Abstract
Recent advances in positioning techniques, small devices, GIS-based services, and ubiquitous connectivity, have enabled a large variety of location-based services able to tailor services according to the location of the individual requiring the service. Location information, however, if on one side is critical for providing customized services, on the other hand, if misused, can lead to privacy breaches. By cross-referencing location information about an individual with other information and by exploiting domain knowledge, an attacker may infer sensitive information about the individual, such as healthcare or financial information. To address such problems, different techniques have been proposed that are based on two main approaches: location cloaking, under which a suitable large region is returned to the service provider instead of the precise user location [1]; location k-anonymization, under which the location of an individual is returned to the service provider only if it is indistinguishable with respect to the location of other k-1 individuals [5, 6]. These techniques have, however, a major drawback in that they do not take into account domain knowledge, and are thus prone to location inference attacks [2]. Given a generalized location of an individual, obtained for example through location cloaking, such an attack exploits the knowledge about the semantics of spatial entities to infer bounds about the location of an individual that are more precise with respect to the generalized location. Another major drawback is that those approaches do not support personalized privacy preferences. We believe that supporting such preferences is crucial in that different individuals have different preferences with respect to which location are considered privacy-sensitive.
- R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar. Preserving user location privacy in mobile data management infrastructures. In 6th Workshop on Privacy Enhancing Technologies, volume 4258 of LNCS, pages 393--412, 2006. Google ScholarDigital Library
- M. L. Damiani, E. Bertino, and C. Silvestri. PROBE: an obfuscation system for the protection of sensitive location information in LBS. CERIAS Technical Report, 2008.Google Scholar
- G. Ghinita, M. L. Damiani, E. Bertino, C. Silvestri. Interactive location cloaking with the PROBE obfuscator. In International Conference on Mobile Data Management (MDM 2009), Taipei (Taiwan), May 18-20, 2009. Google ScholarDigital Library
- G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services, anonymizers are not necessary. In ACM SIGMOD Conference on Management of Data (SIGMOD 2008), Vancouver (Canada), June 10--12, 2008. Google ScholarDigital Library
- P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719--1733, 2007. Google ScholarDigital Library
- M. F. Mokbel, C.-Y. Chow, and W. Aref. The New Casper: query processing for location services without compromising privacy. In 32nd International Conference on Very Large Databases (VLDB 2006), Seoul (Korea), September 12--15, 2006. Google ScholarDigital Library
- H. Samet. Foundations of multidimensional and metric data structures. Morgan Kaufmann Publishers, 2006. Google ScholarDigital Library
Index Terms
- Privacy-preserving techniques for location-based services
Recommendations
Privacy Preserving for Location-Based Services Using Location Transformation
Cyberspace Safety and SecurityAbstractWith the increasing popularity of mobile communication devices loaded with positioning capabilities (e.g.,GPS), there is growing demand for enjoying location-based services (LBSs). An important problem in LBSs is the disclosure of a user’s real ...
Preserving location privacy without exact locations in mobile services
Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most existing cloaking ...
Comments