Exploring Historical Location Data for Anonymity Preservation in Location-Based Services
- 1 April 2008
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 0743166X,p. 547-555
- https://doi.org/10.1109/infocom.2008.103
Abstract
We present a new approach for if-anonymity protection in Location-Based Services (LBSs). Specifically, we depersonalize location information by ensuring that each location reported for LBSs is a cloaking area that contains K different footprints-historical locations of different mobile nodes. Therefore, the exact identity and location of the service requestor remain anonymous from LBS service providers. Existing techniques, on the other hand, compute the cloaking area using current locations of K neighboring hosts of the service requestor. Because of this difference, our approach significantly reduces the cloaking area, which in turn decreases query processing and communication overhead for returning query results to the requesting host. In addition, existing techniques also require frequent location updates from all nodes, regardless of whether or not these nodes are requesting LBSs. Most importantly, our approach is the first practical solution that provides K-anonymity trajectory protection needed to ensure anonymity when a mobile host requests LBSs continuously as it moves. Our solution depersonalizes a user's trajectory (a time-series of the user's locations) based on the historical trajectories of other users. We evaluate our techniques under various conditions using location data synthetically generated based on real road maps. The results show that our techniques can provide K-anonymity trajectory protection using a minimized cloaking area.Keywords
This publication has 15 references indexed in Scilit:
- Protecting Location Privacy with Personalized k-Anonymity: Architecture and AlgorithmsIEEE Transactions on Mobile Computing, 2007
- Location anonymity in continuous location-based servicesPublished by Association for Computing Machinery (ACM) ,2007
- A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing EnvironmentsIEEE Transactions on Vehicular Technology, 2006
- Mondrian Multidimensional K-AnonymityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- An anonymous communication technique using dummies for location-based servicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- IncognitoPublished by Association for Computing Machinery (ACM) ,2005
- On the complexity of optimal K-anonymityPublished by Association for Computing Machinery (ACM) ,2004
- Location privacy in pervasive computingIEEE Pervasive Computing, 2003
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSIONInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- An algorithm for tracking multiple targetsIEEE Transactions on Automatic Control, 1979