skip to main content
research-article

Privacy-preserving techniques for location-based services

Published:01 July 2009Publication History
Skip Abstract Section

Abstract

Recent advances in positioning techniques, small devices, GIS-based services, and ubiquitous connectivity, have enabled a large variety of location-based services able to tailor services according to the location of the individual requiring the service. Location information, however, if on one side is critical for providing customized services, on the other hand, if misused, can lead to privacy breaches. By cross-referencing location information about an individual with other information and by exploiting domain knowledge, an attacker may infer sensitive information about the individual, such as healthcare or financial information. To address such problems, different techniques have been proposed that are based on two main approaches: location cloaking, under which a suitable large region is returned to the service provider instead of the precise user location [1]; location k-anonymization, under which the location of an individual is returned to the service provider only if it is indistinguishable with respect to the location of other k-1 individuals [5, 6]. These techniques have, however, a major drawback in that they do not take into account domain knowledge, and are thus prone to location inference attacks [2]. Given a generalized location of an individual, obtained for example through location cloaking, such an attack exploits the knowledge about the semantics of spatial entities to infer bounds about the location of an individual that are more precise with respect to the generalized location. Another major drawback is that those approaches do not support personalized privacy preferences. We believe that supporting such preferences is crucial in that different individuals have different preferences with respect to which location are considered privacy-sensitive.

References

  1. R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar. Preserving user location privacy in mobile data management infrastructures. In 6th Workshop on Privacy Enhancing Technologies, volume 4258 of LNCS, pages 393--412, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. L. Damiani, E. Bertino, and C. Silvestri. PROBE: an obfuscation system for the protection of sensitive location information in LBS. CERIAS Technical Report, 2008.Google ScholarGoogle Scholar
  3. G. Ghinita, M. L. Damiani, E. Bertino, C. Silvestri. Interactive location cloaking with the PROBE obfuscator. In International Conference on Mobile Data Management (MDM 2009), Taipei (Taiwan), May 18-20, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services, anonymizers are not necessary. In ACM SIGMOD Conference on Management of Data (SIGMOD 2008), Vancouver (Canada), June 10--12, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719--1733, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. F. Mokbel, C.-Y. Chow, and W. Aref. The New Casper: query processing for location services without compromising privacy. In 32nd International Conference on Very Large Databases (VLDB 2006), Seoul (Korea), September 12--15, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Samet. Foundations of multidimensional and metric data structures. Morgan Kaufmann Publishers, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy-preserving techniques for location-based services

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image SIGSPATIAL Special
              SIGSPATIAL Special  Volume 1, Issue 2
              July 2009
              31 pages
              EISSN:1946-7729
              DOI:10.1145/1567253
              Issue’s Table of Contents

              Copyright © 2009 Author

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 July 2009

              Check for updates

              Qualifiers

              • research-article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader