Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The move towards service-oriented architectures and the increasing usage of mobile devices to access such services are two of the major changes in modern computing. Information about the user, their location and their trajectory can provide additional context information to a service, leading to useful applications such as directing a user to the nearest bus stop and displaying which buses are due to arrive in the next minutes. While this type of information can be useful, when the offered services are trusted, it also introduces privacy issues relating to gathering of location information for non-trusted applications like location-based marketing or user behaviour profiling. Users can limit their location information provided to a service but these controls are simple, making it important for the user to understand how their location information is being used by services. This paper reviews some of the methods currently being proposed to reduce the impact of location tracking on user privacy, and presents a novel encryption method for preserving the location and trajectory path of a user using Privacy-Enhancing Technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Aggarwal CC, Yu PS (2008) On static and dynamic methods for condensation-based privacy-preserving data mining. ACM Trans Database Syst 33:2:1–2:39

    Article  Google Scholar 

  2. Agrawa R, Srikant R (2000) Privacy-preserving data mining. SIGMOD Rec 29:439–450

    Article  Google Scholar 

  3. Asonov D, Freytag J-C (2003) Almost optimal private information retrieval. In: Proceedings of the 2nd international conference on privacy enhancing technologies, PET’02. Springer, Berlin/Heidelberg, pp 209–223

    Chapter  Google Scholar 

  4. Burghardt T, Buchmann E, Müller J, Böhm K (2009) Understanding user preferences and awareness: privacy mechanisms in location-based services. In: Meersman R, Dillon T, Herrero P (eds) On the move to meaningful internet systems: OTM 2009. Lecture notes in computer science, vol 5870. Springer, Berlin/Heidelberg, pp 304–321

    Chapter  Google Scholar 

  5. Chow C-Y, Mokbel M (2007) Enabling private continuous queries for revealed user locations. In: Papadias D, Zhang D, Kollios G (eds) Advances in spatial and temporal databases. Lecture notes in computer science, vol 4605. Springer, Berlin/Heidelberg, pp 258–275

    Chapter  Google Scholar 

  6. Chow C-Y, Mokbel M (2009) Privacy in location-based services: a system architecture perspective. SIGSPATIAL Special 1:23–27

    Article  Google Scholar 

  7. Chow C-Y, Mokbel MF, Aref WG (2009) Casper*: query processing for location services without compromising privacy. ACM Trans Database Syst 34:24:1–24:48

    Article  Google Scholar 

  8. Chow C-Y, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th annual ACM international symposium on advances in geographic information systems, GIS ’06. ACM, New York, NY, USA, pp 171–178

    Chapter  Google Scholar 

  9. Privacy Rights Clearinghouse (1997) A review of the fair information principles: the foundation of privacy public policy

  10. Damiani ML, Bertino E, Silvestri C (2010) The probe framework for the personalized cloaking of private locations. Trans Data Privacy 3:123–148

    MathSciNet  Google Scholar 

  11. Dewri R, Ray I, Whitley D (2010) Query m-invariance: Preventing query disclosures in continuous location-based services. In: Eleventh international conference on mobile data management (MDM), pp 95–104

  12. Ghinita G, Damiani ML, Silvestri C, Bertino E (2009) Preventing velocity-based linkage attacks in location-aware applications. In: Proceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems, GIS ’09. ACM, New York, NY, USA, pp 246–255

    Google Scholar 

  13. Ghinita G, Kalnis P, Kantarcioglu M, Bertino E (2009) A hybrid technique for private location-based queries with database protection. In: Mamoulis N, Seidl T, Pedersen T, Torp K, Assent I (eds) Advances in spatial and temporal databases. Lecture notes in computer science, vol 5644. Springer, Berlin/Heidelberg, pp 98–116

    Chapter  Google Scholar 

  14. Gkoulalas-Divanis A, Kalnis P, Verykios VS (2010) Providing k-anonymity in location based services. SIGKDD Explor Newsl 12:3–10

    Article  Google Scholar 

  15. Gkoulalas-Divanis A, Verykios VS, Bozanis P (2009) A network aware privacy model for online requests in trajectory data. Data Knowl Eng 68(4):431–452

    Article  Google Scholar 

  16. Gruteser M, Liu X (2004) Protecting privacy, in continuous location-tracking applications. IEEE Secur Priv 2(2):28–34

    Article  Google Scholar 

  17. Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services, MobiSys ’03. ACM, New York, NY, USA, pp 31–42

  18. Gruteser M, Grunwald D (2004) A methodological assessment of location privacy risks in wireless hotspot networks. In: Security in pervasive computing, volume 2802 of lecture notes in computer science. Springer, Berlin/Heidelberg, pp 113–142

