skip to main content
10.1145/1667502.1667511acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Protecting location privacy against spatial inferences: the PROBE approach

Published:03 November 2009Publication History

ABSTRACT

The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscation, to protect location privacy is based on forwarding the LSB provider a coarse user location instead of the actual user location. Conventional approaches, based on such technique, are however based only on geometric methods and therefore are unable to assure privacy when the adversary is aware of the geographical context. This paper provides a comprehensive solution to this problem. Our solution presents a novel approach that obfuscates the user location by taking into account the geographical context and user's privacy preferences. We define several theoretical notions underlying our approach. We then propose a strategy for generating obfuscated spaces and an efficient algorithm which implements such a strategy. The paper includes several experimental results assessing performance, storage requirements and accuracy for the approach. The paper also discusses the system architecture and shows that the approach can be deployed also for clients running on small devices.

References

  1. M. Damiani, E. Bertino, and C. Silvestri. Protecting location privacy through semantics-aware obfuscation techniques. In Proc. of IFIPTM 2008, pages 231--245. Springer Boston, June 18--20 2008.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. L. Damiani, E. Bertino, and C. Silvestri. PROBE: an obfuscation system for the protection of sensitive location information in lbs. CERIAS Technical Report, Purdue University, 2008.Google ScholarGoogle Scholar
  3. M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Pervasive Computing. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proc. of the 25th IEEE ICDCS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Ghinita, M. Damiani, E. Bertino, and C. Silvestri. Interactive Location Cloaking with the PROBE Obfuscator. In Proc. of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L.Tan. Private Queries in Location Based Services: Anonymizers are not Necessary. In Proc. ACM SIGMOD Conference, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of the 1st international conference on Mobile systems, applications and services. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. U. Hengartner and P. Steenkiste. Access control to people location information. ACM Trans. Inf. Syst. Secur., 8(4):424--456, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Krishnamachari, G. Ghinita, and P. Kalnis. Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites. In Proc. SSDBM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. 1-Diversity: Privacy Beyond k-Anonymity. In Proc. ICDE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new Casper: query processing for location services without compromising privacy. In Proc. VLDB, pages 763--774, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Moore. C Library Hilbert. c. http://www.caam.rice.edu/dougm.Google ScholarGoogle Scholar
  14. G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56--64, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Open GIS Consortium. Open GIS simple features specification for SQL, 1999. Revision 1.1.Google ScholarGoogle Scholar
  16. N. Poolsappasit and I. Ray. Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy, 2:1:77--99, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Samet. Foundations of Multidimensional and Metric data Structures. Morgan Kaufmann, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. E. Snekkenes. Concepts for personal location privacy policies. In EC '01: Proceedings of the 3rd ACM conference on Electronic Commerce, pages 48--57, New York, NY, USA, 2001. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. X. Xiao and Y. Tao. Personalized privacy preservation. In Proc. of the 2006 ACM SIGMOD, pages 229--240, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. H. Xue M., Kalnis P. Location Diversity: Enhanced Privacy Protection in Location Based Services. In Proc. of the International Symposium on Location and Context Awareness (LoCA), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. L. Yiu, C. Jensen, X. Huang, and H. Lu. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In proc. IEEE 24th International Conference on Data Engineering, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Youssef, V. Atluri, and N. R. Adam. Preserving mobile customer privacy: an access control system for moving objects and customer profiles. In Proc. MDM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Protecting location privacy against spatial inferences: the PROBE approach

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SPRINGL '09: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
        November 2009
        79 pages
        ISBN:9781605588537
        DOI:10.1145/1667502

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 November 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader