Skip to main content

De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems

  • Conference paper
  • First Online:
Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9408))

Included in the following conference series:

Abstract

The rapid technology upgrades of mobile devices and the popularity of wireless networks significantly drive the emergence and development of Location-based Services (LBSs), thus greatly expanding the business of online services and enriching the user experience. However, the personal location data shared with the service providers also leave hidden risks on location privacy. Location anonymization techniques transform the exact location of a user into a cloaking area by including the locations of multiple users in the exposed area such that the exposed location is indistinguishable from that of the other users. However in such schemes, location information once perturbed cannot be recovered from the cloaking region and as a result, users of the location cannot obtain fine granular information even when they have access to it. In this paper, we propose Dynamic Reversible Cloaking (DRC) a new de-anonymziable location cloaking mechanism that allows to restore the actual location from the perturbed information through the use of an anonymization key. Extensive experiments using realistic road network traces show that the proposed scheme is efficient, effective and scalable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bamba, B., Liu, L., Pesti, P., et al.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th International Conference on World Wide Web, pp. 237–246. ACM (2008)

    Google Scholar 

  2. Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. Pervasive Computing, 46–55 (2003)

    Google Scholar 

  3. Beresford, A., Frank, S.: Mix zones: User privacy in location-aware services (2004)

    Google Scholar 

  4. Cheng, R., Zhang, Y., Bertino, E., et al.: User location privacy in mobile management infrastructures. In: Proc. of Privacy Enhancing Technology Workshop (PET 2006) (2006)

    Google Scholar 

  5. Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 620–629. IEEE (2005)

    Google Scholar 

  6. Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy (2004)

    Google Scholar 

  7. Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: A mobilea peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221–238. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International Conference on World Wide Web, vol. 19(12), pp. 371–380. ACM (2007)

    Google Scholar 

  9. GTMobiSim. https://code.google.com/p/gt-mobisim/

  10. Kalnis, P., Ghinita, G., Mouratidis, K., et al.: Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719–1733 (2007)

    Article  Google Scholar 

  11. Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Li, C., Palanisamy, B.: ReverseCloak: protecting multi-level location privacy over road networks. In: Proc. of 24th ACM International Conference on Information and Knowledge Management (in press, 2015)

    Google Scholar 

  13. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proc. of the 32nd International Conference on Very Large Data Bases (2006)

    Google Scholar 

  14. Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Transactions on Mobile Computing 14(3), 495–508 (2015)

    Article  Google Scholar 

  15. Palanisamy, B., Liu, L., Lee, K., et al.: Anonymizing Continuous Queries with Delay-tolerant Mix-zones on Road Networks. Distributed and Parallel Databases 32(1), 91–118 (2014)

    Article  Google Scholar 

  16. Palanisamy, B., Liu, L.: Mobimix: Protecting location privacy with mix-zones over road networks. In: 27th International Conference on Data Engineering, pp. 494–505 (2011)

    Google Scholar 

  17. Sweeney, L.: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 55–570 (2002)

    Google Scholar 

  18. Terrovitis, M., Kmamoulis, N.: Privacy preservation in the publication of trajectories. In: Proc. of 9th International Conference on Mobile Data Management, pp. 65–72. IEEE (2008)

    Google Scholar 

  19. Wang, T., Liu, L., Pesti, P.: Privacy-aware mobile services over road networks. Proceedings of the VLDB Endowment 2(1), 1042–1053 (2009)

    Article  Google Scholar 

  20. Xiao, Z., Meng, X., Xu, J.: Quality aware privacy protection for location-based services. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 434–446. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, C., Palanisamy, B. (2015). De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25645-0_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25644-3

  • Online ISBN: 978-3-319-25645-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics