Skip to main content

Preserving Location Privacy for Continuous Queries on Known Route

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7093))

Abstract

Protecting privacy in location based services has recently received considerable attention. Various approaches have been proposed, ranging from mix-zones to cloaking. Cloaking based approaches are ill-suited for continuous queries, where correlation between regular location updates may disclose location information. We consider the cloaking strategy with a modification to suit continuous queries: skip location updates at some key positions. The objective is to trade service availability at some locations in exchange of privacy at all times. Considering the case where the entire path of the user is known in advance, we show how to strategically decide these locations in a manner which is efficient, and does not skip too many locations (compared to the optimum). Experimental results show the validity and effectiveness of the proposed algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: WWW 2008: Proceeding of the 17th International Conference on World Wide Web, pp. 237–246 (2008)

    Google Scholar 

  2. Barkhuus, L., Dey, A.: Location-Based Services for Mobile Telephony: a Study of Users’ Privacy Concerns. In: INTERACT 2003: 9th IFIP TC13 International Conference on Human-Computer Interaction, pp. 709–712 (2003)

    Google Scholar 

  3. Bera, D., Goyal, V., Saxena, A.S.: Privacy of location obfuscation. Technical Report IIITD-TR-2011-002, IIIT-Delhi (2011)

    Google Scholar 

  4. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2, 46–55 (2003)

    Article  Google Scholar 

  5. Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: PERCOMW 2004: 2nd IEEE International Conference on Pervasive Computing and Communications, pp. 127–131 (2004)

    Google Scholar 

  6. Bettini, C., Mascetti, S., Wang, X.S., Jajodia, S.: Anonymity in Location-Based Services: Towards a General Framework. In: MDM 2007: Proceedings of the International Conference on Mobile Data Management, pp. 69–76 (2007)

    Google Scholar 

  7. Burak, A., Sharon, T.: Usage patterns of FriendZone: mobile location-based community services. In: MUM 2004: Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, pp. 93–100 (2004)

    Google Scholar 

  8. Chow, C.-Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Chow, C.Y., Mokbel, M.F., He, T.: Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks. In: SIGMOD 2008: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 1307–1310 (2008)

    Google Scholar 

  10. Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE TMC: IEEE Transactions on Mobile Computing 7, 1–18 (2008)

    Google Scholar 

  11. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: MobiSys 2003: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42 (2003)

    Google Scholar 

  12. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM TKDD: ACM Transaction on Knowledge Discovery in Databases 1 (2007)

    Google Scholar 

  13. Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: ICDE 2007: 23rd International Conference on Data Engineering, pp. 126–135 (2007)

    Google Scholar 

  14. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB 2006: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774 (2006)

    Google Scholar 

  15. cellular news: Mobile Subscribers to Hit 5.9 Billion in, Driven by China, India, Africa (2013), http://www.cellular-news.com/story/40439.php?s=h

  16. Palanisamy, B., Liu, L.: Mobimix: Protecting location privacy with mix-zones over road networks. In: 27th ICDE 2011, pp. 494–505 (2011)

    Google Scholar 

  17. Sweeney, L.: Achieving k-Anonymity Privacy Protection using Generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10, 571–588 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  18. Voelcker, J.: Stalked by satellite: An alarming rise in GPS-enabled harassment. IEEE Spectrum 7, 15–16 (2006)

    Article  Google Scholar 

  19. Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008: Proceeding of 27th Conference on Computer Communications, pp. 547–555 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saxena, A.S., Pundir, M., Goyal, V., Bera, D. (2011). Preserving Location Privacy for Continuous Queries on Known Route. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2011. Lecture Notes in Computer Science, vol 7093. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25560-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25560-1_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25559-5

  • Online ISBN: 978-3-642-25560-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics