Modeling location obfuscation for continuous query

Abstract One of the major problems of location-based services is ensuring the location privacy of a mobile user. However, it becomes more challenging in the case of a continuously moving user. Though many techniques for preserving location privacy for continuous query scenario have been studied in the last decade, a formal approach for quantification of privacy and justification for the correctness of the privacy guarantee remains mostly at infancy level. In this paper, we present a theoretical model for location obfuscation that is flexible enough to express several obfuscation mechanisms and allow to reason about their privacy guarantees. We illustrate the effectiveness of our theoretical model by analyzing a popular square grid-based obfuscation mechanism.

[1]  Benjamin C. M. Fung,et al.  Differentially Private Trajectory Data Publication , 2011, ArXiv.

[2]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[3]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[4]  Chi-Yin Chow,et al.  Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.

[5]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[6]  Marco Gruteser,et al.  USENIX Association , 1992 .

[7]  Vikram Goyal,et al.  Preserving Location Privacy for Continuous Queries on Known Route , 2011, ICISS.

[8]  Vikram Goyal,et al.  Privacy of location obfuscation , 2012 .

[9]  Michael Alan Caplinger,et al.  Cover story: they know where you are , 2003 .

[10]  Sushil Jajodia,et al.  Anonymity in Location-Based Services: Towards a General Framework , 2007, 2007 International Conference on Mobile Data Management.

[11]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[12]  P A Karger,et al.  SECURITY AND PRIVACY THREATS TO ITS , 1995 .

[13]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[14]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[15]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[16]  Ernesto Damiani,et al.  Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.

[17]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[18]  Chi-Yin Chow,et al.  Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks , 2008, SIGMOD Conference.

[19]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[20]  Dan Suciu,et al.  Relationship privacy: output perturbation for queries with joins , 2009, PODS.

[21]  Einar Snekkenes,et al.  Concepts for personal location privacy policies , 2001, EC '01.

[22]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[23]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[24]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[25]  Ling Liu,et al.  MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[26]  Dan Suciu,et al.  A formal analysis of information disclosure in data exchange , 2007, J. Comput. Syst. Sci..

[27]  Hao Li Important properties of planar normal tiling , 2009 .

[28]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[29]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[30]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[31]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[32]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..