Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2007: Data and Applications Security XXI pp 47–60Cite as

  1. Home
  2. Data and Applications Security XXI
  3. Conference paper
Location Privacy Protection Through Obfuscation-Based Techniques

Location Privacy Protection Through Obfuscation-Based Techniques

  • C. A. Ardagna1,
  • M. Cremonini1,
  • E. Damiani1,
  • S. De Capitani di Vimercati1 &
  • …
  • P. Samarati1 
  • Conference paper
  • 2767 Accesses

  • 130 Citations

  • 317 Altmetric

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4602)

Abstract

The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications that manage physical positions of individuals to offer location-based services for business, social or informational purposes. As an effect of such innovative services, however, privacy concerns are increasing, calling for more sophisticated solutions for providing users with different and manageable levels of privacy. In this work, we propose a way to express users privacy preferences on location information in a straightforward and intuitive way. Then, based on such location privacy preferences, we discuss a new solution, based on obfuscation techniques, which permits us to achieve, and quantitatively estimate through a metric, different degrees of location privacy.

Keywords

  • Location Measurement
  • Location Privacy
  • User Privacy
  • Privacy Requirement
  • Privacy Preference

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Supporting location-based conditions in access control policies. In: Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), Taipei, Taiwan (March 2006)

    Google Scholar 

  2. Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Managing privacy in LBAC systems. In: Proc. of the Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC-2007), Niagara Falls, Canada (May 2007)

    Google Scholar 

  3. Atluri, V., Shin, H.: Efficient enforcement of security policies based on tracking of mobile users. In: Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 237–251, Sophia Antipolis, France (2006)

    Google Scholar 

  4. Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of user’s privacy concerns. In: Proc. of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2003), pp. 709–712, Zurich, Switzerland (September 2003)

    Google Scholar 

  5. Bellavista, P., Corradi, A., Giannelli, C.: Efficiently managing location information with privacy requirements in wi-fi networks: a middleware approach. In: Proc. of the International Symposium on Wireless Communication Systems (ISWCS 2005), pp. 1–8, Siena, Italy (September 2005)

    Google Scholar 

  6. Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: Proc. of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMWO 2004) (2004)

    Google Scholar 

  7. Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  8. Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  9. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of the 1st International Conference on Mobile Systems, Applications, and Services (2003)

    Google Scholar 

  10. Hauser, C., Kabatnik, M.: Towards Privacy Support in a Global Location Service. In: Proc. of the IFIP Workshop on IP and ATM Traffic Management (WATM/EUNICE 2001), Paris, France (2001)

    Google Scholar 

  11. Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  12. Mokbel, M.F., Chow, C-Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proc. of the 32nd International Conference on Very Large Data Bases, pp. 763–774, Korea (2006)

    Google Scholar 

  13. Openwave. Openwave Location Manager (2006), http://www.openwave.com/

  14. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)

    CrossRef  Google Scholar 

  15. Sun, G., Chen, J., Guo, W., Ray Liu, K.J.: Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs. IEEE Signal Processing Magazine, pp. 12–23, July (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Dipartimento di Tecnologie dell’Informazione, Università di Milano – 26013 Crema, Italy

    C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati & P. Samarati

Authors
  1. C. A. Ardagna
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. M. Cremonini
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. E. Damiani
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. S. De Capitani di Vimercati
    View author publications

    You can also search for this author in PubMed Google Scholar

  5. P. Samarati
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Steve Barker Gail-Joon Ahn

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 IFIP International Federation for Information Processing

About this paper

Cite this paper

Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P. (2007). Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_4

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-73538-0_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73533-5

  • Online ISBN: 978-3-540-73538-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature