Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SUTC.2008.56guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Cloaking Algorithm Based on Spatial Networks for Location Privacy

Published: 11 June 2008 Publication History

Abstract

Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible for cloaking at least k users' locations for protecting location privacy. A location anonymizer will generate cloaked regions in which there are at least k users for query processing. Prior works only explore grid shape cloaked regions. However, grid shape cloaked regions result in a considerable amount of query results, thereby increasing the overhead of filtering unwanted query results. In this paper, we propose a cloaking algorithm in which cloaked regions are generated according to the features of spatial networks. By exploring the features of spatial networks, the cloaked regions are very efficient for reducing query results and improving cache utilization of mobile devices. Furthermore, an index structure for spatial networks is built and in light of the proposed index structure, we develop a Spatial-Temporal Connective Cloaking algorithm (abbreviated as STCC). A simulator is implemented and extensive experiments are conducted. Experimental results show that our proposed algorithm outperforms prior cloaking algorithms in terms of the candidate query results and the cache utilization.

Cited By

View all
  • (2017)A Policy-Based Framework for Preserving Confidentiality in BYOD EnvironmentsSecurity and Communication Networks10.1155/2017/20572602017Online publication date: 1-Jan-2017
  • (2016)User privacy protection for a mobile commerce allianceElectronic Commerce Research and Applications10.1016/j.elerap.2016.03.00518:C(58-70)Online publication date: 1-Jul-2016
  • (2016)Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile servicesFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-015-4528-910:2(370-386)Online publication date: 1-Apr-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SUTC '08: Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
June 2008
575 pages
ISBN:9780769531588

Publisher

IEEE Computer Society

United States

Publication History

Published: 11 June 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)A Policy-Based Framework for Preserving Confidentiality in BYOD EnvironmentsSecurity and Communication Networks10.1155/2017/20572602017Online publication date: 1-Jan-2017
  • (2016)User privacy protection for a mobile commerce allianceElectronic Commerce Research and Applications10.1016/j.elerap.2016.03.00518:C(58-70)Online publication date: 1-Jul-2016
  • (2016)Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile servicesFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-015-4528-910:2(370-386)Online publication date: 1-Apr-2016
  • (2016)Location K-anonymity in indoor spacesGeoinformatica10.1007/s10707-015-0241-y20:3(415-451)Online publication date: 1-Jul-2016
  • (2016)Semantic-Aware Location Privacy Preservation on Road NetworksProceedings, Part II, of the 21st International Conference on Database Systems for Advanced Applications - Volume 964310.1007/978-3-319-32049-6_20(314-331)Online publication date: 16-Apr-2016
  • (2013)Hilbert-order based spatial cloaking algorithm in road networkConcurrency and Computation: Practice & Experience10.1002/cpe.284425:1(143-158)Online publication date: 1-Jan-2013
  • (2011)Design and analysis of a ranking approach to private location-based servicesACM Transactions on Database Systems10.1145/1966385.196638836:2(1-42)Online publication date: 2-Jun-2011
  • (2010)Anonymity preserving framework for location-based information servicesProceedings of the International Conference on Management of Emergent Digital EcoSystems10.1145/1936254.1936274(107-113)Online publication date: 26-Oct-2010
  • (2009)PROSProceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems10.1145/1653771.1653872(552-553)Online publication date: 4-Nov-2009
  • (2009)Casper*ACM Transactions on Database Systems10.1145/1620585.162059134:4(1-48)Online publication date: 14-Dec-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media