The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. To protect location privacy the usual strategy is to obfuscate the actual position of the user with a coarse location and then forward the obfuscated location to the LBS provider. Existing techniques for location obfuscation are only based on geometric methods.We state that such techniques do not protect against privacy attacks rooted in the knowledge of the spatial context. We thus present a novel framework for the safeguard of sensitive locations comprehensive of a privacy model and an algorithm for the computation of obfuscated locations
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Atallah and K. Frikken. Privacy-preserving location-dependent query processing. In ACS/IEEE Intl. Conf. on Pervasive Services (ICPS), 2004.
A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
L. Brun and W. Kropatsch. Contains and inside relationships within combinatorial pyramids. Pattern Recognition, 39(4), 2006.
W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: a review and open problems. In NSPW ’01: Proceedings of the 2001 workshop on New security paradigms, pages 13-22, New York, NY, USA, 2001. ACM.
M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Pervasive Computing, volume 3468 of Lecture Notes in Computer Science LNCS, pages 152-170. Springer Berlin / Heidelberg, 2005.
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys ’03: Proceedings of the 1st international conference on Mobile systems, applications and services, pages 31-42, New York, NY, USA, 2003. ACM Press.
In-Stat. http://www.instat.com/press.asp?id=2140&sku=in0703846wt. Publication date: 5 November 2007.
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719-1733, 2007.
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In 22nd IEEE International Conference on Data Engineering, 2006.
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: query processing for location services without compromising privacy. In VLDB’2006: Proceedings of the 32nd international conference on Very large data bases, pages 763-774. VLDB Endowment, 2006.
M. Molenaar. An Introduction to the Theory of Spatial Object Modelling for GIS. CRC Press, 1998.
Open GIS Consortium. Open GIS simple features specification for SQL, 1999. Revision 1.1.
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):571-588, 2002.
X. Xiao and Y. Tao. Personalized privacy preservation. In SIGMOD ’06: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pages 229-240, New York, NY, USA, 2006. ACM.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Damiani, M.L., Bertino, E., Silvestri, C. (2008). Protecting Location Privacy through Semantics-aware Obfuscation Techniques. In: Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C.D. (eds) Trust Management II. IFIPTM 2008. IFIP – The International Federation for Information Processing, vol 263. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09428-1_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-09428-1_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09427-4
Online ISBN: 978-0-387-09428-1
eBook Packages: Computer ScienceComputer Science (R0)