The active badge location system
ACM Transactions on Information Systems (TOIS)
SIGMOD '95 Proceedings of the 1995 ACM SIGMOD international conference on Management of data
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
A Framework for Generating Network-Based Moving Objects
Geoinformatica
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
K-Nearest Neighbor Search for Moving Query Point
SSTD '01 Proceedings of the 7th International Symposium on Advances in Spatial and Temporal Databases
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
SINA: scalable incremental processing of continuous queries in spatio-temporal databases
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Real-Time Processing of Range-Monitoring Queries in Heterogeneous Mobile Databases
IEEE Transactions on Mobile Computing
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Continuous nearest neighbor search
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
Distortion-based anonymity for continuous queries in location-based mobile services
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Preserving privacy for location-based services with continuous queries
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Proceedings of the 16th ACM international conference on Supporting group work
Achieving efficient query privacy for location based services
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Query-aware location anonymization for road networks
Geoinformatica
Privacy-aware mobile location-based systems
Proceedings of the 1st international workshop on Mobile location-based service
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Grid-based cloaking area creation scheme supporting continuous location-based services
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Countering overlapping rectangle privacy attack for moving kNN queries
Information Systems
Protecting User Privacy Better with Query l-Diversity
International Journal of Information Security and Privacy
Location-aware private service discovery in pervasive computing environment
Information Sciences: an International Journal
Preserving location privacy without exact locations in mobile services
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
A major concern for large-scale deployment of location-based services (LBSs) is the potential abuse of their client location data, which may imply sensitive personal information. Location privacy protection is challenging because a location itself may reveal a subject's identity. To support location anonymity, existing research reduces location resolution by ensuring each location reported to a service provider is a cloaking area that contains at least K mobile nodes. This strategy is effective when each location update can be considered as an independent event. In this paper, we investigate location anonymity in the context of continuous LBSs, which require frequent location updates from service users. Knowing that a user is inside a cloaking area constrains its position in the next cloaking area. Thus, simply ensuring each cloaking area contains at least K users does not give a user K-anonymity protection. We propose to measure the anonymity degree of a cloaking area using entropy, which takes into account not only the number of the entities inside, but also their anonymity probability distribution. To find a cloaking area that can provide a given level of anonymity protection and is also as small as possible, we present a novel technique with a polynomial time complexity. The effectiveness of our techniques is studied under various conditions using location data synthetically generated using real road maps and traffic volume data. The results show that our techniques can indeed protect user anonymity at a desired level, and at the same time, minimize the size of each cloaking area, allowing users to receive high quality services.