Abstract
The rapid technology upgrades of mobile devices and the popularity of wireless networks significantly drive the emergence and development of Location-based Services (LBSs), thus greatly expanding the business of online services and enriching the user experience. However, the personal location data shared with the service providers also leave hidden risks on location privacy. Location anonymization techniques transform the exact location of a user into a cloaking area by including the locations of multiple users in the exposed area such that the exposed location is indistinguishable from that of the other users. However in such schemes, location information once perturbed cannot be recovered from the cloaking region and as a result, users of the location cannot obtain fine granular information even when they have access to it. In this paper, we propose Dynamic Reversible Cloaking (DRC) a new de-anonymziable location cloaking mechanism that allows to restore the actual location from the perturbed information through the use of an anonymization key. Extensive experiments using realistic road network traces show that the proposed scheme is efficient, effective and scalable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bamba, B., Liu, L., Pesti, P., et al.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th International Conference on World Wide Web, pp. 237–246. ACM (2008)
Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. Pervasive Computing, 46–55 (2003)
Beresford, A., Frank, S.: Mix zones: User privacy in location-aware services (2004)
Cheng, R., Zhang, Y., Bertino, E., et al.: User location privacy in mobile management infrastructures. In: Proc. of Privacy Enhancing Technology Workshop (PET 2006) (2006)
Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 620–629. IEEE (2005)
Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy (2004)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: A mobilea peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221–238. Springer, Heidelberg (2007)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International Conference on World Wide Web, vol. 19(12), pp. 371–380. ACM (2007)
GTMobiSim. https://code.google.com/p/gt-mobisim/
Kalnis, P., Ghinita, G., Mouratidis, K., et al.: Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719–1733 (2007)
Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007)
Li, C., Palanisamy, B.: ReverseCloak: protecting multi-level location privacy over road networks. In: Proc. of 24th ACM International Conference on Information and Knowledge Management (in press, 2015)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proc. of the 32nd International Conference on Very Large Data Bases (2006)
Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Transactions on Mobile Computing 14(3), 495–508 (2015)
Palanisamy, B., Liu, L., Lee, K., et al.: Anonymizing Continuous Queries with Delay-tolerant Mix-zones on Road Networks. Distributed and Parallel Databases 32(1), 91–118 (2014)
Palanisamy, B., Liu, L.: Mobimix: Protecting location privacy with mix-zones over road networks. In: 27th International Conference on Data Engineering, pp. 494–505 (2011)
Sweeney, L.: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 55–570 (2002)
Terrovitis, M., Kmamoulis, N.: Privacy preservation in the publication of trajectories. In: Proc. of 9th International Conference on Mobile Data Management, pp. 65–72. IEEE (2008)
Wang, T., Liu, L., Pesti, P.: Privacy-aware mobile services over road networks. Proceedings of the VLDB Endowment 2(1), 1042–1053 (2009)
Xiao, Z., Meng, X., Xu, J.: Quality aware privacy protection for location-based services. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 434–446. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, C., Palanisamy, B. (2015). De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-25645-0_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25644-3
Online ISBN: 978-3-319-25645-0
eBook Packages: Computer ScienceComputer Science (R0)