Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks

نویسندگان

  • Lei Jin
  • Balaji Palanisamy
  • James Joshi
چکیده

Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' location privacy while traveling on road networks. However, a fundamental limitation of such mechanisms is that users in the system are inherently trusted and assumed to always report their true locations. Such vulnerability can lead to a new class of attacks called location injection attacks which can successfully break users’ anonymity among a set of users through the injection of fake user accounts and incorrect location updates. In this paper, we characterize location injection attacks and demonstrate their effectiveness through experiments on real-world geographic maps and discuss possible defense mechanisms to protect against such attacks. General Terms Security

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach for Ensuring Robust Support for Location Privacy and Identity Inference Protection

The challenge of preserving a user’s location privacy is more important now than ever before with the proliferation of handheld devices and the pervasive use of location based services. To protect location privacy, we must ensure k-anonymity so that the user remains indistinguishable among k-1 other users. There is no better way but to use a location anonymizer (LA) to achieve k-anonymity. Howe...

متن کامل

Location Privacy Preserving without Exact Locations in Mobile Services

Privacy preservation has recently received considerable attention in location-based services. A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most of existing cloaking approaches assume that mobile users are trusted. And exact locations are required to protect location privacy, which are just the information mobile ...

متن کامل

Protecting location privacy and query privacy: a combined clustering approach

In this paper, a combined clustering algorithm namely enhanced clustering cloak (ECC), for protecting location privacy and query privacy is proposed. An iterative K-means clustering method is developed to group the user requests into clusters for providing location safety. Meanwhile, a hierarchical clustering method for preserving the query privacy is used when creating clusters. ECC provides u...

متن کامل

Authentication User's Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services

Location based services (LBSs) are gaining importance due to the advancement in mobile networks and positioning technologies. The proliferation of location-based services in recent years has highlighted the need to consider location privacy. This has led to the development of methods enhancing location privacy, and to the investigation of reasons for sharing location information. While computat...

متن کامل

A fast privacy-preserving framework for continuous location-based queries in road networks

The prevalence of location based services (LBS) gives rise to personal privacy concerns as users share their locations and queries to obtain desired services. For continuous queries where users report their locations periodically, attackers can infer more about users' privacy by analyzing the correlations of their snapshot samples. Traditional privacy-preserving solutions designed in Euclidean ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015