Skip to main content
Log in

From location to location pattern privacy in location-based services

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

Location privacy is extensively studied in the context of location-based services (LBSs). Typically, users are assigned a location privacy profile and the precise locations are cloaked so that the privacy profile is not compromised. Though being well-defined for snapshot location privacy, these solutions require additional precautions and patches in case of consecutive LBS requests on the user trajectory. The attacker can exploit some background knowledge like maximum velocity to compromise the privacy profile. To protect against this kind of location privacy attacks, PROBE (Damiani et al. in Trans Data Priv 3(2):123–148, 2010)-like systems constantly check location privacy violations and alter requests as necessary. Clearly, the location privacy is defined in terms of snapshot locations. Observing that there are usually user-specific movement patterns existing in the shared LBS requests, this work extends location privacy to location pattern privacy. We present a framework where user-specific sensitive movement patterns are defined and sanitized in offline and online fashions, respectively. Our solution uses an efficient dynamic programming approach to decide on and to prevent sensitive pattern disclosure. An extensive experimental evaluation has been carried out too.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. http://expandedramblings.com/index.php/by-the-numbers-interesting-foursquare-user-stats/.

References

  1. Abul O, Atzori M, Bonchi F, Giannotti F (2007) Hiding sequences. In: Proceedings of the third ICDE international workshop on privacy data management (PDM 2007), Istanbul, Turkey, Apr 2007

  2. Abul O, Bonchi F, Nanni M (2008) Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of 24th international conference on data engineering (ICDE 2008), Cancun, Mexico, Apr 2008

  3. Abul O, Atzori M, Bonchi F, Giannotti F (2010) Hiding sequential and spatiotemporal patterns. IEEE Trans Knowl Data Eng 22(12):1709–1723

    Article  Google Scholar 

  4. Abul O, Gokce H (2012) Knowledge hiding from tree and graph databases. Data Knowl Eng 72(108):148–171

    Article  Google Scholar 

  5. Aggarwal CC (2005) On \(k\)-anonymity and the curse of dimensionality. In: Proceedings of the 31th international conference on very large databases (VLDB 2005), Trondheim, Norway, Sep 2005, pp 901–909

  6. Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security (CCS 2013), Berlin, Germany, Nov 2013, pp 901–914

  7. Ağır B, Huguenin K, Hengartner U, Hubaux JP (2016) On the privacy implications of location semantics. In: Proceedings on privacy enhancing technologies (PoPETs 2016), pp 165–183

  8. Atallah M, Bertino E, Elmagarmid A, Ibrahim M, Verykios VS (1999) Disclosure limitation of sensitive rules. In: Proceedings of the 1999 IEEE knowledge and data engineering exchange workshop (KDEX 1999), pp 45–52

  9. Atzori M, Bonchi F, Giannotti F, Pedreschi D (2008) Anonymity preserving pattern discovery. In: Proceedings of the 34th international conference on very large databases (VLDB 2008), Auckland, New Zealand, Aug 2008, vol 17(4), pp 703–727

  10. Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Proceedings of the 6th international conference on privacy enhancing technologies, Cambridge, UK, June 2006, pp 393–412

  11. Cho E, Myers SA, Leskovec J (2011) Friendship and mobility: user movement in location-based social networks. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining (KDD 2011), San Diego, CA, USA, Aug 2011, pp 1082–1090

  12. Cormen TH, Stein C, Rivest RL, Leiserson CE (2001) Introduction to algorithms, 2nd edn. McGraw-Hill Higher Education, New York

    MATH  Google Scholar 

  13. Damiani ML, Bertino E, Silvestri C (2010) The PROBE framework for the personalized cloaking of private locations. Trans Data Priv 3(2):123–148

    MathSciNet  Google Scholar 

  14. Dwork C (2006) Differential privacy. In: Proceedings of 33rd international colloquium on automata, languages and programming (ICALP 2006), Venice, Italy, June 2006, pp 1–12

  15. Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: Proceedings of 25th IEEE international conference on distributed computing systems (ICDCS 2005), Lisboa, Portugal, July 2006, pp 620–629

  16. Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2012 ACM SIGMOD international conference on management of data (SIGMOD 2008), Vancouver, Canada, June 2008

  17. Giannotti F, Nanni M, Pedreschi D (2006) Efficient mining of temporally annotated sequences. In: Proceedings of the sixth SIAM international conference on data mining, Bethesda, MD, USA, Apr 2006

  18. Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services, San Francisco, CA, USA, May 2003

  19. Gurung S, Lin D, Jiang W, Hurson A, Zhang R (2014) Traffic information publication with privacy preservation. ACM Trans Intell Syst Technol (TIST 2014) 5(3):44:1–44:26

    Google Scholar 

  20. Kido H, Yutaka Y, Satoh T (2005) Protection of location privacy using dummies for location-based services. In: Proceedings of 21st international conference on data engineering workshops (ICDEW 2005), Tokyo, Japan, Apr 2005

  21. Li N, Li T, Venkatasubramanian S (2007) T-closeness: privacy beyond \(K\)-anonymity and \(L\)-diversity. In: Proceedings of 23rd international conference on data engineering (ICDE 2007), Istanbul, Turkey, Apr 2007

  22. Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) \(l\)-diversity: privacy beyond \(k\)-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE 2006), Atlanta, GA, USA, Apr 2006

  23. Nergiz ME, Atzori M, Saygin Y, Guc B (2009) Towards trajectory anonymization a generalization based approach. Trans Data Priv 2(106):47–75

    MathSciNet  Google Scholar 

  24. O’Leary DE (1991) Knowledge discovery as a threat to database security. Knowl Discov Databases 9:507–516

    Google Scholar 

  25. Shokri R, Theodorakopoulos G, Troncoso C, Hubaux JP, Le Boudec JY (2012) Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of 19th ACM conference on computer and communications security (CCS 2012), Raleigh, NC, USA, Oct 2012

  26. Sweeney L (2002) \(K\)-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557–570

    Article  MathSciNet  MATH  Google Scholar 

  27. Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: Proceedings of the 9th international conference on IEEE mobile data management (MDM 2008), Beijing, China, Apr 2008, pp 65–72

  28. Yigitoglu E, Damiani ML, Abul O, Silvestri C (2012) Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: Proceedings of the 19th international conference on IEEE mobile data management (MDM 2012), Bengaluru, India, July 2008

Download references

Acknowledgements

This work has been supported by TUBITAK under the Grant Number 114E132.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osman Abul.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abul, O., Bayrak, C. From location to location pattern privacy in location-based services. Knowl Inf Syst 56, 533–557 (2018). https://doi.org/10.1007/s10115-017-1146-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-017-1146-x

Keywords

Navigation