Beyond the thin client model for location privacy

Location privacy in emerging location-based applications has been the center of extensive research in the past decade. While a number of efficient models and algorithms have been proposed over the years, majority of them were designed assuming a thin client model of computing. As a result, the dependence on third party systems, or the requirement for significant upgrades to the application architecture, could not be eliminated. The state-of-the-art in current mobile devices is now comparable to traditional desktop systems five years ago, presenting us the opportunity to move beyond the thin client model. Motivated by this observation, we propose a novel architecture for performing location-based points-of-interest search, where the client device can locally determine the top results using a small amount of metadata from the server. Precise location data of the user is never transmitted outside the device. We demonstrate that the computational power required to efficiently execute the algorithms is within the capabilities of current mobile devices.

[1]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[2]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[3]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[4]  Roberto Di Pietro,et al.  Time Warp: How Time Affects Privacy in LBSs , 2010, ICICS.

[5]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[6]  Ying Cai,et al.  Feeling-based location privacy protection for location-based services , 2009, CCS.

[7]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[8]  Marco Gruteser,et al.  USENIX Association , 1992 .

[9]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[10]  Kien A. Hua,et al.  Query l-diversity in Location-Based Services , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[11]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[12]  Panos Kalnis,et al.  A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..

[13]  Cyrus Shahabi,et al.  Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.

[14]  Carmela Troncoso,et al.  Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.