Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A taxonomy of approaches to preserve location privacy in location-based services

Published: 01 November 2010 Publication History

Abstract

The ubiquity of smartphones and other location-aware hand-held devices has resulted in a dramatic increase in popularity of location-based services (LBS) tailored to users' locations. The comfort of LBS comes with a privacy cost. Various distressing privacy violations caused by sharing sensitive location information with potentially malicious services have highlighted the importance of location privacy research aiming to protect users' privacy while interacting with LBS. This paper presents a taxonomy of different approaches proposed to enable location privacy in LBS and elaborates on the strengths and weaknesses of each class of approaches.

References

[1]
Asonov, D. and Freytag, J. (2002) 'Almost optimal private information retrieval', PET, pp.209-223.
[2]
Bettini, C., Wang, X. and Jajodia, S. (2005) 'Protecting privacy against location-based personal identification', Secure Data Management, pp.185-199.
[3]
Chor, B., Kushilevitz, E., Goldreich, O. and Sudan, M. (1998) 'Private information retrieval', J. ACM, Vol. 45, No. 6, pp.965-981.
[4]
Chow, C., Mokbel, M. and Liu, X. (2006) 'A peer-to-peer spatial cloaking algorithm for anonymous location-based service', GIS, pp.171-178.
[5]
Du, J., Xu, J., Tang X. and Hu, H. (2007) 'iPDA: supporting privacy-preserving location-based mobile services', MDM, pp.212-214.
[6]
Duckham, M. and Kulik, L. (2005) 'A formal model of obfuscation and negotiation for location privacy', Pervasive, pp.152-170.
[7]
Gedik, B. and Liu L. (2005b) 'Location privacy in mobile systems: a personalized anonymization model', ICDCS, pp.620-629.
[8]
Gedik, B. and Liu, L. (2005) 'A customizable k-anonymity model for protecting location privacy', ICDS.
[9]
Ghinita, G., Kalnis, P. and Skiadopoulos S. (2007b) 'PRIVE: anonymous location-based queries in distributed mobile systems', WWW, pp.371-380.
[10]
Ghinita, G., Kalnis, P. and Skiadopoulos, S. (2007c) 'MobiHide: a mobilea peer-to-peer system for anonymous location-based queries', SSTD, pp.221-238.
[11]
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C. and Tan, K. (2008) 'Private queries in location based services: anonymizers are not necessary', SIGMOD, pp.121-132.
[12]
Gruteser, M. and Grunwald, D. (2003) 'Anonymous usage of location-based services through spatial and temporal cloaking', MobiSys, pp.31-42.
[13]
Hengartner, U. (2007) 'Hiding location information from location-based services', First International Workshop on Privacy-Aware Location-based Mobile Services (PALMS), in conjuction with MDM, pp.268-272.
[14]
Indyk, P. and Woodruff, D. (2006) 'Polylogarithmic private approximations and efficient matching', TCC, pp.245-264.
[15]
Kalnis, P. and Ghinita, G., Mouratidis, K. and Papadias, D. (2006) 'Preserving anonymity in location based services', Technical Report TRB6/06, National University of Singapore.
[16]
Khoshgozaran A. and Shahabi, C. (2007) 'Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy', SSTD, pp.239-257.
[17]
Khoshgozaran, A., Shirani-Mehr, H. and Shahabi, C. (2008) 'SPIRAL: a scalable private information retrieval approach to location privacy', The 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS), In conjunction with MDM'08.
[18]
Kido, H., Yanagisawa, Y. and Satoh, T. (2005) 'An anonymous communication technique using dummies for location-based services', IEEE International Conference on Pervasive Services, p.1248.
[19]
Kushilevitz, E. and Ostrovsky, R. (1997) 'Replication is NOT needed: SINGLE database, computationally-private information retrieval', FOCS, pp.364-373.
[20]
Lin, D. (2006) 'Indexing and querying moving objects databases', PhD thesis, National University of Singapore, pp.122-163.
[21]
Mokbel, M., Chow, C. and Aref, W. (2006) 'The new Casper: query processing for location services without compromising privacy', VLDB, pp.763-774.
[22]
Schroeder, M. (1990) Number Theory in Science and Communication, 2nd ed., Springer, New York.
[23]
Smith, S. and Safford, D. (2001) 'Practical server privacy with secure coprocessors', IBM Systems Journal, Vol. 40, No. 3.
[24]
Yiu, M., Jensen, C., Huang, X. and Lu, H. (2008) 'SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services', ICDE, pp.366-375.
[25]
Zhong, G., Goldberg, I. and Hengartner, U. (2007) 'Louis, Lester and Pierre: three protocols for location privacy', PET, pp.62-76.
[26]
Zhong, S., Li, L., Liu, Y. and Yang, Y. (2004) 'Privacy-preserving location-based services for mobile users in wireless networks', Technical Report YALEU/DCS/TR-1297, Yale University.

