2017
DOI: 10.1109/tsmc.2016.2564928
|View full text |Cite
|
Sign up to set email alerts
|

Location Anonymization With Considering Errors and Existence Probability

Abstract: Mobile devices that can sense their location using GPS or Wi-Fi have become extremely popular. However, many users hesitate to provide their accurate location information to unreliable third parties if it means that their identities or sensitive attribute values will be disclosed by doing so. Many approaches for anonymization, such as k-anonymity, have been proposed to tackle this issue. Existing studies for k-anonymity usually anonymize each user's location so that the anonymized area contains k or more users… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…The setup includes 10,000 users interacting in a space measuring 8.4 km x 8.4 km, which includes businesses, restaurants, and parks. We used the data for this simulation based on previous research by Sei et al [29].…”
Section: Simulation Methodsmentioning
confidence: 99%
“…The setup includes 10,000 users interacting in a space measuring 8.4 km x 8.4 km, which includes businesses, restaurants, and parks. We used the data for this simulation based on previous research by Sei et al [29].…”
Section: Simulation Methodsmentioning
confidence: 99%
“…In contrast, the proposed scenario seeks to obtain each person's value as accurately as possible, as services like recommender systems require individual attribute values. Abul et al [ 2] and Sei et al [ 53] put forth location anonymization methods that consider location error and achieve.k-anonymity [ 41,42,58,65], which is a fundamental privacy metric. However, these methods are not applicable to .∈-differential privacy.…”
Section: Related Research Workmentioning
confidence: 99%
“…(1) In pseudonym methods, the user identity in each LBS query is replaced with a pseudonym, so as to disconnect the user from the query [11], [21]. However, for this kind of methods, although such solutions as establishing mixed zones have been designed to improve the effectiveness of pseudonyms [18], [19], [20], [2], it is still likely for an attacker to identify the user identity from query content itself, due to no change to each user query, i.e., it is difficult to resist the threat from data mining [9], [31]. For example, in [10], a novel paradigm of de-anonymization attacks based on mobility patterns of objects was proposed, which can re-identify the user trajectory accurately from a group of anonymous trajectories (where the real identities of mobile objects has been replaced with pseudonyms).…”
Section: Related Workmentioning
confidence: 99%