Abstract
The move towards service-oriented architectures and the increasing usage of mobile devices to access such services are two of the major changes in modern computing. Information about the user, their location and their trajectory can provide additional context information to a service, leading to useful applications such as directing a user to the nearest bus stop and displaying which buses are due to arrive in the next minutes. While this type of information can be useful, when the offered services are trusted, it also introduces privacy issues relating to gathering of location information for non-trusted applications like location-based marketing or user behaviour profiling. Users can limit their location information provided to a service but these controls are simple, making it important for the user to understand how their location information is being used by services. This paper reviews some of the methods currently being proposed to reduce the impact of location tracking on user privacy, and presents a novel encryption method for preserving the location and trajectory path of a user using Privacy-Enhancing Technologies.
Similar content being viewed by others
References
Aggarwal CC, Yu PS (2008) On static and dynamic methods for condensation-based privacy-preserving data mining. ACM Trans Database Syst 33:2:1–2:39
Agrawa R, Srikant R (2000) Privacy-preserving data mining. SIGMOD Rec 29:439–450
Asonov D, Freytag J-C (2003) Almost optimal private information retrieval. In: Proceedings of the 2nd international conference on privacy enhancing technologies, PET’02. Springer, Berlin/Heidelberg, pp 209–223
Burghardt T, Buchmann E, Müller J, Böhm K (2009) Understanding user preferences and awareness: privacy mechanisms in location-based services. In: Meersman R, Dillon T, Herrero P (eds) On the move to meaningful internet systems: OTM 2009. Lecture notes in computer science, vol 5870. Springer, Berlin/Heidelberg, pp 304–321
Chow C-Y, Mokbel M (2007) Enabling private continuous queries for revealed user locations. In: Papadias D, Zhang D, Kollios G (eds) Advances in spatial and temporal databases. Lecture notes in computer science, vol 4605. Springer, Berlin/Heidelberg, pp 258–275
Chow C-Y, Mokbel M (2009) Privacy in location-based services: a system architecture perspective. SIGSPATIAL Special 1:23–27
Chow C-Y, Mokbel MF, Aref WG (2009) Casper*: query processing for location services without compromising privacy. ACM Trans Database Syst 34:24:1–24:48
Chow C-Y, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th annual ACM international symposium on advances in geographic information systems, GIS ’06. ACM, New York, NY, USA, pp 171–178
Privacy Rights Clearinghouse (1997) A review of the fair information principles: the foundation of privacy public policy
Damiani ML, Bertino E, Silvestri C (2010) The probe framework for the personalized cloaking of private locations. Trans Data Privacy 3:123–148
Dewri R, Ray I, Whitley D (2010) Query m-invariance: Preventing query disclosures in continuous location-based services. In: Eleventh international conference on mobile data management (MDM), pp 95–104
Ghinita G, Damiani ML, Silvestri C, Bertino E (2009) Preventing velocity-based linkage attacks in location-aware applications. In: Proceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems, GIS ’09. ACM, New York, NY, USA, pp 246–255
Ghinita G, Kalnis P, Kantarcioglu M, Bertino E (2009) A hybrid technique for private location-based queries with database protection. In: Mamoulis N, Seidl T, Pedersen T, Torp K, Assent I (eds) Advances in spatial and temporal databases. Lecture notes in computer science, vol 5644. Springer, Berlin/Heidelberg, pp 98–116
Gkoulalas-Divanis A, Kalnis P, Verykios VS (2010) Providing k-anonymity in location based services. SIGKDD Explor Newsl 12:3–10
Gkoulalas-Divanis A, Verykios VS, Bozanis P (2009) A network aware privacy model for online requests in trajectory data. Data Knowl Eng 68(4):431–452
Gruteser M, Liu X (2004) Protecting privacy, in continuous location-tracking applications. IEEE Secur Priv 2(2):28–34
Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services, MobiSys ’03. ACM, New York, NY, USA, pp 31–42
Gruteser M, Grunwald D (2004) A methodological assessment of location privacy risks in wireless hotspot networks. In: Security in pervasive computing, volume 2802 of lecture notes in computer science. Springer, Berlin/Heidelberg, pp 113–142
