A classification of location privacy attacks and approaches

被引:206
作者
Wernke, Marius [1 ]
Skvortsov, Pavel [1 ]
Duerr, Frank [1 ]
Rothermel, Kurt [1 ]
机构
[1] Univ Stuttgart, Inst Parallel & Distributed Syst, D-70174 Stuttgart, Germany
关键词
Location-based services; Location privacy; Protection goals; Principles; Adversary; Attacks; Classification; Approaches; ANONYMITY; OBFUSCATION; INFERENCE; CLOAKING;
D O I
10.1007/s00779-012-0633-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, location-based services have become very popular, mainly driven by the availability of modern mobile devices with integrated position sensors. Prominent examples are points of interest finders or geo-social networks such as Facebook Places, Qype, and Loopt. However, providing such services with private user positions may raise serious privacy concerns if these positions are not protected adequately. Therefore, location privacy concepts become mandatory to ensure the user's acceptance of location-based services. Many different concepts and approaches for the protection of location privacy have been described in the literature. These approaches differ with respect to the protected information and their effectiveness against different attacks. The goal of this paper is to assess the applicability and effectiveness of location privacy approaches systematically. We first identify different protection goals, namely personal information (user identity), spatial information (user position), and temporal information (identity/position + time). Secondly, we give an overview of basic principles and existing approaches to protect these privacy goals. In a third step, we classify possible attacks. Finally, we analyze existing approaches with respect to their protection goals and their ability to resist the introduced attacks.
引用
收藏
页码:163 / 175
页数:13
相关论文
共 58 条
[41]   Location privacy through secret sharing techniques [J].
Marias, GF ;
Delakouridis, C ;
Kazatzopoulos, L ;
Georgiadis, P .
SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, :614-620
[42]   Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies [J].
Mascetti, Sergio ;
Freni, Dario ;
Bettini, Claudio ;
Wang, X. Sean ;
Jajodia, Sushil .
VLDB JOURNAL, 2011, 20 (04) :541-566
[43]   ProvidentHider: an Algorithm to Preserve Historical k-Anonymity in LBS [J].
Mascetti, Sergio ;
Bettini, Claudio ;
Wang, X. Sean ;
Freni, Dario ;
Jajodia, Sushil .
MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, :172-+
[44]  
Mokbel M. F., 2007, MOB DAT MAN 2007 INT, P228, DOI DOI 10.1109/MDM.2007.45
[45]  
Mokbel MF., 2006, VLDB, P763, DOI DOI 10.1145/1620585.1620591
[46]  
Palanisamy B, 2011, PROC INT CONF DATA, P494, DOI 10.1109/ICDE.2011.5767898
[47]  
Pedreschi D., 2008, Mobility, Data Mining and Privacy, P101, DOI DOI 10.1007/978-3-540-75177-9_5
[48]  
Shankar P, 2009, UBICOMP'09: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, P31
[49]   Quantifying Location Privacy [J].
Shokri, Reza ;
Theodorakopoulos, George ;
Le Boudec, Jean-Yves ;
Hubaux, Jean-Pierre .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :247-262
[50]  
Skvortsov Pavel, 2012, Pervasive Computing. Proceedings of the 10th International Conference, Pervasive 2012, P388, DOI 10.1007/978-3-642-31205-2_24