Cited By

View all
  • (2022)Anonymous Trajectory Method for Indoor Users for Privacy ProtectionComputational Science and Its Applications – ICCSA 202210.1007/978-3-031-10522-7_8(104-112)Online publication date: 4-Jul-2022
  • (2019)Analysis of the Quality of Points of Interest in the Most Popular Location-based GamesProceedings of the 20th International Conference on Computer Systems and Technologies10.1145/3345252.3345286(153-160)Online publication date: 21-Jun-2019
  • (2018)Protecting Privacy in Location-Based Services Through Location Anonymization Using Cloaking Algorithms Based on Connected ComponentsWireless Personal Communications: An International Journal10.1007/s11277-018-5852-9102:1(449-471)Online publication date: 1-Sep-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image International Journal of Computational Science and Engineering
International Journal of Computational Science and Engineering  Volume 5, Issue 2
November 2010
88 pages
ISSN:1742-7185
EISSN:1742-7193
Issue’s Table of Contents

Publisher

Inderscience Publishers

Geneva 15, Switzerland

Publication History

Published: 01 November 2010

Author Tags

  1. LBS
  2. information sharing
  3. location privacy
  4. location-based services
  5. privacy protection
  6. sensitive information
  7. sensitive location information
  8. spatial databases
  9. spatial query processing
  10. taxonomy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Anonymous Trajectory Method for Indoor Users for Privacy ProtectionComputational Science and Its Applications – ICCSA 202210.1007/978-3-031-10522-7_8(104-112)Online publication date: 4-Jul-2022
  • (2019)Analysis of the Quality of Points of Interest in the Most Popular Location-based GamesProceedings of the 20th International Conference on Computer Systems and Technologies10.1145/3345252.3345286(153-160)Online publication date: 21-Jun-2019
  • (2018)Protecting Privacy in Location-Based Services Through Location Anonymization Using Cloaking Algorithms Based on Connected ComponentsWireless Personal Communications: An International Journal10.1007/s11277-018-5852-9102:1(449-471)Online publication date: 1-Sep-2018
  • (2017)Trajectory anonymisation based on graph split using EMDInternational Journal of Computational Science and Engineering10.1504/IJCSE.2017.1000502614:3(290-298)Online publication date: 1-Jan-2017
  • (2016)Utility-based anonymisation for dataset with multiple sensitive attributesInternational Journal of High Performance Computing and Networking10.1504/ijhpcn.2016.0804129:5-6(401-408)Online publication date: 1-Jan-2016
  • (2016)ABAKAComputer Communications10.1016/j.comcom.2016.03.00285:C(1-13)Online publication date: 1-Jul-2016
  • (2016)Location K-anonymity in indoor spacesGeoinformatica10.1007/s10707-015-0241-y20:3(415-451)Online publication date: 1-Jul-2016
  • (2014)A classification of location privacy attacks and approachesPersonal and Ubiquitous Computing10.1007/s00779-012-0633-z18:1(163-175)Online publication date: 1-Jan-2014

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media