2013 47th International Carnahan Conference on Security Technology (ICCST) 2013
DOI: 10.1109/ccst.2013.6922079
|View full text |Cite
|
Sign up to set email alerts
|

High variability geographical obfuscation for location privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…The Pinwheel method was designed for applications that constantly keep track and update the users' location to a service provider (Wightman, Zurbaran, & Santander, 2014; Wightman et al., 2013; Zurbarán, Ávila, Wightman, & Fernández, 2014; Zurbarán, González, Wightman Rojas, & Labrador, 2014) and is a modified randomization method. In the Pinwheel method, the obfuscated point is a random point or either the farthest or the middle point among N random points in a pinwheel shape with center the original point P and radius r (Figure 1e).…”
Section: Existing Methods and Related Workmentioning
confidence: 99%
“…The Pinwheel method was designed for applications that constantly keep track and update the users' location to a service provider (Wightman, Zurbaran, & Santander, 2014; Wightman et al., 2013; Zurbarán, Ávila, Wightman, & Fernández, 2014; Zurbarán, González, Wightman Rojas, & Labrador, 2014) and is a modified randomization method. In the Pinwheel method, the obfuscated point is a random point or either the farthest or the middle point among N random points in a pinwheel shape with center the original point P and radius r (Figure 1e).…”
Section: Existing Methods and Related Workmentioning
confidence: 99%
“…Where φ is a parameter that will define the degrees wide of the pinwheel like distribution of the resulting points. A small value of φ will result more and thinner wings, a high value will result in less wider wings; therefore this determines the periodicity of the distribution of the output obfuscated location as shown in with high asymmetry of noise proved to be more efficient against filtering attacks, this is possible by adjusting values of φ according to [4]; therefore offering more geoprivacy with the same maximum radius of noise than a normal distribution. In order to decrease the probability that an obfuscated location falls too far from its original location, an extra step was taken for the pinwheel implementation in this paper.…”
Section: B Pinwheelmentioning
confidence: 99%
“…These algorithms disturb the original location but still provide distorted geographical coordinates as an obfuscated result as seen in Table 1. In particular, algorithms to include in this evaluation are: Donut Masking from [3], Pinwheel from [4], NRand-K from [5], VoKA: Voronoi K-Aggregation from [6], and a mechanism that induces noise by clustering based on VoKA from [7]; the framework will contain different analysis and metrics that will be computed with the datasets in their original form and obfuscated with the different mechanisms. The evaluations will aid in identifying what kind of perturbations are more suitable to preserve geographic properties and in general the framework will be replicable for any kind of LPPM based on noise or masking.…”
Section: Introductionmentioning
confidence: 99%
“…We make our custom PostGIS functions available as open-source software [29]. The pinwheel technique was originally designed because other point obfuscation methods could be reversed by methods designed to filter uniform noise; the randomness of the pinwheel has been shown to maintain high variability, making it less susceptible to privacy attack [25]. Our geographically constrained pinwheel algorithm leverages the same concept as the original pinwheel algorithm and improves its research utility by adding constraint checking that controls how the new obfuscated point is selected.…”
Section: Overviewmentioning
confidence: 99%