Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2245276.2232010acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Indistinguishable regions in geographic privacy

Published: 26 March 2012 Publication History

Abstract

The ubiquity of positioning devices poses a natural security challenge: users want to take advantage of location-related services as well as social sharing of their position but at the same time have security concerns about how much information should be shared about their exact position. This paper discusses different location-privacy problems, their formalization and the novel notion of indistinguishability regions that allows one to proof that a given obfuscation function provides a good trade-off between location sharing and privacy.

References

[1]
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati. An Obfuscation-Based Approach for Protecting Location Privacy. IEEE Trans. Dependable Secur. Comput., 8: 13--27, January 2011.
[2]
R. Barnes, M. Thomson, J. Winterbottom, and H. Tschofenig. Location Configuration Extensions for Policy Management. http://www.ietf.org/id/draft-ietf-geopriv-policy-uri-01.txt, June 2011.
[3]
A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 02(1): 46--55, 2003.
[4]
G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems. In Proceedings of the 16th international conference on World Wide Web, WWW '07, pages 371--380, New York, NY, USA, 2007. ACM.
[5]
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pages 31--42, New York, NY, USA, 2003. ACM.
[6]
R. Kim. Location-based services worth $10B by 2016. http://gigaom.com/2011/06/09/location-based-services-worth-10b-by-2016/, June 2011.
[7]
J. Krumm. Inference Attacks on Location Tracks. In Proceedings of the 5th international conference on Pervasive computing, PERVASIVE'07, pages 127--143, Berlin, Heidelberg, 2007. Springer-Verlag.
[8]
P. Samarati and L. Sweeney. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. In Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P), Oakland, CA, May 1998.
[9]
H. Schulzrinne, H. Tschofenig, J. Morris, J. Cuellar, J. Polk, and J. Rosenberg. Common Policy: A Document Format for Expressing Privacy Preferences. http://tools.ietf.org/html/rfc4745, Feb 2007.
[10]
Senator Edwards, J. Location Privacy Protection Act of 2001. http://www.techlawjournal.com/cong107/privacy/location/s1164is.asp, July 2001.
[11]
J.-H. Song, V. W. Wong, and V. C. Leung. Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks. Mob. Netw. Appl., 15: 160--171, February 2010.
[12]
M. Thomson. Obscuring Location. http://tools.ietf.org/html/draft-thomson-geopriv-location-obscuring-03, June 2011.
[13]
C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-Related Privacy in Geo-Social Networks. IEEE Internet Computing, 15: 20--27, 2011.
[14]
A. F. Westin. Privacy and Freedom. New York Atheneum, 1 edition, 1967.

Cited By

View all
  • (2022)Constrained Proximity Attacks on Mobile TargetsACM Transactions on Privacy and Security10.1145/349854325:2(1-29)Online publication date: 4-Mar-2022
  • (2021) Protecting the Moving User’s Locations by Combining Differential Privacy and -Anonymity under Temporal Correlations in Wireless Networks Wireless Communications and Mobile Computing10.1155/2021/66919752021(1-12)Online publication date: 2-Feb-2021
  • (2020)Where Are You Bob? Privacy-Preserving Proximity Testing with a Napping PartyComputer Security – ESORICS 202010.1007/978-3-030-58951-6_33(677-697)Online publication date: 12-Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
March 2012
2179 pages
ISBN:9781450308571
DOI:10.1145/2245276
  • Conference Chairs:
  • Sascha Ossowski,
  • Paola Lecca
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 March 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. indistinguishability
  2. location privacy
  3. obfuscation

Qualifiers

  • Research-article

Funding Sources

Conference

SAC 2012
Sponsor:
SAC 2012: ACM Symposium on Applied Computing
March 26 - 30, 2012
Trento, Italy

Acceptance Rates

SAC '12 Paper Acceptance Rate 270 of 1,056 submissions, 26%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Constrained Proximity Attacks on Mobile TargetsACM Transactions on Privacy and Security10.1145/349854325:2(1-29)Online publication date: 4-Mar-2022
  • (2021) Protecting the Moving User’s Locations by Combining Differential Privacy and -Anonymity under Temporal Correlations in Wireless Networks Wireless Communications and Mobile Computing10.1155/2021/66919752021(1-12)Online publication date: 2-Feb-2021
  • (2020)Where Are You Bob? Privacy-Preserving Proximity Testing with a Napping PartyComputer Security – ESORICS 202010.1007/978-3-030-58951-6_33(677-697)Online publication date: 12-Sep-2020
  • (2019)What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-netJournal of Reliable Intelligent Environments10.1007/s40860-019-00075-0Online publication date: 26-Feb-2019
  • (2018)Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker StrategiesComputer Security10.1007/978-3-319-98989-1_19(373-392)Online publication date: 7-Aug-2018
  • (2016)MaxPace: Speed-constrained location queries2016 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2016.7860479(136-144)Online publication date: Oct-2016
  • (2015)Visual analytics methodology for scalable and privacy-respectful discovery of place semantics from episodic mobility dataProceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III10.5555/3120539.3120566(254-258)Online publication date: 7-Sep-2015
  • (2015)In-Network Trajectory Privacy PreservationACM Computing Surveys10.1145/281818348:2(1-29)Online publication date: 12-Oct-2015
  • (2015)InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol2015 13th Annual Conference on Privacy, Security and Trust (PST)10.1109/PST.2015.7232947(1-6)Online publication date: Jul-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media