Location privacy: going beyond K-anonymity, cloaking and anonymizers

被引:0
|
作者
Ali Khoshgozaran
Cyrus Shahabi
Houtan Shirani-Mehr
机构
[1] University of Southern California,Department of Computer Science
来源
关键词
Location privacy; Spatial databases; Location-based services; Private information retrieval;
D O I
暂无
中图分类号
学科分类号
摘要
With many location-based services, it is implicitly assumed that the location server receives actual users locations to respond to their spatial queries. Consequently, information customized to their locations, such as nearest points of interest can be provided. However, there is a major privacy concern over sharing such sensitive information with potentially malicious servers, jeopardizing users’ private information. The anonymity- and cloaking-based approaches proposed to address this problem cannot provide stringent privacy guarantees without incurring costly computation and communication overhead. Furthermore, they require a trusted intermediate anonymizer to protect user locations during query processing. This paper proposes a fundamental approach based on private information retrieval to process range and K-nearest neighbor queries, the prevalent queries used in many location-based services, with stronger privacy guarantees compared to those of the cloaking and anonymity approaches. We performed extensive experiments on both real-world and synthetic datasets to confirm the effectiveness of our approaches.
引用
收藏
页码:435 / 465
页数:30
相关论文
共 50 条
  • [21] Location K-anonymity in indoor spaces
    Kim, Joon-Seok
    Li, Ki-Joune
    [J]. GEOINFORMATICA, 2016, 20 (03) : 415 - 451
  • [22] Location K-anonymity in indoor spaces
    Joon-Seok Kim
    Ki-Joune Li
    [J]. GeoInformatica, 2016, 20 : 415 - 451
  • [23] A trusted de-swinging k-anonymity scheme for location privacy protection
    Manxiang Yang
    Baopeng Ye
    Yuling Chen
    Tao Li
    Yixian Yang
    Xiaobin Qian
    Xiaomei Yu
    [J]. Journal of Cloud Computing, 11
  • [24] LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection
    Wang, Yunfeng
    Li, Mingzhen
    Luo, Shoushan
    Xin, Yang
    Zhu, Hongliang
    Chen, Yuling
    Yang, Guangcan
    Yang, Yixian
    [J]. IEEE ACCESS, 2019, 7 : 182886 - 182905
  • [25] Achieving Effective k-Anonymity for Query Privacy in Location-Based Services
    Wang, Jinbao
    Li, Yingshu
    Yang, Donghua
    Gao, Hong
    Luo, Guangchun
    Li, Jianzhong
    [J]. IEEE ACCESS, 2017, 5 : 24580 - 24592
  • [26] An Encryption-based K-anonymity Approach for Location Privacy Protection in LBS
    Jia, Jinying
    Zhang, Fengli
    Wu, Rongchun
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 1852 - 1855
  • [27] A semantic k-anonymity privacy protection method for publishing sparse location data
    Yang, Xudong
    Gao, Ling
    Wang, Hai
    Zheng, Jie
    Guo, Hongbo
    [J]. 2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2019, : 216 - 222
  • [28] A trusted de-swinging k-anonymity scheme for location privacy protection
    Yang, Manxiang
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    Yu, Xiaomei
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [29] Achieving k-anonymity in Privacy-Aware Location-Based Services
    Niu, Ben
    Li, Qinghua
    Zhu, Xiaoyan
    Cao, Guohong
    Li, Hui
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 754 - 762
  • [30] Towards internal privacy and flexible K-anonymity
    Hellani, Hussein
    Kilany, Rima
    Sokhn, Maria
    [J]. 2015 INTERNATIONAL CONFERENCE ON APPLIED RESEARCH IN COMPUTER SCIENCE AND ENGINEERING (ICAR), 2015,