A classification of location privacy attacks and approaches

被引:206
作者
Wernke, Marius [1 ]
Skvortsov, Pavel [1 ]
Duerr, Frank [1 ]
Rothermel, Kurt [1 ]
机构
[1] Univ Stuttgart, Inst Parallel & Distributed Syst, D-70174 Stuttgart, Germany
关键词
Location-based services; Location privacy; Protection goals; Principles; Adversary; Attacks; Classification; Approaches; ANONYMITY; OBFUSCATION; INFERENCE; CLOAKING;
D O I
10.1007/s00779-012-0633-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, location-based services have become very popular, mainly driven by the availability of modern mobile devices with integrated position sensors. Prominent examples are points of interest finders or geo-social networks such as Facebook Places, Qype, and Loopt. However, providing such services with private user positions may raise serious privacy concerns if these positions are not protected adequately. Therefore, location privacy concepts become mandatory to ensure the user's acceptance of location-based services. Many different concepts and approaches for the protection of location privacy have been described in the literature. These approaches differ with respect to the protected information and their effectiveness against different attacks. The goal of this paper is to assess the applicability and effectiveness of location privacy approaches systematically. We first identify different protection goals, namely personal information (user identity), spatial information (user position), and temporal information (identity/position + time). Secondly, we give an overview of basic principles and existing approaches to protect these privacy goals. In a third step, we classify possible attacks. Finally, we analyze existing approaches with respect to their protection goals and their ability to resist the introduced attacks.
引用
收藏
页码:163 / 175
页数:13
相关论文
共 58 条
[1]  
Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
[2]  
[Anonymous], 2006, P INT PAR DISTR PROC
[3]  
[Anonymous], 2010, P 13 INT C EXT DAT T
[4]  
Ardagna CA, 2007, LECT NOTES COMPUT SC, V4602, P47
[5]   Landscape-aware location-privacy protection in location-based services [J].
Ardagna, Claudio Agostino ;
Cremonini, Marco ;
Gianini, Gabriele .
JOURNAL OF SYSTEMS ARCHITECTURE, 2009, 55 (04) :243-254
[6]  
Bamba B., 2008, Proceeding of 17th International Conference on World Wide Web, P237, DOI DOI 10.1145/1367497.1367531
[7]  
Barker K, 2009, LECT NOTES COMPUT SC, V5588, P42, DOI 10.1007/978-3-642-02843-4_7
[8]   Mix zones: User privacy in location-aware services [J].
Beresford, AR ;
Stajano, F .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, :127-131
[9]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[10]  
Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185