Abstract
This article presents an overview of privacy problems and solutions to data in location based services, with the emphasis on understanding location privacy issues, alternative models, and architectures. It concludes with an outlook in location privacy research and its impact on mobile Internet, pervasive computing, and geo-spatial data management.
- ]]A. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003. Google ScholarDigital Library
- ]]A. Beresford and F. Stajano. Mix zones: user privacy in location-aware services. In International Workshop on Pervasive Computing and Communications Security, 2004. Google ScholarDigital Library
- ]]B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with privacygrid. In WWW, 2008. Google ScholarDigital Library
- ]]B. Bamba, L. Liu, P. Yu, and A. Iyengar. Distributed processing of spatial alarms: a safe region-based approach. In ICDCS, 2009. Google ScholarDigital Library
- ]]J. Cuellar, J. Morris, and D. Mulligan. Internet Engineering Task Force Geopriv Requirements. Technical Report, http://www.ietf.org/html.charters/geopriv-charter.html, October, 2002. Google ScholarDigital Library
- ]]M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In 3rd International Conference on Pervasive Computing, 2005. Google ScholarDigital Library
- ]]B. Gedik and L. Liu. Protecting location privacy: a personalized anonymization model. In ICDCS, 2005. Google ScholarDigital Library
- ]]B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Transactions on Mobile Computing, 2008. Google ScholarDigital Library
- ]]G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In SIGMOD, 2008. Google ScholarDigital Library
- ]]G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: anonymous location-based queries in distributed mobile systems. In WWW, 2007. Google ScholarDigital Library
- ]]M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In 1st International Conference on Mobile Systems, Applications and Services, 2002. Google ScholarDigital Library
- ]]B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in GPS traces via uncertainty-aware path cloaking. In ACM Conference on Computer and Communications Security, pages 161--171, 2007. Google ScholarDigital Library
- ]]B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J. Herrera, A. Bayen, M. Annavaram, and Q. Jacobson. Virtual trip lines for distributed privacy-preserving traffic monitoring. In MobiSys 2008, pages 15--28, 2008. Google ScholarDigital Library
- ]]P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE, 19(12), 2007. Google ScholarDigital Library
- ]]A. Khoshgozaran, H. Shirani-Mehr, and C. Shahabi. Spiral: a scalable private information retrieval approach to location privacy. In Int. Workshop on Privacy-Aware Location-based Mobile Services, 2008. Google ScholarDigital Library
- ]]L. Liu. From data privacy to location privacy: models and algorithms, Tutorial, VLDB 2007. Google ScholarDigital Library
- ]]A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-Diversity: Privacy beyond k-anonymity. In ICDE, 2006. Google ScholarDigital Library
- ]]M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The New Casper: query processing for location services without compromising privacy. In VLDB, 2006. Google ScholarDigital Library
- ]]M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In MDM, 2008. Google ScholarDigital Library
- ]]P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. SRI International, SRI-CSL-98-04, 1998.Google Scholar
- ]]T. Wang and L. Liu. From data privacy to location privacy. A Chapter in Machine Learning in Cyber Trust: Reliability, Security, Privacy. Springer-Verlag, 2008.Google Scholar
- ]]T. Wang and L. Liu. Privacy-aware mobile services over road networks. In VLDB, 2009.Google ScholarDigital Library
- ]]M. Yiu, C. Jensen, X. Huang, H. Lu. Spacetwist: managing the tradeoffs among location privacy, query performance, and query accuracy in mobile services. In ICDE, 2008. Google ScholarDigital Library
Index Terms
- Privacy and location anonymization in location-based services
Recommendations
Protecting location privacy using location semantics
KDD '11: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data miningAs the use of mobile devices increases, a location-based service (LBS) becomes increasingly popular because it provides more convenient context-aware services. However, LBS introduces problematic issues for location privacy due to the nature of the ...
Location Privacy Protection Scheme Based on Location Services
ICCNS '19: Proceedings of the 2019 9th International Conference on Communication and Network SecurityLocation-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location privacy protection scheme is proposed,...
Feeling-based location privacy protection for location-based services
CCS '09: Proceedings of the 16th ACM conference on Computer and communications securityAnonymous location information may be correlated with restricted spaces such as home and office for subject re-identification. This makes it a great challenge to provide location privacy protection for users of location-based services. Existing work ...
Comments