Distortion-based anonymity for continuous queries in location-based mobile services
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
A new cloaking algorithm using Hilbert curves for privacy protection
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
Journal of Systems Architecture: the EUROMICRO Journal
Countering overlapping rectangle privacy attack for moving kNN queries
Information Systems
Techniques to protect privacy against inference attacks in location based services
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Private proximity detection and monitoring with vicinity regions
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
Hi-index | 0.00 |
In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing paradigm brings great convenience for information access, it also raises concerns over potential intrusion into user location privacy. To protect location privacy, one typical approach is to cloak user locations into spatial regions based on user-specified privacy requirements, and to transform location-based queries into region-based queries. In this paper, we identify and address three new issues concerning this location cloaking approach. First, we study the representation of cloaking regions and show that a circular region generally leads to a small result size for region-based queries. Second, we develop a mobility-aware location cloaking technique to resist trace analysis attacks. Two cloaking algorithms, namely MaxAccu_Cloak and MinComm_Cloak, are designed based on different performance objectives. Finally, we develop an efficient polynomial algorithm for evaluating circular-region-based kNN queries. Two query processing modes, namely bulk and progressive, are presented to return query results either all at once or in an incremental manner. Experimental results show that our proposed mobility-aware cloaking algorithms significantly improve the quality of location cloaking in terms of an entropy measure without compromising much on query latency or communication cost. Moreover, the progressive query processing mode achieves a shorter response time than the bulk mode by parallelizing the query evaluation and result transmission.