2009
DOI: 10.1007/978-3-642-02982-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity

Abstract: Abstract. Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide privacy in the form of k-anonymity; i.e., they guarantee that the (location of the) querying user u is indistinguishable from at least k-1 others, where k is a parameter specified by u at query time. To achiev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…In all the above solutions, if the k users used to construct the anonymous regions are far away from each other, the anonymous regions may still be too large, and the service quality may be low. Tan et al [33] were the first ones to apply the idea of regionalization to the construction of anonymous regions, which divided the users in the anonymous regions into separate groups through the Hilbert space filling curve. When a user makes a server request, the anonymous server will use the locations of other users in the group to which it belongs to construct the anonymous region.…”
Section: Related Workmentioning
confidence: 99%
“…In all the above solutions, if the k users used to construct the anonymous regions are far away from each other, the anonymous regions may still be too large, and the service quality may be low. Tan et al [33] were the first ones to apply the idea of regionalization to the construction of anonymous regions, which divided the users in the anonymous regions into separate groups through the Hilbert space filling curve. When a user makes a server request, the anonymous server will use the locations of other users in the group to which it belongs to construct the anonymous region.…”
Section: Related Workmentioning
confidence: 99%
“…The ASR generated by this scheme will expand rapidly as the number of continuous LBS queries increases. Tan [4] proposed a method for ASR segmentation, he segments the rectangular ASR which is oversized and single into a number of discrete small rectangular ASRs, the total number of users in these small ASRs should be not less than k, the sum area of these small ASRs should be not less than the minimum size of the ASR required by users and at least one small ASR should contain the user u who sent the continuous LBS queries. To solve the problem that ASR is oversized, Xu [5] et al first proposed a method based on users' historical footprint information, they choose k-1 of the nearest historical traces from the user who send continuous LBS queries to construct ASR.…”
Section: Related Workmentioning
confidence: 99%
“…Because of its simplicity, k-anonymity has been studied and refined in many ways. For instance, Tan et al define information leakage to measure the amount of revealed location information in spatial cloaking, which quantifies the balance between privacy and performance [46]. Xue et al [48] introduce the concept of location diversity to ensure generalised regions to contain at least semantic locations (e.g., schools).…”
Section: Query Privacy and Request Generalisationmentioning
confidence: 99%