An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Protection of Location Privacy using Dummies for Location-based Services
ICDEW '05 Proceedings of the 21st International Conference on Data Engineering Workshops
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy
MDMW '08 Proceedings of the 2008 Ninth International Conference on Mobile Data Management Workshops
Hiding Location Information from Location-Based Services
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
Realistic Driving Trips For Location Privacy
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
On the privacy of web search based on query obfuscation: a case study of TrackMeNot
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
An Obfuscation-Based Approach for Protecting Location Privacy
IEEE Transactions on Dependable and Secure Computing
Caché: caching location-enhanced content to improve user privacy
ACM SIGMOBILE Mobile Computing and Communications Review
On the effectiveness of anonymizing networks for web search privacy
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
On the limitations of query obfuscation techniques for location privacy
Proceedings of the 13th international conference on Ubiquitous computing
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Hi-index | 0.00 |
Location-Based Services (LBSs) have been gaining popularity due to a wide range of interesting and important applications being developed. However, the users availing such services are concerned about their location privacy, in that they are forced to reveal their sensitive location information to untrusted third-parties. In this paper, we propose a new privacy-preserving approach, Cover Locations, which allows a user to access an LBS without revealing his/her actual location. Based on its current location, the user's device queries for a few specifically chosen surrounding locations and constructs the results corresponding to its location from the results obtained for each queried location. Since the user location does not leave the user's device - as either a latitude and longitude pair, or as an obfuscated region - the user is guaranteed very high level of privacy. The Cover Locations approach only requires minimal changes on the user's device and can be readily deployed by privacy-conscious users. An adversary, trying to identify the user location, can only resolve the location to few triangular regions and not to the actual location itself. We evaluate the privacy provided by Cover Locations based on the number of locations queried and the total area under the resolved triangular regions. We also ascertain the robustness of Cover Locations approach when the adversary has access to a short-term user history, employing machine learning techniques. Overall, our results show that the proposed solution, which requires minor computations without the need for any out-of-band information such as traffic densities in a region or the road network information, is superior to other client-based solutions.