Cloaking games in location based services

  • Authors:
  • Gabriele Gianini;Ernesto Damiani

  • Affiliations:
  • University of Milan, Crema, Italy;University of Milan, Crema, Italy

  • Venue:
  • Proceedings of the 2008 ACM workshop on Secure web services
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

A prototypical case of data anonymization is location anonymization: here the most common data anonymization technique - k -anonymity - corresponds to cloaking and consists in providing to the potential attacker a large granularity view of the user location. However the anonymizer should take into account that if the landscape is not neutral - so that some user locations are more likely than others - then the attacker could perform some inferences over the data received and lower substantially the anonymity level with respect to the nominal one, associated to a specific cloak. Data anonymization can be considered a two players' game: given a user position, there are in general several cloaks of a given size that the anonymizer can provide to the potential attacker, furthermore upon receiving a cloak the latter can choose among different points where to deliver an attack; the outcome of the game for each participant depends not only on his own strategy, but also on the strategy of the other player. A specific pair of strategies will be considered a solution to the game if none of the players (who are considered fully rational) could gain benefit by leaving that behavior unilaterally. This solution can be used as a reference solution, to determine the size of the cloak suitable to fulfill specific anonymity constraints, or to determine the relative effectiveness of other obfuscation solutions. This paper extends the results introduced in a previous work and analyzes a new communication scenario.