Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1667502.1667511acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Protecting location privacy against spatial inferences: the PROBE approach

Published: 03 November 2009 Publication History

Abstract

The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscation, to protect location privacy is based on forwarding the LSB provider a coarse user location instead of the actual user location. Conventional approaches, based on such technique, are however based only on geometric methods and therefore are unable to assure privacy when the adversary is aware of the geographical context. This paper provides a comprehensive solution to this problem. Our solution presents a novel approach that obfuscates the user location by taking into account the geographical context and user's privacy preferences. We define several theoretical notions underlying our approach. We then propose a strategy for generating obfuscated spaces and an efficient algorithm which implements such a strategy. The paper includes several experimental results assessing performance, storage requirements and accuracy for the approach. The paper also discusses the system architecture and shows that the approach can be deployed also for clients running on small devices.

References

[1]
M. Damiani, E. Bertino, and C. Silvestri. Protecting location privacy through semantics-aware obfuscation techniques. In Proc. of IFIPTM 2008, pages 231--245. Springer Boston, June 18--20 2008.
[2]
M. L. Damiani, E. Bertino, and C. Silvestri. PROBE: an obfuscation system for the protection of sensitive location information in lbs. CERIAS Technical Report, Purdue University, 2008.
[3]
M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Pervasive Computing. Springer, 2005.
[4]
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proc. of the 25th IEEE ICDCS, 2005.
[5]
G. Ghinita, M. Damiani, E. Bertino, and C. Silvestri. Interactive Location Cloaking with the PROBE Obfuscator. In Proc. of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009.
[6]
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L.Tan. Private Queries in Location Based Services: Anonymizers are not Necessary. In Proc. ACM SIGMOD Conference, 2008.
[7]
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of the 1st international conference on Mobile systems, applications and services. ACM Press, 2003.
[8]
U. Hengartner and P. Steenkiste. Access control to people location information. ACM Trans. Inf. Syst. Secur., 8(4):424--456, 2005.
[9]
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE, 2007.
[10]
B. Krishnamachari, G. Ghinita, and P. Kalnis. Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites. In Proc. SSDBM, 2008.
[11]
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. 1-Diversity: Privacy Beyond k-Anonymity. In Proc. ICDE, 2006.
[12]
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new Casper: query processing for location services without compromising privacy. In Proc. VLDB, pages 763--774, 2006.
[13]
D. Moore. C Library Hilbert. c. http://www.caam.rice.edu/dougm.
[14]
G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56--64, 2003.
[15]
Open GIS Consortium. Open GIS simple features specification for SQL, 1999. Revision 1.1.
[16]
N. Poolsappasit and I. Ray. Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy, 2:1:77--99, 2009.
[17]
H. Samet. Foundations of Multidimensional and Metric data Structures. Morgan Kaufmann, 2006.
[18]
E. Snekkenes. Concepts for personal location privacy policies. In EC '01: Proceedings of the 3rd ACM conference on Electronic Commerce, pages 48--57, New York, NY, USA, 2001. ACM Press.
[19]
X. Xiao and Y. Tao. Personalized privacy preservation. In Proc. of the 2006 ACM SIGMOD, pages 229--240, New York, NY, USA, 2006. ACM.
[20]
P. H. Xue M., Kalnis P. Location Diversity: Enhanced Privacy Protection in Location Based Services. In Proc. of the International Symposium on Location and Context Awareness (LoCA), 2009.
[21]
M. L. Yiu, C. Jensen, X. Huang, and H. Lu. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In proc. IEEE 24th International Conference on Data Engineering, 2008.
[22]
M. Youssef, V. Atluri, and N. R. Adam. Preserving mobile customer privacy: an access control system for moving objects and customer profiles. In Proc. MDM, 2005.

Cited By

View all
  • (2022)Implementation of novel polygon‐based obfuscation methods to improve privacy of agricultural dataTransactions in GIS10.1111/tgis.1300927:1(84-104)Online publication date: 30-Dec-2022
  • (2022)Data science for pedestrian and high street retailing as a framework for advancing urban informatics to individual scalesUrban Informatics10.1007/s44212-022-00009-x1:1Online publication date: 3-Oct-2022
  • (2020)Privacy- and Context-aware Release of Trajectory DataACM Transactions on Spatial Algorithms and Systems10.1145/33634496:1(1-25)Online publication date: 30-Jan-2020
  • Show More Cited By

Index Terms

  1. Protecting location privacy against spatial inferences: the PROBE approach

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SPRINGL '09: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
      November 2009
      79 pages
      ISBN:9781605588537
      DOI:10.1145/1667502
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 November 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. location based services
      2. location privacy

      Qualifiers

      • Research-article

      Conference

      GIS '09
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 28 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Implementation of novel polygon‐based obfuscation methods to improve privacy of agricultural dataTransactions in GIS10.1111/tgis.1300927:1(84-104)Online publication date: 30-Dec-2022
      • (2022)Data science for pedestrian and high street retailing as a framework for advancing urban informatics to individual scalesUrban Informatics10.1007/s44212-022-00009-x1:1Online publication date: 3-Oct-2022
      • (2020)Privacy- and Context-aware Release of Trajectory DataACM Transactions on Spatial Algorithms and Systems10.1145/33634496:1(1-25)Online publication date: 30-Jan-2020
      • (2020)HBLP: A Privacy Protection Framework for TIP Attributes in NTTP-Based LBS SystemsIEEE Access10.1109/ACCESS.2020.29856598(67718-67734)Online publication date: 2020
      • (2020)A Comparative Study of Location Privacy Preservation in the Internet of ThingsProcedia Computer Science10.1016/j.procs.2020.04.189171(1760-1769)Online publication date: 2020
      • (2019)A geographic map-based middleware framework to obfuscate smart vehicles’ locationsMultimedia Tools and Applications10.1007/s11042-019-7350-9Online publication date: 15-Mar-2019
      • (2018)Can Spatial Transformation-Based Privacy Preservation Compromise Location Privacy?Trust, Privacy and Security in Digital Business10.1007/978-3-319-98385-1_6(69-84)Online publication date: 27-Jul-2018
      • (2017)Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost OptimizationSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-319-72389-1_14(153-168)Online publication date: 7-Dec-2017
      • (2017)Verifiable mobile online social network privacy‐preserving location sharing schemeConcurrency and Computation: Practice and Experience10.1002/cpe.423829:24Online publication date: 14-Aug-2017
      • (2016)The Effect of Location Granularity on Semantic Location InferencesProceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS)10.1109/HICSS.2016.276(2197-2204)Online publication date: 5-Jan-2016
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media