ProvidentHider: an Algorithm to Preserve Historical k-Anonymity in LBS

被引:15
作者
Mascetti, Sergio [1 ]
Bettini, Claudio [1 ,2 ]
Wang, X. Sean
Freni, Dario [1 ]
Jajodia, Sushil [3 ]
机构
[1] Univ Milan, DICo, I-20122 Milan, Italy
[2] Univ Vermont, Dept CS, Burlington, VT 05405 USA
[3] George Mason Univ, CSIS, Fairfax, VA 22030 USA
来源
MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT | 2009年
关键词
LOCATION; PRIVACY;
D O I
10.1109/MDM.2009.28
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the privacy threats recognized in the use of LBS is represented by an adversary having information about the presence of individuals in certain locations, and using this information together with an (anonymous) LBS request to re-identify the issuer of the request associating her to the requested service. Several papers have proposed techniques to prevent this, assuming that the use of the service is considered sensitive. In this paper we investigate the more general case in which the adversary is also able to recognize traces of LBS requests by the same anonymous user so that the identification of the issuer of one request can lead to the disclosure of the same user being in other possibly sensitive locations at different times or using sensitive services. Using the notion of "historical k-anonymity", this paper provides the first formalization of this class of privacy threats. Through extensive experiments based on realistic simulations, and runs of an optimal algorithm, we show some negative results for the defenses based on spatial generalization against these attacks under very conservative assumptions. Under more realistic location knowledge assumptions, we propose two defense algorithms, based on a strategy of changing and reusing of pseudo-identifiers, whose correctness isformally proved Our experiments show that, among all the proposed algorithms, the ProvidentHider algorithm is particularly effective in protecting privacy for reasonably long sequences of requests.
引用
收藏
页码:172 / +
页数:2
相关论文
共 14 条
[1]  
[Anonymous], P 9 INT C MOB DAT MA
[2]  
BERESFORD AR, 2004, P 2 ANN C PERV COMP
[3]  
Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185
[4]  
CHOW CY, 2007, P 10 INT S SPAT TEMP
[5]   A novel particle swarm optimization applied to multi-flight refueling service scheduling [J].
Ding, Jianli ;
Wang, Xinru ;
Xu, Tao ;
Liu, Weiqiang .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
[6]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[7]  
Ghinita G, 2008, P SIGMOD
[8]  
Gruteser M, 2005, LECT NOTES COMPUT SC, V3450, P179
[9]  
HOH B, 2008, P 6 INT C MOB SYST
[10]   Preventing location-based identity inference in anonymous spatial queries [J].
Kalnis, Panos ;
Ghinita, Gabriel ;
Mouratidis, Kyriakos ;
Papadias, Dimitris .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (12) :1719-1733