skip to main content
10.1145/1183471.1183500acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
Article

A peer-to-peer spatial cloaking algorithm for anonymous location-based service

Published: 10 November 2006 Publication History

Abstract

This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desired services. For example, a mobile user asking about her nearest restaurant has to report her exact location. With untrusted service providers, reporting private location information may lead to several privacy threats. In this paper, we present a peer-to-peer (P2P)spatial cloaking algorithm in which mobile and stationary users can entertain location-based services without revealing their exact location information. The main idea is that before requesting any location-based service, the mobile user will form a group from her peers via single-hop communication and/or multi-hop routing. Then,the spatial cloaked area is computed as the region that covers the entire group of peers. Two modes of operations are supported within the proposed P2P s patial cloaking algorithm, namely, the on-demand mode and the proactive mode. Experimental results show that the P2P spatial cloaking algorithm operated in the on-demand mode has lower communication cost and better quality of services than the proactive mode, but the on-demand incurs longer response time.

References

[1]
L. Ackerman, J. Kempf, and T. Miki. Wireless Location Privacy: A Report on Law and Policy in the United States, the Europrean Union, and Japan. Technical Report DCL-TR2003-001, DoCoMo Commuinication Laboratories, USA, 2003.
[2]
B. An and S. Papavassiliou. A Mobility-based Clustering Approach to Support Mobility Management and Multicast Routing in Mobile Ad-hoc Wireless Networks. International Journal of Network Management 11(6):387--395, 2001.
[3]
D. Barbará and T. Imielinski. Sleepers and Workaholics: Caching Strategies in Mobile Environments. The International Journal on VLDB 4(4):567--602, 1995.
[4]
L. Barkhuus and A. K. Dey. Location-Based Services for Mobile Telephony: A Study of Users 'Privacy Concerns. In Proceeding of the IFIP Conference on Human-Computer Interaction, INTERACT 2003.
[5]
R. J. Bayardo Jr. and R. Agrawal. Data Privacy through Optimal k Anonymization. In ICDE 2005.
[6]
A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1):46--55, 2003.
[7]
J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In MobiCom 1998.
[8]
T. Camp, J. Boleng, and V. Davies. A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communications and Mobile Computing (WCMC) 2(5):483--502, 2002.
[9]
C.-Y. Chow, H. V. Leong, and A. T. S. Chan. Distributed Group-based Cooperative Caching in a Mobile Broadcast Environment. In MDM 2005.
[10]
M. Duckham and L. Kulik. A Formal Model of Obfuscation and Negotiation for Location Privacy. In Pervasive 2005.
[11]
A. Ephremides, J. Wieselthier, and D. J. Baker. A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling. Proceedings of IEEE 75(1):56--73,1987.
[12]
Foxs News. Man Accused of Stalking Ex-Girlfriend With GPS. http://www.foxnews.com/story/0,2933,131487,00.html. Sep 04, 2004.
[13]
B. Gedik and L. Liu. A Customizable k Anonymity Model for Protecting Location Privacy. In ICDCS 2005.
[14]
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys 2003.
[15]
M. Gruteser and X. Liu. Protecting Privacy in Continuous Location-Tracking Applications.IEEE Security and Privacy 2(2):28--34, 2004.
[16]
T. Hara. Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility. In INFOCOM 2001.
[17]
U. Hengartner and P. Steenkiste. Protecting Access to People Location Information. In Proceeding of the International Conference on Security in Pervasive Computing, SPC 2003.
[18]
J. I. Hong and J. A. Landay. An Architecture for Privacy-Sensitive Ubiquitous Computing. In In Proceedings of The International Conference on Mobile Systems, Applications, and Services, MobiSys 2004.
[19]
J.-L.Huang, M.-S. Chen, and W.-C. Peng. Exploring Group Mobility for Replica Data Allocation in a Mobile Environment. In CIKM 2003.
[20]
Z. Huang, C. S. Jensen, H. Lu, and B. C. Ooi. Skyline Queries Against Mobile Lightweight Devices in MANETs. In ICDE 2006.
[21]
T. Imielinski and B. R. Badrinath. Mobile Wireless Computing: Challenges in Data Management. Communications of the ACM (CACM)37(10):18--28,1994.
[22]
E. Kaasinen. User Needs for Location-aware Mobile Services. Personal and Ubiquitous Computing 7(1):70--79, 2003.
[23]
H. Kido, Y. Yanagisawa, and T. Satoh. An Anonymous Communication Technique using Dummies for Location-based Services. In Proceedings of IEEE International Conference on Pervasive Services, ICPS 2005.
[24]
W.-S. Ku, R. Zimmermann, H. Wang, and C.-N. Wan. Adaptive Nearest Neighbor Queries in Travel Time Networks. In GIS 2005.
[25]
G. H. K. Lam, H. V. Leong, and S. C. F. Chan. GBL: Group-Based Location Updating in Mobile Environment. In DASFAA 2004.
[26]
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian Multidimensional k Anonymity. In ICDE 2006.
[27]
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Effcient Full-Domain k Anonymity. In SIGMOD 2005.
[28]
A. Meyerson and R. Williams. On the Complexity of Optimal k Anonymity. In PODS 2004.
[29]
M. F. Mokbel. Towards Privacy-Aware Location-Based Database Servers. In Proceedings of the ICDE International Workshop on Privacy Data Management, PDM 2006.
[30]
M. F. Mokbel, W. G. Aref, S. E. Hambrusch, and S. Prabhakar. Towards Scalable Location-aware Services:Requirements and Research Issues. In GIS 2003.
[31]
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The New Casper: Query Procesing for Location Services without Compromising Privacy. In VLDB 2006.
[32]
M. Papadopouli and H. Schulzrinne. Effects of Power Conservation, Wireless Coverage and Cooperation on Data Dissemination among Mobile Devices. In MobiHoc 2001.
[33]
A. K. Parekh. Selecting Routers in Ad-Hoc Wireless Network. In Proceedings of the International Telecommunications Symposium 1994.
[34]
J. Reed, K. Krizman, B. Woerner, and T. Rappaport. An Overview of the Challenges and Progress in Meeting the E-911 Requirement for Location Service. IEEE Personal Communications Magazine 5(3):30--37, 1998.
[35]
H. Schwetman. User's Guide CSIM19 Simulation Engine (C++ Version)Mesquite Software Inc.
[36]
R. Stewart and Q. Xie. Stream Control Transmission Protocol (SCTP): a reference guide Addison-Wesley Publishing Company, Boston, 2001.
[37]
L. Sweeney. Achieving k Anonymity Privacy Protection using Generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5):571--588, 2002.
[38]
L. Sweeney. k Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5):557--570,2002.
[39]
USA Today. Authorities:GPS System Used to Stalk Woman. http://www.usatoday.com/tech/news/2002-12-30-gps- stalker x.htm, Dec 30, 2002.
[40]
J. Warrior, E. McHenry, and K. McGee. They Know Where You Are. IEEE Spectrum 40(7):20--25, 2003.