Marco Gruteser and Dirk Grunwald. Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. Mob Netw Appl 10:315–325
Hazas M, Scott J, Krumm J (2004) Location-aware computing comes of age. Computer 37(2):95–97
Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: First international conference on security and privacy for emerging areas in communications networks, SecureComm 2005, pp 194–205
Kantarcioglu M, Vaidya J (2002) An architecture for privacy-preserving mining of client information. In: Proceedings of the IEEE international conference on privacy, security and data mining - volume 14, CRPIT ’14, Darlinghurst, Australia, 2002. Australian Computer Society, Inc., pp 37–42
Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the 10th international conference on advances in spatial and temporal databases, SSTD’07. Springer, Berlin/Heidelberg, pp 239–257
Koorn R, Gils HV, Hart JT, Overbeek P, Tellegen R (2004) Privacy-enhancing technologies white paper for decision-makers
Wei-Shinn K, Chen Y, Zimmermann R (2009) Privacy protected spatial query processing for advanced location based services. Wirel Pers Commun 51:53–65. doi:10.1007/s11277-008-9608-9
Lampson BW (1973) A note on the confinement problem. Commun ACM 16:613–615
Magkos E, Kotzanikolaou P, Sioutas S, Oikonomou K (2010) A distributed privacy-preserving scheme for location-based queries. In: IEEE international symposium on a world of wireless mobile and multimedia networks (WoWMoM), pp 1–6
Meyerowitz J, Choudhury RR (2009) Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of the 15th annual international conference on mobile computing and networking, MobiCom ’09. ACM, New York, NY, USA, pp 345–356
Mokbel MF (2006) Towards privacy-aware location-based database servers. In: 22nd international conference on data engineering workshops, p 93
Mokbel MF, Chow C-Y, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on very large data bases, VLDB ’06, VLDB Endowment, pp 763–774
Pingley A, Yu W, Zhang N, Fu X, Zhao W (2009) Cap: A context-aware privacy protection system for location-based services. In: ICDCS ’09. 29th IEEE international conference on distributed computing systems, pp 49–57
Rohunen A, Markkula J (2010) Approaches to privacy protection in location-based services. In: Zavoral F, Yaghob J, Pichappan P, El-Qawasmeh E (eds) Networked digital technologies. Communications in computer and information science, vol 87. Springer, Berlin/Heidelberg, pp 402–409
Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans on Knowl and Data Eng 13:1010–1027
Sun Y, La Porta TF, Kermani P (2009) A flexible privacy-enhanced location-based services system framework and practice. IEEE Trans Mob Comput 8(3):304 –321
Tang KP, Keyani P, Fogarty J, Hong JI (2006) Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI ’06. ACM, New York, NY, USA, pp 93–102
Truong A, Truong Q, Dang T (2010) An adaptive grid-based approach to location privacy preservation. In: Nguyen N, Katarzyniak R, Chen S-M (eds) Advances in intelligent information and database systems. Studies in computational intelligence, vol 283. Springer, Berlin/Heidelberg, pp 133–144
Truong QC, Truong AT, Dang TK (2009) Privacy preserving through a memorizing algorithm in location-based services. In: Proceedings of the 7th international conference on advances in mobile computing and multimedia, MoMM ’09. ACM, New York, NY, USA, pp 146–153
Um J, Kim H, Choi Y, Chang J (2009) A new grid-based cloaking algorithm for privacy protection in location-based services. In: HPCC ’09. 11th IEEE international conference on high performance computing and communications, pp 362–368
Wang S, Wang XS (2009) Anontwist: nearest neighbor querying with both location privacy and k-anonymity for mobile users. In: MDM ’09. Tenth international conference on mobile data management: systems, services and middleware, pp 443–448
Wang T, Liu L (2009) From data privacy to location privacy, pp 217–246
Yiu ML, Jensen CS, Huang X, Lu H (2008) Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: International conference on data engineering, pp 366–375
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Buchanan, W.J., Kwecka, Z. & Ekonomou, E. A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services. Mobile Netw Appl 18, 728–737 (2013). https://doi.org/10.1007/s11036-012-0362-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-012-0362-6