On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS

  • Rinku Dewri
  • Indrakshi Ray
  • Indrajit Ray
  • Darrell Whitley
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 50)


Privacy preservation in location based services (LBS) has received extensive attention in recent years. One of the less explored problems in this domain is associated with services that rely on continuous updates from the mobile object. Cloaking algorithms designed to hide user locations in single requests perform poorly in this scenario. The historical k-anonymity property is therefore enforced to ensure that all cloaking regions include at least k objects in common. However, the mobility of the objects can easily render increasingly bigger cloaking regions and degrade the quality of service. To this effect, this paper presents an algorithm to efficiently enforce historical k-anonymity by partitioning of an object’s cloaking region. We further enforce some degree of directional similarity in the k common peers in order to prevent an excessive expansion of the cloaking region.


historical k-anonymity continuous LBS anonymity sets 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)Google Scholar
  2. 2.
    Reid, D.: An Algorithm for Tracking Multiple Targets. IEEE Transactions on Automatic Control 24(6), 843–854 (1979)CrossRefGoogle Scholar
  3. 3.
    Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Security and Privacy 2, 46–55 (2003)Google Scholar
  4. 4.
    Bettini, C., Wang, X.S., Jajodia, S.: Protecting Privacy Against Location-Based Personal Identification. In: Proceedings of the 2nd VLDB Workshop on Secure Data Management, pp. 185–199 (2005)Google Scholar
  5. 5.
    Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid. In: Proceedings of the 17th International World Wide Web Conference, pp. 237–246 (2008)Google Scholar
  6. 6.
    Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)CrossRefGoogle Scholar
  7. 7.
    Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719–1733 (2007)CrossRefGoogle Scholar
  8. 8.
    Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security and Privacy 2(2), 28–34 (2004)CrossRefGoogle Scholar
  9. 9.
    Hoh, B., Gruteser, M.: Protecting Location Privacy Through Path Confusion. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 194–205 (2005)Google Scholar
  10. 10.
    Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique Using Dummies for Location-Based Services. In: Proceedings of the IEEE International Conference on Pervasive Services 2005, pp. 88–97 (2005)Google Scholar
  11. 11.
    Xu, T., Cai, Y.: Exploring Historical Location Data for Anonymity Preservation in Location-Based Services. In: IEEE INFOCOM 2008, pp. 1220–1228 (2008)Google Scholar
  12. 12.
    Chow, C.Y., Mokbel, M.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Xu, T., Cai, Y.: Location Anonymity in Continuous Location-Based Services. In: Proceedings of the 15th International Symposium on Advances in Geographic Information Systems, p. 39 (2007)Google Scholar
  14. 14.
    Mascetti, S., Bettini, C., Wang, X.S., Freni, D., Jajodia, S.: ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. In: Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 172–181 (2009)Google Scholar
  15. 15.
    Tan, K.W., Lin, Y., Mouratidis, K.: Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) Advances in Spatial and Temporal Databases. LNCS, vol. 5644, pp. 117–134. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  16. 16.
    Liu, X., Schrack, G.: Encoding and Decoding the Hilbert Order. Software-Practice and Experience 26(12), 1335–1346 (1996)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  • Rinku Dewri
    • 1
  • Indrakshi Ray
    • 2
  • Indrajit Ray
    • 2
  • Darrell Whitley
    • 2
  1. 1.University of DenverDenverUSA
  2. 2.Colorado State UniversityFort CollinsUSA

Personalised recommendations