Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1869790.1869795acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Privacy-preserving matching of spatial datasets with protection against background knowledge

Published: 02 November 2010 Publication History

Abstract

Private matching (or join) of spatial datasets is crucial for applications where distinct parties wish to share information about nearby geo-tagged data items. To protect each party's data, only joining pairs of points should be revealed, and no additional information about non-matching items should be disclosed. Previous research efforts focused on private matching for relational data, and rely either on space-embedding or on SMC techniques. Space-embedding transforms data points to hide their exact attribute values before matching is performed, whereas SMC protocols simulate complex digital circuits that evaluate the matching condition without revealing anything else other than the matching outcome.
However, existing solutions have at least one of the following drawbacks: (i) they fail to protect against adversaries with background knowledge on data distribution, (ii) they compromise privacy by returning large amounts of false positives and (iii) they rely on complex and expensive SMC protocols. In this paper, we introduce a novel geometric transformation to perform private matching on spatial datasets. Our method is efficient and it is not vulnerable to background knowledge attacks. We consider two distance evaluation metrics in the transformed space, namely L2 and L∞, and show how the metric used can control the trade-off between privacy and the amount of returned false positives. We provide an extensive experimental evaluation to validate the precision and efficiency of our approach.

References

[1]
R. Agrawal, D. Asonov, M. Kantarcioglu, and Y. Li. Sovereign joins. In Proc. of ICDE, page 26, 2006.
[2]
R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In Proc. of ACM SIGMOD, pages 86--97, 2003.
[3]
L. Arge, O. Procopiuc, S. Ramaswamy, T. Suel, and J. Vitter. Scalable sweeping-based spatial join. In Proc. of VLDB, pages 570--581, 1998.
[4]
T. Brinkhoff, H. Kriegel, and B. Seeger. Efficient processing of spatial joins using R-trees. In Proc. of ACM SIGMOD, pages 237--246, 1993.
[5]
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan. Private Queries in Location Based Services: Anonymizers are not Necessary. In SIGMOD, 2008.
[6]
O. Goldreich. The Foundations of Cryptography, Volume 2. Cambridge University Press, 2004.
[7]
G. R. Hjaltason and H. Samet. Properties of embedding methods for similarity searching in metric spaces. IEEE Trans. Pattern Anal. Mach. Intell., 25(5):530--549, 2003.
[8]
A. Inan, M. Kantarcioglu, E. Bertino, and M. Scannapieco. A hybrid approach to private record linkage. In Proc. of ICDE, pages 496--505, 2008.
[9]
L. Kissner and D. Song. Privacy-preserving set operations. In Advances in Cryptology --- CRYPTO 2005, 2005.
[10]
M.-L. Lo and C. V. Ravishankar. Spatial hash-joins. In Proc. of ACM SIGMOD, pages 247--258, 1996.
[11]
M. F. Mokbel, C. Y. Chow, and W. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. In Proc. of VLDB, 2006.
[12]
S. Ramaswamy, R. Rastogi, and K. Shim. Efficient algorithms for mining outliers from large data sets. In Proc. of ACM SIGMOD, pages 427--438, 2000.
[13]
P. Samarati. Protecting Respondents' Identities in Microdata Release. IEEE TKDE, 13(6):1010--1027, 2001.
[14]
M. Scannapieco, I. Figotin, E. Bertino, and A. K. Elmagarmid. Privacy preserving schema and data matching. In Proc. of ACM SIGMOD, pages 653--664, 2007.
[15]
S. Shekhar and S. Chawla. Spatial Databases: A Tour. Prentice Hall, first edition, 2003.
[16]
W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis. Secure k-NN Computation on Encrypted Databases. In Proc. of ACM SIGMOD, pages 139--152, 2009.
[17]
M. Yakout, M. Atallah, and A. Elmagarmid. Efficient private record linkage. In Proc. of ICDE, pages 1283--1286, 2009.

Cited By

View all
  • (2014)Private Badges for Geosocial NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2013.9513:10(2382-2396)Online publication date: Oct-2014
  • (2014)Privacy-Preserving and Content-Protecting Location Based QueriesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2013.8726:5(1200-1210)Online publication date: 1-May-2014
  • (2013)Private Information RetrievalSynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00524ED1V01Y201307SPT0054:2(1-114)Online publication date: 20-Sep-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GIS '10: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
November 2010
566 pages
ISBN:9781450304283
DOI:10.1145/1869790
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. location privacy
  2. privacy-preserving data linkage

Qualifiers

  • Research-article

Funding Sources

Conference

GIS '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 257 of 1,238 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Private Badges for Geosocial NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2013.9513:10(2382-2396)Online publication date: Oct-2014
  • (2014)Privacy-Preserving and Content-Protecting Location Based QueriesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2013.8726:5(1200-1210)Online publication date: 1-May-2014
  • (2013)Private Information RetrievalSynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00524ED1V01Y201307SPT0054:2(1-114)Online publication date: 20-Sep-2013
  • (2013)Privacy for Location-based ServicesSynthesis Lectures on Information Security, Privacy, and Trust10.2200/S00485ED1V01Y201303SPT0044:1(1-85)Online publication date: 30-Apr-2013
  • (2013)DaisyACM SIGMOD Record10.1145/2430456.243046741:4(39-44)Online publication date: 17-Jan-2013
  • (2013)A Practical Location Privacy Attack in Proximity ServicesProceedings of the 2013 IEEE 14th International Conference on Mobile Data Management - Volume 0110.1109/MDM.2013.19(87-96)Online publication date: 3-Jun-2013
  • (2012)Location privacy attacks based on distance and density informationProceedings of the 20th International Conference on Advances in Geographic Information Systems10.1145/2424321.2424403(514-517)Online publication date: 6-Nov-2012
  • (2012)Privacy-Preserving and Content-Protecting Location Based QueriesProceedings of the 2012 IEEE 28th International Conference on Data Engineering10.1109/ICDE.2012.95(44-53)Online publication date: 1-Apr-2012
  • (2011)Location privacy protection in the presence of users' preferencesProceedings of the 12th international conference on Web-age information management10.5555/2035562.2035602(340-352)Online publication date: 14-Sep-2011
  • (2011)Location Privacy Protection in the Presence of Users’ PreferencesWeb-Age Information Management10.1007/978-3-642-23535-1_30(340-352)Online publication date: 2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media