Advertisement

User Location Anonymization Method for Wide Distribution of Dummies

  • Ryo Kato
  • Mayu Iwata
  • Takahiro Hara
  • Yuki Arase
  • Xing Xie
  • Shojiro Nishio
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8056)

Abstract

Advances in GPS (global positioning system) technologies have led to a variety of services utilizing the user’s location becoming available. Since location information may reveal private information, preserving location privacy has become a significant issue. To preserve this privacy, we have proposed a user location anonymization method that generates dummies on the basis of the user’s trajectory with pauses in movement. However, the previous work does not sufficiently satisfy users’ requirements for location privacy because the locations of the generated dummies tended to gather in a small area as time passed. In this paper, we propose a user location anonymization method that always keeps dummies’ locations in an area wide enough to anonymize the user’s location. Our method periodically distributes dummies by moving them to an area where there were fewer users and dummies. We simulated the user’s movement on a real map and verified that the proposed method was more effective than the previous one.

Keywords

Location-based services Location privacy GPS Dummy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Proc. Int’l Conf. on Data and Applications Security, pp. 47–60 (July 2007)Google Scholar
  2. 2.
    Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. In: Proc. Int’l Conf. on Pervasive Computing, pp. 46–55 (March 2003)Google Scholar
  3. 3.
    Bettini, C., Mascetti, S., Wang, X.S., Jajodia, S.: Anonymity in location-based services, towards a general framework. In: Proc. Int’l Conf. on Mobile Data Management, pp. 69–76 (May 2007)Google Scholar
  4. 4.
    Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Proc. Int’l Conf. on Pervasive Computing, pp. 152–170 (May 2005)Google Scholar
  5. 5.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. Int’l Conf. on Mobile Systems, Applications, and Services, pp. 31–42 (May 2003)Google Scholar
  6. 6.
    Kato, R., Iwata, M., Hara, T., Suzuki, A., Arase, Y., Xie, X., Nishio, S.: A dummy-based anonymization method based on user trajectory with pauses. In: Proc. Int’l Conf. on Advance in Geographic Information Systems, pp. 249–258 (November 2012)Google Scholar
  7. 7.
    Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based service. In: Proc. Int’l Conf. on Pervasive Service, pp. 88–97 (July 2005)Google Scholar
  8. 8.
    Lu, H., Jensen, C.S., Yiu, M.L.: PAD:Privacy-area aware, dummy-based location privacy in mobile services. In: Proc. Int’l Workshop on Data Engineering for Wireless and Mobile Access, pp. 16–23 (June 2007)Google Scholar
  9. 9.
    Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.P.: A distortion-based metric for location privacy. In: Proc. ACM Workshop on Privacy in the Electronic Society, p. 6 (November 2009)Google Scholar
  10. 10.
    Suzuki, A., Iwata, M., Arase, Y., Hara, T., Xie, X., Nishio, S.: A user location anonymization method for location based services in a real environment. In: Proc. Int’l Conf. on Advance in Geographic Information Systems, pp. 398–401 (November 2010)Google Scholar
  11. 11.
    Yanagisawa, Y., Kido, H., Satoh, T.: Location traceability of users in location-based services. In: Proc. Int’l Conf’. on Mobile and Ubiquitous Systems Workshops (July 2006)Google Scholar
  12. 12.
    Yiu, M., Jensen, C., Huang, X., Liu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proc. Int’l Conf. on Data Engineering, pp. 366–357 (April 2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ryo Kato
    • 1
  • Mayu Iwata
    • 1
  • Takahiro Hara
    • 1
  • Yuki Arase
    • 2
  • Xing Xie
    • 2
  • Shojiro Nishio
    • 1
  1. 1.Graduate School of Information Science and TechnologyOsaka UniversitySuitaJapan
  2. 2.Microsoft Research AsiaBeijingChina

Personalised recommendations