Preserving Location Privacy for Continuous Queries on Known Route

  • Anuj S. Saxena
  • Mayank Pundir
  • Vikram Goyal
  • Debajyoti Bera
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7093)


Protecting privacy in location based services has recently received considerable attention. Various approaches have been proposed, ranging from mix-zones to cloaking. Cloaking based approaches are ill-suited for continuous queries, where correlation between regular location updates may disclose location information. We consider the cloaking strategy with a modification to suit continuous queries: skip location updates at some key positions. The objective is to trade service availability at some locations in exchange of privacy at all times. Considering the case where the entire path of the user is known in advance, we show how to strategically decide these locations in a manner which is efficient, and does not skip too many locations (compared to the optimum). Experimental results show the validity and effectiveness of the proposed algorithm.


Location Base Service Location Privacy Privacy Preserve Rule Base Approach Continuous Query 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: WWW 2008: Proceeding of the 17th International Conference on World Wide Web, pp. 237–246 (2008)Google Scholar
  2. 2.
    Barkhuus, L., Dey, A.: Location-Based Services for Mobile Telephony: a Study of Users’ Privacy Concerns. In: INTERACT 2003: 9th IFIP TC13 International Conference on Human-Computer Interaction, pp. 709–712 (2003)Google Scholar
  3. 3.
    Bera, D., Goyal, V., Saxena, A.S.: Privacy of location obfuscation. Technical Report IIITD-TR-2011-002, IIIT-Delhi (2011)Google Scholar
  4. 4.
    Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2, 46–55 (2003)CrossRefGoogle Scholar
  5. 5.
    Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: PERCOMW 2004: 2nd IEEE International Conference on Pervasive Computing and Communications, pp. 127–131 (2004)Google Scholar
  6. 6.
    Bettini, C., Mascetti, S., Wang, X.S., Jajodia, S.: Anonymity in Location-Based Services: Towards a General Framework. In: MDM 2007: Proceedings of the International Conference on Mobile Data Management, pp. 69–76 (2007)Google Scholar
  7. 7.
    Burak, A., Sharon, T.: Usage patterns of FriendZone: mobile location-based community services. In: MUM 2004: Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, pp. 93–100 (2004)Google Scholar
  8. 8.
    Chow, C.-Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  9. 9.
    Chow, C.Y., Mokbel, M.F., He, T.: Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks. In: SIGMOD 2008: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 1307–1310 (2008)Google Scholar
  10. 10.
    Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE TMC: IEEE Transactions on Mobile Computing 7, 1–18 (2008)Google Scholar
  11. 11.
    Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: MobiSys 2003: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42 (2003)Google Scholar
  12. 12.
    Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM TKDD: ACM Transaction on Knowledge Discovery in Databases 1 (2007)Google Scholar
  13. 13.
    Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: ICDE 2007: 23rd International Conference on Data Engineering, pp. 126–135 (2007)Google Scholar
  14. 14.
    Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB 2006: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774 (2006)Google Scholar
  15. 15.
    cellular news: Mobile Subscribers to Hit 5.9 Billion in, Driven by China, India, Africa (2013),
  16. 16.
    Palanisamy, B., Liu, L.: Mobimix: Protecting location privacy with mix-zones over road networks. In: 27th ICDE 2011, pp. 494–505 (2011)Google Scholar
  17. 17.
    Sweeney, L.: Achieving k-Anonymity Privacy Protection using Generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10, 571–588 (2002)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Voelcker, J.: Stalked by satellite: An alarming rise in GPS-enabled harassment. IEEE Spectrum 7, 15–16 (2006)CrossRefGoogle Scholar
  19. 19.
    Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM 2008: Proceeding of 27th Conference on Computer Communications, pp. 547–555 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Anuj S. Saxena
    • 1
  • Mayank Pundir
    • 1
  • Vikram Goyal
    • 1
  • Debajyoti Bera
    • 1
  1. 1.Indraprastha Institute of Information Technology DelhiIndia

Personalised recommendations