Map-Aware Position Sharing for Location Privacy in Non-trusted Systems
Many current location-based applications (LBA) such as friend finder services use information about the positions of mobile users. So-called location services (LSs) have been proposed to manage these mobile user positions efficiently. However, managing user positions raises privacy issues, in particular, if the providers of LSs are only partially trusted. Therefore, we presented the concept of private position sharing for partially trusted systems in a previous paper . The basic idea of position sharing is to split the precise user position into a set of position shares of well-defined limited precision and distribute these shares among LSs of different providers.
The main contributions of this paper are two extended position sharing approaches that improve our previous approach in two ways: Firstly, we reduce the predictability of share generation that allows an attacker to gain further information from a sub-set of shares to further increase the position precision. Secondly, we present a position sharing algorithm for constrained movement scenarios whereas the existing approach was tailored to open space environments. However, open space approaches are vulnerable to map-based attacks. Therefore, we present a share generation algorithm that takes map knowledge into account.
KeywordsLocation-based service privacy obfuscation sharing map-awareness
Unable to display preview. Download preview PDF.
- 1.Dürr, F., Skvortsov, P., Rothermel, K.: Position sharing for location privacy in non-trusted systems. In: PerCom 2011, Seattle, USA, pp. 189–196 (March 2011)Google Scholar
- 2.Privacy Rights Clearinghouse: Privacy rights clearinghouse (June 2011), http://www.privacyrights.org/data-breach
- 3.Mokbel, M.F.: Privacy in location-based services: State-of-the-art and research directions. In: MDM 2007, Mannheim, Germany (May 2007)Google Scholar
- 4.Pedreschi, D., Bonchi, F., Turini, F., Verykios, V.S., Atzori, M., Malin, B., Moelans, B., Saygin, Y.: Privacy protection: Regulations and technologies, opportunities and threats. In: Mobility, Data Mining and Privacy, pp. 101–119 (2008)Google Scholar
- 5.Gutscher, A.: A Trust Model for an Open, Decentralized Reputation System. In: IFIPTM 2007 (August 2007)Google Scholar
- 8.Solanas, A., Domingo-Ferrer, J., Martínez-Ballesté, A.: Location privacy in location-based services: Beyond ttp-based schemes. In: Proceedings of the 1st International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain (October 2008)Google Scholar
- 9.Hauser, C., Kabatnik, M.: Towards privacy support in a global location service. In: WATM/EUNICE 2001 (September 2001)Google Scholar
- 11.Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)CrossRefGoogle Scholar
- 12.Marias, G.F., Delakouridis, C., Kazatzopoulos, L., Georgiadis, P.: Location privacy through secret sharing techniques. In: WOWMOM 2005. IEEE Computer Society (June 2005)Google Scholar
- 13.Damiani, M.L., Bertino, E., Silvestri, C.: Protecting location privacy against spatial inferences: the probe approach. In: SIGSPATIAL ACM GIS 2009 Intl. Workshop on Security and Privacy in GIS and LBS, SPRINGL 2009. ACM, New York (2009)Google Scholar
- 14.Ardagna, C.A., Cremonini, M., Gianini, G.: Landscape-aware location-privacy protection in location-based services. Journal of System Architecture (JSA) 55 (April 2009)Google Scholar