On location privacy and quality of information in participatory sensing

Participatory sensing applications typically bind sensor data to locations. Location privacy preserving mechanisms protecting the location of users introduce therefore an uncertainty in the collected data distributions. We consider two strategies to reconstruct a data distribution after k-anonymity has been applied to the users' location information. We investigate how different parameters for the location privacy preserving mechanism influence both the quality of information and the location privacy of the users. Our results show that the cloak area resulted from applying k-anonymity has a higher impact on both the quality of information and the location privacy than the number of users, k, that are cloaked together.

[1]  Mark H. Hansen,et al.  Participatory sensing - eScholarship , 2006 .

[2]  Marco Gruteser,et al.  Privacy-Aware Location Sensor Networks , 2003, HotOS.

[3]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[4]  Reza Shokri,et al.  A distortion-based metric for location privacy , 2009, WPES '09.

[5]  Grigorios Loukides,et al.  Data utility and privacy protection trade-off in k-anonymisation , 2008, PAIS '08.

[6]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Roy H. Campbell,et al.  Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[8]  Ninghui Li,et al.  On the tradeoff between privacy and utility in data publishing , 2009, KDD.

[9]  Chatschik Bisdikian,et al.  On Sensor Sampling and Quality of Information: A Starting Point , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[10]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[11]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[12]  Carmela Troncoso,et al.  Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.

[13]  Tien Pham,et al.  QoI-based resource allocation for multi-target tracking in energy constrained sensor networks , 2011, 14th International Conference on Information Fusion.

[14]  Kin K. Leung,et al.  QoI-Aware Wireless Sensor Network Management for Dynamic Multi-Task Operations , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[15]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[16]  Alun D. Preece,et al.  Quality views: capturing and exploiting the user perspective on data quality , 2006, VLDB.

[17]  Wen Hu,et al.  Ear-phone: an end-to-end participatory urban noise mapping system , 2010, IPSN '10.

[18]  Nicholas R. Jennings,et al.  Decentralized control of adaptive sampling in wireless sensor networks , 2009, TOSN.

[19]  Waylon Brunette,et al.  Data MULEs: modeling a three-tier architecture for sparse sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[20]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[21]  Marco Gruteser,et al.  USENIX Association , 1992 .

[22]  Dan Suciu,et al.  The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.

[23]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[24]  E. Paulos,et al.  Sensing Atmosphere , 2007 .

[25]  Edith C. H. Ngai,et al.  On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.

[26]  Romit Roy Choudhury,et al.  Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.