Speed protection algorithms for privacy-aware location management

Nowadays, millions of users share their complete movement trajectory online when using real-time traffic monitoring applications, pay-as-you-drive insurances, or when sharing their last road trip with friends. However, many users still hesitate to use location-based applications as they are not willing to reveal, for instance, their driving behavior or the occurrence of a speeding violation. Therefore, we present novel speed protection algorithms protecting users from revealing a violation of given speed limits when using location-based applications. Our algorithms support time-based and distance-based position updates. To protect positions indicating a speeding violation, we either adjust temporal information by delaying position updates or adjust their spatial information. We evaluate our algorithms by using real world traces and show that the protected movement trajectory of the user is of high quality even after removing speeding violations.

[1]  Robert B. Noland,et al.  Current map-matching algorithms for transport applications: State-of-the art and future research directions , 2007 .

[2]  David Wetherall,et al.  Toward trustworthy mobile sensing , 2010, HotMobile '10.

[3]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[4]  Frank Dürr,et al.  A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.

[5]  Pierangela Samarati,et al.  A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..

[6]  Elisa Bertino,et al.  Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications , 2011, IEEE Pervasive Computing.

[7]  Kurt Rothermel,et al.  A map-based dead-reckoning protocol for updating location information , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[8]  Matthias Grossglauser,et al.  A parsimonious model of mobile partitioned networks with clustering , 2009, 2009 First International Communication Systems and Networks and Workshops.

[9]  Frank Dürr,et al.  Position sharing for location privacy in non-trusted systems , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[10]  Liviu Iftode,et al.  Privately querying location-based services with SybilQuery , 2009, UbiComp.

[11]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[12]  Philippe Golle,et al.  On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.

[13]  Kurt Rothermel,et al.  A Comparison of Protocols for Updating Location Information , 2001, Cluster Computing.

[14]  Frank Dürr,et al.  PShare: Ensuring location privacy in non-trusted systems through multi-secret sharing , 2013, Pervasive Mob. Comput..

[15]  Marco Cremonini,et al.  Landscape-aware location-privacy protection in location-based services , 2009, J. Syst. Archit..

[16]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.