The design and analysis of spatial data structures
The design and analysis of spatial data structures
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Inference Control in Statistical Databases, From Theory to Practice
Inference Control in Statistical Databases, From Theory to Practice
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
A Free Terrain Model for Trajectory K---Anonymity
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
A k-Anonymity Model for Spatio-Temporal Data
ICDEW '07 Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering Workshop
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
K-anonymity in indoor spaces through hierarchical graphs
Proceedings of the Fourth ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness
Preserving location privacy without exact locations in mobile services
Frontiers of Computer Science: Selected Publications from Chinese Universities
Privacy disclosure risk: smartphone user guide
International Journal of Mobile Network Design and Innovation
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
Hi-index | 0.00 |
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution approaches that have been proposed to tackle this problem, K-anonymity has received increased attention and has been extensively studied in various forms. New forms of data that come into existence, like location data capturing user movement, pave the way for the offering of cutting edge services such as the prevailing Location Based Services (LBSs). Given that these services assume an in-depth knowledge of the mobile users' whereabouts it is certain that the assumed knowledge may breach the privacy of the users. Thus, concrete approaches are necessary to preserve the anonymity of the mobile users when requesting LBSs. In this work, we survey recent advancements for the offering of K-anonymity in LBSs. Most of the approaches that have been proposed heavily depend on a trusted server component -- that acts as an intermediate between the end user and the service provider - to preserve the anonymity of the former entity. Existing approaches are partitioned in three categories: (a) historical K-anonymity, (b) location K-anonymity, and (c) trajectory K-anonymity. In each of these categories we present some of the most prevalentmethodologies that have been proposed and highlight their operation.