, D., Wang, X.S., Jajodia, S.: Privacy-aware proximity based services. In: Proc. of the 10th International Conference on Mobile Data Management, pp. 31–40. IEEE Computer Society, Los Alamitos (2009)
Brinkhoff, T.: A framework for generating network-based moving objects. GeoInformatica 6(2), 153–180 (2002)
Martin, M., Nurmi, P.: A generic large scale simulator for ubiquitous computing. In: Proc. of the 3rd Conference on Mobile and Ubiquitous Systems: Networks and Services. IEEE Computer Society, Los Alamitos (2006)
Mascetti, S., Freni, D., Bettini, C., Wang, X.S., Jajodia, S.: On the impact of user movement simulations in the evaluation of LBS privacy-preserving techniques. In: Proc. of the International Workshop on Privacy in Location-Based Applications, Malaga, Spain. CEUR-WS, vol. 397, pp. 61–80 (2008)
Vyahhi, N., Bakiras, S., Kalnis, P., Ghinita, G.: Tracking moving objects in anonymized trajectories. In: Bhowmick, S.S., Küng, J., Wagner, R. (eds.) DEXA 2008. LNCS, vol. 5181, pp. 158–171. Springer, Heidelberg (2008)
Golle, P., Partridge, K.: On the anonymity of home/work location pairs. In: Tokuda, H., Beigl, M., Friday, A., Bernheim Brush, A.J., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 390–397. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bettini, C., Mascetti, S., Wang, X.S., Freni, D., Jajodia, S. (2009). Anonymity and Historical-Anonymity in Location-Based Services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds) Privacy in Location-Based Applications. Lecture Notes in Computer Science, vol 5599. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03511-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-03511-1_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03510-4
Online ISBN: 978-3-642-03511-1
eBook Packages: Computer ScienceComputer Science (R0)