Privacy Preserving Location Monitoring System Using Score Based K-Anonymity

  • Lakshmi Prasanna YeluriEmail author
  • E Madhusudhana Reddy
Conference paper
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 3)


In LBS, providing privacy to the user’s location information is a major concern. Location Privacy is an emerging area where a lot of research is being carried out focusing on the anonymous location information. K-anonymization is a traditional and popular privacy preserving technique that generates Cloaked Region (CR) where the query issuer cannot be distinguished among the k-1 other users in the CR. Cloaking is a technique which blurs the user location into a Cloaked Region (CR) that satisfies the privacy parameter specified by the user at query time. This paper provides a method for generating best minimized cloaked region for transfer of the data between the users. By updating the trajectory and location information of the users, Location Privacy can be further improved.


Cloaking Location Anonymizer LBS Location Privacy K-anonymity 


  1. 1.
    Song D, Park K (2016) A privacy-preserving location based system for continuous spatial queries. Mob Inf Syst 2016:1–9.
  2. 2.
    Zhang W, Song B, Bai E (2016) A trusted real time scheduling model for wireless sensor networks. J Sens 1:9.
  3. 3.
    Wang D, Cheng H, Wang P (2016) On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst J 12(1):916–925Google Scholar
  4. 4.
    Niu B, Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. In: Proceedings in IEEE INFOCOM.
  5. 5.
    Priya Iyer KB, Shanthi V (2013) Study on privacy aware location based service. J Sci Ind Res 72:294–299Google Scholar
  6. 6.
    Wang Y, Xu D, He X, Zhang C, Li F, Xu B (2012) L2P2: location-aware location privacy protection for location-based services. In: Proceedings in IEEE INFOCOMGoogle Scholar
  7. 7.
    Tyagi AK, Sreenath N (2015) A comparitive study on privacy preserving techniques for location based services. Br J Math Comput Sci 10(4):1–25. ISSN:2231-0851CrossRefGoogle Scholar
  8. 8.
    El Emam K, Dankar FK (2008) Protecting privacy using k-Anonymity. J Am Med Inf Assoc 15(5):627–637Google Scholar
  9. 9.
    Kido H, Yanagisawa Y, Satoh T (2005) Protection of location privacy using dummies for location-based services. In: ICDEW ‘05, proceedings of the 21st international conference on data engineering workshops, April 05–08, pp 12–48Google Scholar
  10. 10.
    Pan X, Jianliang X, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. J IEEE Trans Knowl Data Eng 24(8):1506–1519CrossRefGoogle Scholar
  11. 11.
    Vu K, Zheng R, Gao J (2012) Efficient algorithms for K-anonymous location privacy in participatory sensing. In: Proceedings in IEEE INFOCOMGoogle Scholar
  12. 12.
    Song D, Sim J, Park K, Song M (2015) A privacy-preserving continuous location monitoring system for location-based services. Int J Distrib Sens Netw 11(8):815613. Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Lakshmi Prasanna Yeluri
    • 1
    Email author
  • E Madhusudhana Reddy
    • 2
  1. 1.Department of CSEJNTUHHyderabadIndia
  2. 2.Department of CSEGuruNanak Institutions Technical CampusHyderabadIndia

Personalised recommendations