Enabling Private Continuous Queries for Revealed User Locations

  • Chi-Yin Chow
  • Mohamed F. Mokbel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4605)


Existing location-based services provide specialized services to their customers based on the knowledge of their exact locations. With untrustworthy servers, location-based services may lead to several privacy threats ranging from worries over employers snooping on their workers’ whereabouts to fears of tracking by potential stalkers. While there exist several techniques to preserve location privacy in mobile environments, these techniques are limited as they do not distinguish between location privacy (i.e., a user wants to hide her location) and query privacy (i.e., a user can reveal her location but not her query). This distinction is crucial in many applications where the locations of mobile users are publicly known. In this paper, we go beyond the limitation of existing cloaking algorithms as we propose a new robust spatial cloaking technique for snapshot and continuous location-based queries that clearly distinguishes between location privacy and query privacy. By this distinction, we achieve two main goals: (1) supporting private location-based services to those customers with public locations, and (2) performing spatial cloaking on-demand basis only (i.e., when issuing queries) rather than exhaustively cloaking every single location update. Experimental results show that the robust spatial cloaking algorithm is scalable and efficient while providing anonymity for large numbers of continuous queries without hiding users’ locations.


Mobile User User Location Database Server Location Privacy Continuous Query 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ackerman, L., Kempf, J., Miki, T.: Wireless Location Privacy: A Report on Law and Policy in the United States, the Europrean Union, and Japan. Technical Report DCL-TR2003-001, DoCoMo Commuinication Laboratories, USA (2003)Google Scholar
  2. 2.
    Barkhuus, L., Dey, A.K.: Location-Based Services for Mobile Telephony: a Study of Users’ Privacy Concerns. In: Proceedings of the IFIP Conference on Human-Computer Interaction, INTERACT (2003)Google Scholar
  3. 3.
    Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)CrossRefGoogle Scholar
  4. 4.
    Warrior, J., McHenry, E., McGee, K.: They Know Where You Are. IEEE Spectrum 40(7), 20–25 (2003)CrossRefGoogle Scholar
  5. 5.
    Foxs News: Man Accused of Stalking Ex-Girlfriend With GPS (September 4, 2004),,2933,131487,00.html
  6. 6.
    USAToday: Authorities: GPS System Used to Stalk Woman. (December 30, 2002),
  7. 7.
    Voelcker, J.: Stalked by Satellite: An Alarming Rise in GPS-enabled Harassment. IEEE Spectrum 47(7), 15–16 (2006)CrossRefGoogle Scholar
  8. 8.
    Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Proceedings of Privacy Enhancing Technology Workshop (2006)Google Scholar
  9. 9.
    Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: ICDCS (2005)Google Scholar
  10. 10.
    Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: MobiSys (2003)Google Scholar
  11. 11.
    Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security and Privacy 2(2), 28–34 (2004)CrossRefGoogle Scholar
  12. 12.
    Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: VLDB (2006)Google Scholar
  13. 13.
    Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Anonymity in Location Based Services. Technical Report TRB6/06, Department of Computer Science, National University of Singapore (2006)Google Scholar
  14. 14.
    Sweeney, L.: k-anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)zbMATHCrossRefMathSciNetGoogle Scholar
  15. 15.
    Hong, J.I., Landay, J.A.: An Architecture for Privacy-Sensitive Ubiquitous Computing. In: MobiSys (2004)Google Scholar
  16. 16.
    Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique using Dummies for Location-based Services. In: ICPS (2005)Google Scholar
  17. 17.
    Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)Google Scholar
  18. 18.
    Chow, C.Y., Mokbel, M.F., Liu, X.: A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In: ACM GIS, ACM Press, ACM GIS (2006)Google Scholar
  19. 19.
    Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVÉ: Anonymous Location-Based Queries in Distributed Mobile Systems. In: WWW (to appear, 2007)Google Scholar
  20. 20.
    Mokbel, M.F., Chow, C.-Y.: Challenges in Preserving Location Privacy in Peer-to-Peer Environments (Invited paper). In: Proceedings of the International Workshop on Information Processing over Evolving Networks, WINPEN. (2006)Google Scholar
  21. 21.
    Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The New Casper: A Privacy-Aware Location-based Databse Server (Demonstration). In: ICDE (2007)Google Scholar
  22. 22.
    Brinkhoff, T.: A Framework for Generating Network-Based Moving Objects. GeoInformatica 6(2), 153–180 (2002)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Chi-Yin Chow
    • 1
  • Mohamed F. Mokbel
    • 1
  1. 1.Department of Computer Science and Engineering, University of Minnesota 

Personalised recommendations