Map-Aware Position Sharing for Location Privacy in Non-trusted Systems

  • Pavel Skvortsov
  • Frank Dürr
  • Kurt Rothermel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7319)

Abstract

Many current location-based applications (LBA) such as friend finder services use information about the positions of mobile users. So-called location services (LSs) have been proposed to manage these mobile user positions efficiently. However, managing user positions raises privacy issues, in particular, if the providers of LSs are only partially trusted. Therefore, we presented the concept of private position sharing for partially trusted systems in a previous paper [1]. The basic idea of position sharing is to split the precise user position into a set of position shares of well-defined limited precision and distribute these shares among LSs of different providers.

The main contributions of this paper are two extended position sharing approaches that improve our previous approach in two ways: Firstly, we reduce the predictability of share generation that allows an attacker to gain further information from a sub-set of shares to further increase the position precision. Secondly, we present a position sharing algorithm for constrained movement scenarios whereas the existing approach was tailored to open space environments. However, open space approaches are vulnerable to map-based attacks. Therefore, we present a share generation algorithm that takes map knowledge into account.

Keywords

Location-based service privacy obfuscation sharing map-awareness 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dürr, F., Skvortsov, P., Rothermel, K.: Position sharing for location privacy in non-trusted systems. In: PerCom 2011, Seattle, USA, pp. 189–196 (March 2011)Google Scholar
  2. 2.
    Privacy Rights Clearinghouse: Privacy rights clearinghouse (June 2011), http://www.privacyrights.org/data-breach
  3. 3.
    Mokbel, M.F.: Privacy in location-based services: State-of-the-art and research directions. In: MDM 2007, Mannheim, Germany (May 2007)Google Scholar
  4. 4.
    Pedreschi, D., Bonchi, F., Turini, F., Verykios, V.S., Atzori, M., Malin, B., Moelans, B., Saygin, Y.: Privacy protection: Regulations and technologies, opportunities and threats. In: Mobility, Data Mining and Privacy, pp. 101–119 (2008)Google Scholar
  5. 5.
    Gutscher, A.: A Trust Model for an Open, Decentralized Reputation System. In: IFIPTM 2007 (August 2007)Google Scholar
  6. 6.
    Riboni, D., Pareschi, L., Bettini, C.: Privacy in Georeferenced Context-Aware Services: A Survey. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 151–172. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  7. 7.
    Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2009)CrossRefGoogle Scholar
  8. 8.
    Solanas, A., Domingo-Ferrer, J., Martínez-Ballesté, A.: Location privacy in location-based services: Beyond ttp-based schemes. In: Proceedings of the 1st International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain (October 2008)Google Scholar
  9. 9.
    Hauser, C., Kabatnik, M.: Towards privacy support in a global location service. In: WATM/EUNICE 2001 (September 2001)Google Scholar
  10. 10.
    Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719–1733 (2007)CrossRefGoogle Scholar
  11. 11.
    Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  12. 12.
    Marias, G.F., Delakouridis, C., Kazatzopoulos, L., Georgiadis, P.: Location privacy through secret sharing techniques. In: WOWMOM 2005. IEEE Computer Society (June 2005)Google Scholar
  13. 13.
    Damiani, M.L., Bertino, E., Silvestri, C.: Protecting location privacy against spatial inferences: the probe approach. In: SIGSPATIAL ACM GIS 2009 Intl. Workshop on Security and Privacy in GIS and LBS, SPRINGL 2009. ACM, New York (2009)Google Scholar
  14. 14.
    Ardagna, C.A., Cremonini, M., Gianini, G.: Landscape-aware location-privacy protection in location-based services. Journal of System Architecture (JSA) 55 (April 2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Pavel Skvortsov
    • 1
  • Frank Dürr
    • 1
  • Kurt Rothermel
    • 1
  1. 1.Institute of Parallel and Distributed SystemsUniversität StuttgartGermany

Personalised recommendations