[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11957454_23guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Preserving user location privacy in mobile data management infrastructures

Published: 28 June 2006 Publication History

Abstract

Location-based services, such as finding the nearest gas station, require users to supply their location information. However, a user's location can be tracked without her consent or knowledge. Lowering the spatial and temporal resolution of location data sent to the server has been proposed as a solution. Although this technique is effective in protecting privacy, it may be overkill and the quality of desired services can be severely affected. In this paper, we suggest a framework where uncertainty can be controlled to provide high quality and privacy-preserving services, and investigate how such a framework can be realized in the GPS and cellular network systems. Based on this framework, we suggest a data model to augment uncertainty to location data, and propose imprecise queries that hide the location of the query issuer and yields probabilistic results. We investigate the evaluation and quality aspects for a range query. We also provide novel methods to protect our solutions against trajectory-tracing. Experiments are conducted to examine the effectiveness of our approaches.

References

[1]
Warrior, J., McHenry, E., McGee, K.: They know where you are. IEEE Spectrum 40(7) (2003) 20-25.
[2]
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. 1st Intl. Conf. on Mobile Systems, Applications, and Services. (2003).
[3]
Varshney, U.: Location management for mobile commerce applications in wireless internet environment. ACM Transactions on Internet Technology 3(3) (2003).
[4]
Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1) (2003) 46-55.
[5]
Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM conference on Electronic Commerce, ACM Press (2001) 48-57.
[6]
Hengartner, U., Steenkiste, P.: Protecting Access to People Location Information. In: Proc. 1st Intl. Conf. on Security in Pervasive Computing. (2003).
[7]
Hengartner, U., Steenkiste, P.: Access control to information in pervasive computing environments. In: Proc. 9th USENIX Workshop on HotOS. (2003).
[8]
Cheng, R., Prabhakar, S.: Using uncertainty to provide privacy-preserving and high-quality location-based services. In: Workshop on Location Systems Privacy and Control, MobileHCI 04. (2004).
[9]
Atallah, M., Frikken, K.: Privacy-preserving location-dependent query processing. In: Proc. ACS/IEEE Intl. Conf. on Pervasive Services (ICPS). (2004).
[10]
Mokbel, M., Xiong, X., Aref, W.: SINA: Scalable incremental processing of continuous queries in spatio-temporal databases. In: Proc. ACM SIGMOD. (2004).
[11]
Pfitzmann, A., Hansen, M.: Anonymity, unobservability, psuedonymity, and identity management - a proposal for terminology. (2004).
[12]
Sweeney, L.: k-anonymity: a model for protecting privacy. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5) (2002).
[13]
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proc. ACM SIGMOD Intl. Conf. (2005).
[14]
Bertino, E., Ooi, B., Yang, Y., Deng, R.: Privacy and ownership preserving of outsourced medical data. In: Proc. IEEE ICDE. (2005).
[15]
Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Security and Privacy 2(2) (2004).
[16]
Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS. (2005).
[17]
Cheng, R., Kalashnikov, D., Prabhakar, S.: Evaluating probabilistic queries over imprecise data. In: Proc. ACM SIGMOD. (2003).
[18]
Serjantov, A., Danezis, G.: Towards an information metric for anonymity. In: Privacy Enhancing Technologies: 2nd Intl. Workshop, PET 2002. (2002).
[19]
Berg, M., Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry - Algorithms and Applications, 2nd ed. Springer Verlag (2000).
[20]
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Querying private data in moving-object environments. Technical Report CERIAS TR #2005-45, Purdue U (2005).
[21]
Kaufman, J., Myllymaki, J., Jackson, J.: IBM City Simulator Spatial Data Generator 2.0 (2001).
[22]
Stallings, W.: Wireless Communications and Networks. Prentice Hall (2005).
[23]
Wong, V., Leung, V.: Location management for next-generation personal communications network. IEEE Network (2000).

Cited By

View all
  • (2022)A Run a Day Won't Keep the Hacker AwayProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560616(801-814)Online publication date: 7-Nov-2022
  • (2021)KLPPSSecurity and Communication Networks10.1155/2021/96354112021Online publication date: 1-Jan-2021
  • (2021)Travel Trajectory Frequent Pattern Mining Based on Differential Privacy ProtectionWireless Communications & Mobile Computing10.1155/2021/63795302021Online publication date: 1-Jan-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
PET'06: Proceedings of the 6th international conference on Privacy Enhancing Technologies
June 2006
430 pages
ISBN:3540687904

Sponsors

  • Microsoft: Microsoft
  • Information and Privacy Commissioner's Office (Ontario): Information and Privacy Commissioner's Office (Ontario)

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 28 June 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A Run a Day Won't Keep the Hacker AwayProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560616(801-814)Online publication date: 7-Nov-2022
  • (2021)KLPPSSecurity and Communication Networks10.1155/2021/96354112021Online publication date: 1-Jan-2021
  • (2021)Travel Trajectory Frequent Pattern Mining Based on Differential Privacy ProtectionWireless Communications & Mobile Computing10.1155/2021/63795302021Online publication date: 1-Jan-2021
  • (2021)Location Privacy-preserving Mechanisms in Location-based ServicesACM Computing Surveys10.1145/342316554:1(1-36)Online publication date: 2-Jan-2021
  • (2021)A Dummy Location Selection Algorithm Based on Location Semantics and Physical DistanceInformation Security Practice and Experience10.1007/978-3-030-93206-0_17(283-295)Online publication date: 17-Dec-2021
  • (2019)Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information ServicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.287675214:5(1264-1279)Online publication date: 1-May-2019
  • (2018)Fuzzy-based trusted security for mobile grid systemsInternational Journal of Networking and Virtual Organisations10.1504/IJNVO.2018.09206918:3(211-226)Online publication date: 1-Jan-2018
  • (2018)GANs Based Density Distribution Privacy-Preservation on Mobility DataSecurity and Communication Networks10.1155/2018/92030762018Online publication date: 2-Dec-2018
  • (2018)NTRU Implementation of Efficient Privacy-Preserving Location-Based Querying in VANETWireless Communications & Mobile Computing10.1155/2018/78239792018Online publication date: 1-Jan-2018
  • (2018)P3ACM Transactions on Design Automation of Electronic Systems10.1145/323662523:6(1-19)Online publication date: 28-Nov-2018
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media