Potential Attacks against k-Anonymity on LBS and Solutions for Defending the Attacks

  • Pan Juncheng
  • Deng Huimin
  • Song Yinghui
  • Li Dong
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 279)


Widespread using of mobile positioning devices makes location based service (LBS) more and more popular. Since LBS need users’ current location and some of users’ personal interest as input, it would incurs some privacy related issues about the users. One important and comparatively effective method to protect users’ privacy in LBS is spatial cloaking based on k-anonymity, however there are some inherent drawbacks of traditional k-anonymity techniques in protecting users’ privacy in LBS. In this paper, we analysis some security attacks that utilized these drawbacks to encroach users’ privacy in LBS, and then we proposed some novel methods to defend these attacks. At the end, some suggestions for constructing a security scheme to protect the users’ privacy in using LBS are given.


LBS privacy k-anonymity continuous queries distribution inference K-disaccord 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer (August 2004)Google Scholar
  2. 2.
    Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., Anderson, J.: Wireless Sensor Networks for Habitat Monitoring. In: WSNA 2002, Atlanta, Georgia (September 2002)Google Scholar
  3. 3.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-basedservices through spatial and temporal cloaking. In: MobiSys (2003)Google Scholar
  4. 4.
    Dewri, R., Ray, I., Ray, I., Whitley, D.: Query m-invariance: Preventing query disclosures in continuous location-based services. In: MDM (2010)Google Scholar
  5. 5.
    Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE (2007)Google Scholar
  6. 6.
    Moon, B., Jagadish, H., Faloutsos, C.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE 12(1), 124–141 (2001)Google Scholar
  7. 7.
    Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB, pp. 763–774 (2006)Google Scholar
  8. 8.
    Pingley, A., Zhang, N., Fu, X., Choi, H., Subramaniam, S., Zhao, W.: Protection of query privacy for continuous location based services. In: 2011 Proceedings of the INFOCOM, pp. 1710–1718. IEEE (2011)Google Scholar
  9. 9.
    Samarati, P.: Protecting respondent’s privacy in microdata release. IEEE Transactions on Knowledgeand Data Engineering 12(6), 1010–1027 (2001)CrossRefGoogle Scholar
  10. 10.
    Samet, H.: The Design and Analysis of Spatial Data Structures. Addison-Wesley (1990)Google Scholar
  11. 11.
    Lin, X., Li, S.P., Yang, Z.H.: Attacking algorithms against continuous queries in LBS and anonymity measurement. Journal of Software 20(4), 1058–1068 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Pan Juncheng
    • 1
  • Deng Huimin
    • 1
  • Song Yinghui
    • 1
  • Li Dong
    • 1
  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina

Personalised recommendations