Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Spatial Anonymity

  • Panos Kalnis
  • Gabriel Ghinita
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_352

Synonyms

Anonymity in location-based services;Privacy-preserving spatial queries;Spatial k-anonymity

Definition

LetU be a user who is asking via a mobile device (e.g., phone, PDA) a query relevant to his current location, such as “find the nearest betting office.” This query can be answered by a Location Based Service (LBS) in a public web server (e.g., Google Maps, MapQuest), which is not trustworthy. Since the query may be sensitive, U uses encryption and a pseudonym, in order to protect his privacy. However, the query still contains the exact location, which may reveal the identity of U. For example, if U asks the query within his residence, an attacker may use public information (e.g., white pages) to associate the location with U. Spatial k-Anonymity (SKA) solves this problem by ensuring that an attacker cannot identify U as the querying user with probability larger than 1∕k, where kis a user-defined anonymity requirement. To achieve this, a centralized or distributed...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Beresford AR, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Comput. 2003;2(1):46–55.CrossRefGoogle Scholar
  2. 2.
    Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving user location privacy in mobile data management infrastructures. In: Proceeding of the 6th Workshop on Privacy Enhancing Technologies; 2006. p. 393–412.CrossRefGoogle Scholar
  3. 3.
    Chow C-Y, Mokbel MF. Enabling private continuous queries for revealed user locations. In: Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases; 2007. p. 258–75.Google Scholar
  4. 4.
    Chow C-Y, Mokbel MF, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the 14th ACM International Symposium on Geographic Information Systems; 2006. p. 171–8.Google Scholar
  5. 5.
    Gedik B, Liu L. Location privacy in mobile systems: a personalized anonymization model. In: Proceedings of the 23rd International Conference on Distributed Computing Systems; 2005. p. 620–9.Google Scholar
  6. 6.
    Ghinita G, Kalnis P, Skiadopoulos S. PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International World Wide Web Conference; 2007. p. 371–80.Google Scholar
  7. 7.
    Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services; 2003. p. 31–42.Google Scholar
  8. 8.
    Hoh B, Gruteser M. Protecting location privacy through path confusion. In: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks; 2005.Google Scholar
  9. 9.
    Kalnis P, Ghinita G, Mouratidis K, Papadias D. Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng. 2007;19(12):1719–33.CrossRefGoogle Scholar
  10. 10.
    Kamat P, Zhang Y, Trappe W, Ozturk C. Enhancing source-location privacy in sensor network routing. In: Proceedings of the 23rd International Conference on Distributed Computing Systems; 2005. p. 599–608.Google Scholar
  11. 11.
    Khoshgozaran A, Shahabi C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases; 2007. p. 239–57.Google Scholar
  12. 12.
    Mokbel MF, Chow CY, Aref WG. The new Casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases; 2006. p. 763–74.Google Scholar
  13. 13.
    Moon B, Jagadish HV, Faloutsos C. Analysis of the clustering properties of the Hilbert space-filling curve. IEEE Trans Knowl Data Eng. 2001;13(1):124–41.CrossRefGoogle Scholar
  14. 14.
    Samet H. The design and analysis of spatial data structures. New York: Addison-Wesley; 1990.Google Scholar
  15. 15.
    Sweeney L. k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst. 2002;10(5):557–70.MathSciNetzbMATHCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Panos Kalnis
    • 1
  • Gabriel Ghinita
    • 1
  1. 1.National University of SingaporeSingaporeSingapore

Section editors and affiliations

  • Dimitris Papadias
    • 1
  1. 1.Dept. of Computer Science and Eng.Hong Kong Univ. of Science and TechnologyKowloonHong Kong SAR