Abstract
Location privacy research has received wide attention in the past few years owing to the growing popularity of location-based applications, and the skepticism thereof on the collection of location information. A large section of this research is directed towards mechanisms based on location obfuscation. The primary motivation for this engagement comes from the relatively well researched area of database privacy. Researchers in this sibling domain have indicated multiple times that any notion of privacy is incomplete without explicit statements on the capabilities of an attacker. The question we ask in the context of location privacy is whether the attacker we are fighting against exists or not. In this paper, we provide a classification of attacker knowledge, and explore what implication does a certain form of knowledge has on location privacy. We argue that the use of cloaking regions can adversely impact the preservation of privacy in the presence of approximate location knowledge, and demonstrate how perturbation based mechanisms can instead be useful.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain k-Anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 49–60 (2005)
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian Multidimensional K-Anonymity. In: Proceedings of the 22nd International Conference in Data Engineering, p. 25 (2006)
Samarati, P.: Protecting Respondents’ Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)
Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719–1733 (2007)
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ–Diversity: Privacy Beyond k–Anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, p. 24 (2006)
Li, N., Li, T., Venkatasubramanian, S.: t–Closeness: Privacy Beyond k–Anonymity and ℓ–Diversity. In: Proceedings of the 23rd International Conference on Data Engineering, pp. 106–115 (2007)
Wong, R.C., Fu, A.W., Wang, K., Pei, J.: Minimality Attack in Privacy Preserving Data Publishing. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 543–554 (2007)
Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid. In: Proceedings of the 17th International World Wide Web Conference, pp. 237–246 (2008)
Xue, M., Kalnis, P., Pung, H.K.: Location Diversity: Enhanced Privacy Protection in Location Based Services. In: Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. LNCS, vol. 5561, pp. 70–87. Springer, Heidelberg (2009)
Ghinita, G., Zhao, K., Papadias, D., Kalnis, P.: A Reciprocal Framework for Spatial k-Anonymity. Journal of Information Systems 35(3), 299–314 (2010)
Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007)
Liu, X., Schrack, G.: Encoding and Decoding the Hilbert Order. Software-Practice and Experience 26(12), 1335–1346 (1996)
Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique Using Dummies for Location-Based Services. In: Proceedings of the IEEE International Conference on Pervasive Services, pp. 88–97 (2005)
Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393–412. Springer, Heidelberg (2006)
Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: Proceedings of the 24th International Conference on Data Engineering, pp. 366–375 (2008)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems. In: Proceedings of the 16th International Conference on World Wide Web, pp. 371–380 (2007)
Mokbel, M.F., Chow, C., Aref, W.G.: The New Casper: Query Processing for Location Services Without Compromising Privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774 (2006)
Lee, K.C.K., Lee, W.C., Leong, H.V., Zheng, B.: OPAQUE: Protecting Path Privacy in Directions Search. In: Proceedings of the 25th International Conference on Data Engineering, pp. 1271–1274 (2009)
Xu, T., Cai, Y.: Feeling-Based Location Privacy Protection for Location-Based Services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 348–357 (2009)
Marconi, L., Di Pietro, R., Crispo, B., Conti, M.: Time Warp: How Time Affects Privacy in LBSs. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 325–339. Springer, Heidelberg (2010)
Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying Location Privacy. In: Proceedings of the 32nd IEEE Symposium on Security and Privacy, pp. 247–262 (2011)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563–574 (2004)
Wong, W.K., Cheung, D.W., Kao, B., Mamouslis, N.: Secure kNN Computation on Encrypted Databases. In: Proceedings of the 35th SIGMOD International Conference on Management of Data, pp. 139–152 (2009)
Khoshgozaran, A., Shahabi, C., Shirani-Mehr, H.: Location Privacy: Going beyond k-Anonymity, Cloaking and Anonymizers. Journal of Knowledge and Information Systems 26(3), 435–465 (2011)
Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest Neighbor Search with Strong Location Privacy. VLDB Endowment 3(1-2), 619–629 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Dewri, R. (2012). Location Privacy and Attacker Knowledge: Who Are We Fighting against?. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds) Security and Privacy in Communication Networks. SecureComm 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31909-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-31909-9_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31908-2
Online ISBN: 978-3-642-31909-9
eBook Packages: Computer ScienceComputer Science (R0)