skip to main content
research-article

Privacy and location anonymization in location-based services

Published:01 July 2009Publication History
Skip Abstract Section

Abstract

This article presents an overview of privacy problems and solutions to data in location based services, with the emphasis on understanding location privacy issues, alternative models, and architectures. It concludes with an outlook in location privacy research and its impact on mobile Internet, pervasive computing, and geo-spatial data management.

References

  1. ]]A. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ]]A. Beresford and F. Stajano. Mix zones: user privacy in location-aware services. In International Workshop on Pervasive Computing and Communications Security, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ]]B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with privacygrid. In WWW, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ]]B. Bamba, L. Liu, P. Yu, and A. Iyengar. Distributed processing of spatial alarms: a safe region-based approach. In ICDCS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ]]J. Cuellar, J. Morris, and D. Mulligan. Internet Engineering Task Force Geopriv Requirements. Technical Report, http://www.ietf.org/html.charters/geopriv-charter.html, October, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ]]M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In 3rd International Conference on Pervasive Computing, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. ]]B. Gedik and L. Liu. Protecting location privacy: a personalized anonymization model. In ICDCS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ]]B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Transactions on Mobile Computing, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. ]]G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In SIGMOD, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. ]]G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: anonymous location-based queries in distributed mobile systems. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ]]M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In 1st International Conference on Mobile Systems, Applications and Services, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. ]]B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in GPS traces via uncertainty-aware path cloaking. In ACM Conference on Computer and Communications Security, pages 161--171, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. ]]B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J. Herrera, A. Bayen, M. Annavaram, and Q. Jacobson. Virtual trip lines for distributed privacy-preserving traffic monitoring. In MobiSys 2008, pages 15--28, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. ]]P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE, 19(12), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. ]]A. Khoshgozaran, H. Shirani-Mehr, and C. Shahabi. Spiral: a scalable private information retrieval approach to location privacy. In Int. Workshop on Privacy-Aware Location-based Mobile Services, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. ]]L. Liu. From data privacy to location privacy: models and algorithms, Tutorial, VLDB 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. ]]A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-Diversity: Privacy beyond k-anonymity. In ICDE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. ]]M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The New Casper: query processing for location services without compromising privacy. In VLDB, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. ]]M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In MDM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. ]]P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. SRI International, SRI-CSL-98-04, 1998.Google ScholarGoogle Scholar
  21. ]]T. Wang and L. Liu. From data privacy to location privacy. A Chapter in Machine Learning in Cyber Trust: Reliability, Security, Privacy. Springer-Verlag, 2008.Google ScholarGoogle Scholar
  22. ]]T. Wang and L. Liu. Privacy-aware mobile services over road networks. In VLDB, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. ]]M. Yiu, C. Jensen, X. Huang, H. Lu. Spacetwist: managing the tradeoffs among location privacy, query performance, and query accuracy in mobile services. In ICDE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy and location anonymization in location-based services

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image SIGSPATIAL Special
        SIGSPATIAL Special  Volume 1, Issue 2
        July 2009
        31 pages
        EISSN:1946-7729
        DOI:10.1145/1567253
        Issue’s Table of Contents

        Copyright © 2009 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 July 2009

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader