Preventing location-based identity inference in anonymous spatial queries

被引:353
作者
Kalnis, Panos
Ghinita, Gabriel
Mouratidis, Kyriakos
Papadias, Dimitris
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore 117590, Singapore
[2] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
[3] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
privacy; anonymity; location-based services; spatial databases; mobile systems;
D O I
10.1109/TKDE.2007.190662
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing trend of embedding positioning capabilities (for example, GPS) in mobile devices facilitates the widespread use of Location-Based Services. For such applications to succeed, privacy and confidentiality are essential. Existing privacy-enhancing techniques rely on encryption to safeguard communication channels, and on pseudonyms to protect user identities. Nevertheless, the query contents may disclose the physical location of the user. In this paper, we present a framework for preventing location-based identity inference of users who issue spatial queries to Location-Based Services. We propose transformations based on the well-established K-anonymity concept to compute exact answers for range and nearest neighbor search, without revealing the query source. Our methods optimize the entire process of anonymizing the requests and processing the transformed spatial queries. Extensive experimental studies suggest that the proposed techniques are applicable to real-life scenarios with numerous mobile users.
引用
收藏
页码:1719 / 1733
页数:15
相关论文
共 31 条
[1]  
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[2]  
Aggarwal C.C., 2005, P 31 INT C VER LARG, V5, P901, DOI [DOI 10.5555/1083592.1083696, 10.5555/1083592.1083696]
[3]  
[Anonymous], 2006, P 2006 ACM SIGMOD IN, DOI DOI 10.1145/1142473.1142500
[4]  
[Anonymous], 2000, Privacy-preserving data mining, DOI DOI 10.1145/342009.335438
[5]  
[Anonymous], P 28 INT C VER LARG
[6]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[7]  
BECKMANN N, 1990, SIGMOD REC, V19, P322, DOI 10.1145/93605.98741
[8]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[9]  
Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185
[10]  
Cheng R, 2006, LECT NOTES COMPUT SC, V4258, P393