    Google Scholar 

  19. Marco Gruteser and Dirk Grunwald. Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. Mob Netw Appl 10:315–325

  20. Hazas M, Scott J, Krumm J (2004) Location-aware computing comes of age. Computer 37(2):95–97

    Article  Google Scholar 

  21. Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: First international conference on security and privacy for emerging areas in communications networks, SecureComm 2005, pp 194–205

  22. Kantarcioglu M, Vaidya J (2002) An architecture for privacy-preserving mining of client information. In: Proceedings of the IEEE international conference on privacy, security and data mining - volume 14, CRPIT ’14, Darlinghurst, Australia, 2002. Australian Computer Society, Inc., pp 37–42

  23. Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the 10th international conference on advances in spatial and temporal databases, SSTD’07. Springer, Berlin/Heidelberg, pp 239–257

    Chapter  Google Scholar 

  24. Koorn R, Gils HV, Hart JT, Overbeek P, Tellegen R (2004) Privacy-enhancing technologies white paper for decision-makers

  25. Wei-Shinn K, Chen Y, Zimmermann R (2009) Privacy protected spatial query processing for advanced location based services. Wirel Pers Commun 51:53–65. doi:10.1007/s11277-008-9608-9

    Article  Google Scholar 

  26. Lampson BW (1973) A note on the confinement problem. Commun ACM 16:613–615

    Article  Google Scholar 

  27. Magkos E, Kotzanikolaou P, Sioutas S, Oikonomou K (2010) A distributed privacy-preserving scheme for location-based queries. In: IEEE international symposium on a world of wireless mobile and multimedia networks (WoWMoM), pp 1–6

  28. Meyerowitz J, Choudhury RR (2009) Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of the 15th annual international conference on mobile computing and networking, MobiCom ’09. ACM, New York, NY, USA, pp 345–356

    Chapter  Google Scholar 

  29. Mokbel MF (2006) Towards privacy-aware location-based database servers. In: 22nd international conference on data engineering workshops, p 93

  30. Mokbel MF, Chow C-Y, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on very large data bases, VLDB ’06, VLDB Endowment, pp 763–774

  31. Pingley A, Yu W, Zhang N, Fu X, Zhao W (2009) Cap: A context-aware privacy protection system for location-based services. In: ICDCS ’09. 29th IEEE international conference on distributed computing systems, pp 49–57

  32. Rohunen A, Markkula J (2010) Approaches to privacy protection in location-based services. In: Zavoral F, Yaghob J, Pichappan P, El-Qawasmeh E (eds) Networked digital technologies. Communications in computer and information science, vol 87. Springer, Berlin/Heidelberg, pp 402–409

    Chapter  Google Scholar 

  33. Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans on Knowl and Data Eng 13:1010–1027

    Article  Google Scholar 

  34. Sun Y, La Porta TF, Kermani P (2009) A flexible privacy-enhanced location-based services system framework and practice. IEEE Trans Mob Comput 8(3):304 –321

    Article  Google Scholar 

  35. Tang KP, Keyani P, Fogarty J, Hong JI (2006) Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI ’06. ACM, New York, NY, USA, pp 93–102

    Chapter  Google Scholar 

  36. Truong A, Truong Q, Dang T (2010) An adaptive grid-based approach to location privacy preservation. In: Nguyen N, Katarzyniak R, Chen S-M (eds) Advances in intelligent information and database systems. Studies in computational intelligence, vol 283. Springer, Berlin/Heidelberg, pp 133–144

    Chapter  Google Scholar 

  37. Truong QC, Truong AT, Dang TK (2009) Privacy preserving through a memorizing algorithm in location-based services. In: Proceedings of the 7th international conference on advances in mobile computing and multimedia, MoMM ’09. ACM, New York, NY, USA, pp 146–153

    Chapter  Google Scholar 

  38. Um J, Kim H, Choi Y, Chang J (2009) A new grid-based cloaking algorithm for privacy protection in location-based services. In: HPCC ’09. 11th IEEE international conference on high performance computing and communications, pp 362–368

  39. Wang S, Wang XS (2009) Anontwist: nearest neighbor querying with both location privacy and k-anonymity for mobile users. In: MDM ’09. Tenth international conference on mobile data management: systems, services and middleware, pp 443–448

  40. Wang T, Liu L (2009) From data privacy to location privacy, pp 217–246

  41. Yiu ML, Jensen CS, Huang X, Lu H (2008) Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: International conference on data engineering, pp 366–375

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William J. Buchanan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Buchanan, W.J., Kwecka, Z. & Ekonomou, E. A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services. Mobile Netw Appl 18, 728–737 (2013). https://doi.org/10.1007/s11036-012-0362-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-012-0362-6

Keywords

Navigation