Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
N. Adam, and J. Wortman. Security-control methods for statistical databases. ACM Computing Surveys, 21(4), 1989.
C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, 2005.
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigraphy, D. Thomas, and A. Zhu. Anonymizing tables. In ICDT, 2005.
R. Agrawal, and R. Srikant. Fast algorithms for mining association rules. In VLDB, 1994.
B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with PrivacyGrid. In WWW, 2008.
R. Bayardo, and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
A. Beresford. Location privacy in ubiquitous computing. PhD thesis, University of Cambridge, 2005.
B. Chen, R. Ramakrishnan, and K. LeFevre. Privacy skyline: privacy with multidimensional adversial knowledge”. In VLDB, 2007.
K. Chen, and L. Liu. A random rotation perturbation approach to privacy preserving data classification. In ICDM, 2005.
K. Chen, and L.Liu. Towards attack-resilient geometric data perturbation. In SDM, 2007.
F. Chin, and G. Ozsoyoglu. Auditing and inference control in statistical databases. IEEE Trans. Softw. Eng., SE-8(6), 1982.
C. Chow, and M. Mokbel. Enabling private continuous queries for revealed user locations. In SSTD, 2007.
L. Cox. Suppression methodology and statistical disclosure control. J. Am. Stat. Assoc., 75(370), 1980.
T. Dalenius, and S. Reisss. Data swapping: a technique for disclosure control. J. Stat. Plan. Infer., 6, 1982.
D. Denning. Secure statistical databases with random sample queries. ACM TODS, 5(3), 1980.
D. Dobkin, A. Jones, and R. Lipton. Secure databases: Protection against user influence”. ACM TODS, 4(1), 1979.
J. Du, J. Xu, X. Tang, and H. Hu. iPDA: enabling privacy-preserving location-based services”. In MDM, 2007.
M. Duckham, and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Pervasive, 2005.
G. Duncan, S. Fienberg, R. Krishnan, R. Padman, and S. Roehrig. Disclosure limitation methods and information loss for tabular data. Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies, pp 135-166, Elsevier, 2001.
C. Farkas, and S. Jajodia. The inference problem: a survey. SIGKDD Explor. Newsl., 4(2), 2002.
I. Fellegi. On the question of statistical confidentiality. J. Am. Stat. Assoc., 67(337), 1972.
Foxs News. Man accused of stalking ex-grilfriend with gps. http://www.foxnews.com/story/0293313148700.html.
B. Fung, K. Wang, and P. Yu. Top-down specialization for information and privacy preservation. In ICDE, 2005.
B. Gedik, and L. Liu. Location privacy in mobile systems: a personalized anonymization model”. In ICDCS, 2005.
B. Gedik, and L. Liu. Protecting location privacy with personalized k-anonymity architecture and algorithms. IEEE Transactions on Mobile Computing.
G. Ghinita, P. Kalnis, and S. Skiadopoulos. MOBIHIDE: a mobile peer-to-peer system for anonymous location-based queries. In SSTD, 2007.
G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: anonymous location based queries in distributed mobile systems. In WWW, 2007.
M. Gruteser, and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003.
J. Hong, and J. Landay. An architecture for privacy-sensitive ubiquitous computing. In MobiSys, 2004.
P. Indyk, and D. Woodruff, Polylogarithmic private approximations and efficient matching. In TCC, 2006.
V. Iyengar. Transforming data to satisfy privacy constraints. In KDD, 2002.
H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based Services. In ICPS, 2005.
D. Kifer, and J. Gehrke. Injecting utility into anonymization databases. In SIGMOD, 2006.
A. Khoshgozaran, and C. Shahabi. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In SSTD, 2007.
K. LeFevre, D. Dewitt, and R. Ramakrishnan. Incognito: efficient full-domain k-anonymity. In SIGMOD, 2005.
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, 2006.
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Workload aware anonymization. In SIGKDD, 2006.
J. Li, Y. Tao, and X. Xiao. Preservation of proximity privacy in publishing numerical sensitive data. In SIGMOD, 2008.
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: privacy beyond k-anonymity and l-diversity. In ICDE, 2007.
L. Liu. From data privacy to location privacy. In VLDB, 2007.
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: privacy beyond k-anonymity. In ICDE, 2006.
D. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Halpern. Worst-case background knowledge in privacy. In ICDE, 2007.
A. Meyerson, and R. Williams. On the complexity of optimal k-anonymity. In PODS, 2004.
M. Mokbel, C. Chow, and W. Aref. The new casper: query processing for location services without compromising privacy. In VLDB, 2006.
M. Mokbel. Privacy in location-based services: state of art and research directions. In MDM, 2007.
M. Nergiz, M. Atzori, and C. Clifton. Hiding the presence of individuals from shared databases. In SIGMOD, 2007.
H. Park, and K. Shim. Approximate algorithm for k-anonymity. In SIGMOD, 2007.
S. Saltenis, C. Jensen, S. Leutenegger, and M. Lopez. Indexing the positions of continuously moving objects. In SIGMOD, 2000.
P. Samarati, and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
P. Samarati. Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng., 13(6), 2001.
L. Sweeney. K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz., 10(5), 2002.
Y. Tao, D. Papadias, and Q. Shen. Continuous nearest neighbor search. In VLDB, 2002.
J. Traub, Y. Yemini, and H. Woznaikowski. The statistical security of a statistical database.. ACM TODS, 9(4), 1984.
USA Today. Authorities: Gps systems used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker\_x.htm.
K. Wang, and B. Fung. Anonymizing sequential releases. In KDD, 2006.
K. Wang, P. Yu, and S. Chakraborty. Bottom-up generalization: a data mining solution to privacy protection”. In ICDM, 2004.
T. Wang, and L. Liu. Butterfly: protecting output privacy in stream mining. In ICDE, 2008.
T. Wang, and L. Liu. Location privacy protection for road network basedmobile computing system. CS Technical Report, Georgia Tech, 2008.
R. Wong, J. Li, A. Fu, and K. Wang. (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In SIGKDD, 2006.
R. Wong, A. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In VLDB, 2007.
X. Xiao, and Y. Tao. Anatomy: simple and effective privacy preservation. In VLDB, 2006.
X. Xiao, and Y. Tao. m-invariance: towards privacy preserving re-publication of dynamic datasets. In SIGMOD, 2007.
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. Fu. Utility based anonymization using local recording. In KDD, 2006.
M. Yiu, C. Jensen, X. Huang, and H. Lu. SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In ICDE, 2008.
Q. Zhang, N. Koudas, D. Srivastava, and T. Yu. Aggregate query answering on anonymized tables. In ICDE, 2007.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Wang, T., Liu, L. (2009). From Data Privacy to Location Privacy. In: Machine Learning in Cyber Trust. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88735-7_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-88735-7_9
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88734-0
Online ISBN: 978-0-387-88735-7
eBook Packages: Computer ScienceComputer Science (R0)