Non-Exposure Location Anonymity
- 1 March 2009
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 10636382,p. 1120-1131
- https://doi.org/10.1109/icde.2009.106
Abstract
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shaped cloaked region (usually a circle or a rectangle). However, to obtain such a cloaked region, all existing cloaking algorithms require to know the accurate locations of all users. Since such information is exactly what the user wants to hide, these algorithms can work only if all parties involved in the cloaking process are trusted. However, in practice this assumption rarely holds as any of these parties could be malicious. Therefore, location cloaking without exposing the accurate user location to any party is urgently needed. In this paper, we present such a non-exposure cloaking algorithm. It is designed for k-anonymity and cloaking is performed based on the proximity information among mobile users, instead of directly on their coordinates. We decompose the problem into two subproblems --- proximity minimum k-clustering and secure bounding, and develop distributed algorithms for both of them. Experimental results consistently show that these algorithms are efficient and robust under various proximity topologies and system settings.Keywords
This publication has 18 references indexed in Scilit:
- Private queries in location based servicesPublished by Association for Computing Machinery (ACM) ,2008
- Protecting Location Privacy with Personalized k-Anonymity: Architecture and AlgorithmsIEEE Transactions on Mobile Computing, 2007
- Protecting Moving Trajectories with DummiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Preserving User Location Privacy in Mobile Data Management InfrastructuresLecture Notes in Computer Science, 2006
- An anonymous communication technique using dummies for location-based servicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Small worlds in wireless networksIEEE Communications Letters, 2003
- Preserving privacy in environments with location-based applicationsIEEE Pervasive Computing, 2003
- Location privacy in pervasive computingIEEE Pervasive Computing, 2003
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- The diameter of random regular graphsCombinatorica, 1982