Skip to main content

Protecting Privacy Against Location-Based Personal Identification

  • Conference paper
Secure Data Management (SDM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3674))

Included in the following conference series:

Abstract

This paper presents a preliminary investigation on the privacy issues involved in the use of location-based services. It is argued that even if the user identity is not explicitly released to the service provider, the geo-localized history of user-requests can act as a quasi-identifier and may be used to access sensitive information about specific individuals. The paper formally defines a framework to evaluate the risk in revealing a user identity via location information and presents preliminary ideas about algorithms to prevent this to happen.

This work is partially supported by NSF under grants IIS-0430402 and IIS-0242237. The work of Bettini is also partially supported by the Italian MIUR (FIRB ”Web-Minds” project N. RBNE01WEJT_005).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beresford, A., Stajano, F.: Mix Zones: User Privacy in Location-aware Services. In: Proc. IEEE Workshop on Pervasive Computing and Communication Security (PerSec), pp. 127–131. IEEE, Los Alamitos (2004)

    Chapter  Google Scholar 

  2. Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  3. Bettini, C., Jajodia, S., Wang, X.S.: Time Granularities in Databases, Data Mining, and Temporal Reasoning. Springer, Heidelberg (2000)

    MATH  Google Scholar 

  4. Bettini, C., Wang, X., Jajodia, S.: Testing complex temporal relationships involving multiple granularities and its application to data mining. In: Proc. of ACM Symposium in Principles of Database Systems (PODS). ACM press, New York (1996)

    Google Scholar 

  5. Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology 1(1), 65–75 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  6. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  7. Cuellar, J., Morris, J., Mulligan, D.: Internet Engineering task force geopriv requirements (2002), http://www.ietf.org/html.charters/geopriv-charter.html

  8. Dalenius, T.: Finding a needle in a haystack – or identifying anonymous census record. Journal of Official Statistics 2(3), 329–336 (1986)

    Google Scholar 

  9. Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. In: The 25th International Conference on Distributed Computing Systems (IEEE ICDCS) (2005)

    Google Scholar 

  10. Goralwalla, I., Leontiev, Y., Özsu, M., Szafron, D., Combi, C.: Temporal Granularity: Completing the Puzzle. J. Intell. Inf. Syst. 16(1), 41–63 (2001)

    Article  MATH  Google Scholar 

  11. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of MobiSys 2003 (2003)

    Google Scholar 

  12. Gruteser, M., Hoh, B.: On the Anonymity of Periodic Location Samples. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 179–192. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Khatib, L., Morris, R.: Generating Scenarios for Periodic Events with Binary Constraints. In: Proc. of TIME, pp. 67–72. IEEE, Los Alamitos (1999)

    Google Scholar 

  14. Samarati, P.: Protecting Respondents’ Identities in Microdata Release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bettini, C., Wang, X.S., Jajodia, S. (2005). Protecting Privacy Against Location-Based Personal Identification. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2005. Lecture Notes in Computer Science, vol 3674. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552338_13

Download citation

  • DOI: https://doi.org/10.1007/11552338_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28798-8

  • Online ISBN: 978-3-540-31974-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics