Anonymization models for directional location based service environments
نویسندگان
چکیده
Location based services (LBS) aim to deliver information based on a mobile user’s location. However, knowledge of the location can be used by an adversary to physically locate the person, leading to the risk of physical harm, as well as possible leakage of certain personal information. This has serious consequences on privacy. The concept of location kanonymity has been proposed to address this. Under this notion of anonymity, the adversary only has the knowledge that the LBS request is originating from a region containing at least k people, and therefore cannot individually distinguish the user. However, the existing anonymity models ignore the movement information of mobile users, assuming that it has no impact on privacy. Thus, existing work cannot ensure complete privacy while serving advanced type of LBS requests that require information about direction as well as speed of motion. We denote such LBS services as directional LBS. The key observation we make in this paper is that, in addition to the user’s location, the user’s movement direction should also be considered to ensure true anonymization. In this paper, we extend the notion of location k-anonymity by incorporating user’s moving direction into the anonymization process while serving directional LBS. Specifically, our anonymization methods generalize both location and direction to the extent specified by the user. Our experimental results demonstrate that such anonymization can be achieved with marginal increase in computational cost when compared to the traditional location kanonymity, while providing increased anonymity. a 2009 Elsevier Ltd. All rights reserved.
منابع مشابه
PRIVACYGRID: Supporting Anonymous Location Queries in Mobile Environments
We present PRIVACYGRID − a framework for supporting anonymous location-based queries in mobile information delivery systems. The PRIVACYGRID framework offers three unique capabilities. First, we provide a location privacy preference profile model, called location P3P, which allows mobile users to explicitly define their preferred location privacy requirements in terms of both location hiding me...
متن کاملPrivacy Preservation for Location-Based Services Based on Attribute Visibility
To provide a high-quality mobile service in a safe way, many techniques for location anonymity have been proposed in recent years. Advanced location-based services such as mobile advertisement services may use not only users’ locations but also users’ attributes. However, the existing location anonymization methods do not consider attribute information and may result in low-quality privacy prot...
متن کاملFrom Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consi...
متن کاملLocation Data Privacy Preservation in Mobile Networks
Uncontrolled variety of location based service (LBS) applications in mobile networks led to the loss of individual user location data privacy. To preserve privacy in mobile networks data randomization and anonymization must be used because of location data uncertainty. By data randomization additional random data is added to the original location data, desensitizing the precise information cont...
متن کاملAnonymization in Proactive Location Based Community Services
Location information of mobile users is very sensitive with regard to privacy. This is especially true for proactive location based services (LBSs) where users are continuously tracked. Effective privacy enhancing technologies for these services are still an open field of research. In this paper, we focus on proactive location based community services (PLBCSs), such as mobile gaming or buddy tr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 29 شماره
صفحات -
تاریخ انتشار 2010