Protection of query privacy for continuous location based services
- 1 April 2011
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 0743166X,p. 1710-1718
- https://doi.org/10.1109/infcom.2011.5934968
Abstract
Location-based services (LBS) have become an immensely valuable source of real-time information and guidance. Nonetheless, the potential abuse of users' sensitive personal data by an LBS server is evolving into a serious concern. Privacy concerns in LBS exist on two fronts: location privacy and query privacy. In this paper we investigate issues related to query privacy. In particular, we aim to prevent the LBS server from correlating the service attribute, e.g., bar/tavern, in the query to the user's real-world identity. Location obfuscation using spatial generalization aided by anonymization of LBS queries is a conventional means to this end. However, effectiveness of this technique would abate in continuous LBS scenarios, i.e., where users are moving and recurrently requesting for LBS. In this paper, we present a novel query-perturbation-based scheme that protects query privacy in continuous LBS even when user-identities are revealed. Unlike most exiting works, our scheme does not require the presence of a trusted third party.Keywords
This publication has 23 references indexed in Scilit:
- A distributed k-anonymity protocol for location privacyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Non-Exposure Location AnonymityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Navigate like a cabbiePublished by Association for Computing Machinery (ACM) ,2008
- SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile ServicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Exploring Historical Location Data for Anonymity Preservation in Location-Based ServicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- PRIVEPublished by Association for Computing Machinery (ACM) ,2007
- Protecting Moving Trajectories with DummiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Protecting privacy in continuous location-tracking applicationsIEEE Security & Privacy, 2004
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- The NP-completeness column: An ongoing guideJournal of Algorithms, 1987