Cited By

View all
  • (2024)Distributed, Privacy-Aware Location Data Aggregation2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)10.1109/TPS-ISA62245.2024.00014(31-40)Online publication date: 28-Oct-2024
  • (2024)OLBS: Oblivious Location-Based ServicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334787419(2231-2243)Online publication date: 2024
  • (2024)A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoTIEEE Internet of Things Journal10.1109/JIOT.2023.330807311:4(5745-5756)Online publication date: 15-Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GIS '06: Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
November 2006
264 pages
ISBN:1595935290
DOI:10.1145/1183471
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 November 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. location privacy and spatial cloaking
  2. location-based services
  3. mobile computing

Qualifiers

  • Article

Conference

CIKM06
Sponsor:
CIKM06: Conference on Information and Knowledge Management
November 10 - 11, 2006
Virginia, Arlington, USA

Acceptance Rates

Overall Acceptance Rate 257 of 1,238 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)4
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Distributed, Privacy-Aware Location Data Aggregation2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)10.1109/TPS-ISA62245.2024.00014(31-40)Online publication date: 28-Oct-2024
  • (2024)OLBS: Oblivious Location-Based ServicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334787419(2231-2243)Online publication date: 2024
  • (2024)A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoTIEEE Internet of Things Journal10.1109/JIOT.2023.330807311:4(5745-5756)Online publication date: 15-Feb-2024
  • (2024)Location Privacy Protection Method with Route Constraints2024 33rd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN61486.2024.10637583(1-6)Online publication date: 29-Jul-2024
  • (2024)Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSsPeer-to-Peer Networking and Applications10.1007/s12083-024-01728-5Online publication date: 24-May-2024
  • (2024)Decentralized Privacy-Preserving Solution Through Blockchain Smart Contracts and Spatial Cloaking for Ride Sharing ApplicationIntelligent Computing10.1007/978-3-031-62273-1_24(377-395)Online publication date: 15-Jun-2024
  • (2023)A Privacy-Preserving Ride Matching Scheme for Ride Sharing Services in a Hot Spot AreaElectronics10.3390/electronics1204091512:4(915)Online publication date: 11-Feb-2023
  • (2023) PEAK: Privacy-Enhanced Incentive Mechanism for Distributed K -Anonymity in LBS IEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.3295451(1-14)Online publication date: 2023
  • (2023)Privacy Protection Scheme for the Internet of Vehicles Based on Collaborative ServicesIEEE Internet of Things Journal10.1109/JIOT.2023.326282710:15(13342-13353)Online publication date: 1-Aug-2023
  • (2023)Hexanonymity: a scalable geo-positioned data clustering algorithm for anonymisation purposes2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00050(396-404)Online publication date: Jul-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media