Abstract
This chapter reviews the existing location privacy-preserving mechanisms (LPPMs). There have been some survey papers discussing this topic. For example, Shokri et al. [1] discuss LPPMs in two groups: obfuscation mechanisms and anonymization mechanisms. Our review of the literature reveals two further mechanisms, cryptographic mechanisms and shared information reduction mechanisms, creating four categories for existing LPPMs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, J.-P. Hubaux, Quantifying location privacy, in Proceedings of the IEEE Symposium on Security and Privacy (2011), pp. 247–262
B. Liu, W. Zhou, T. Zhu, L. Gao, Y. Xiang, Location privacy and its applications: a systematic study, in IEEE Access, vol. 6 (2018), pp. 17606–17624
S. Mascetti, D. Freni, C. Bettini, X.S. Wang, S. Jajodia, Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. Int. J. Very Large Data. Bases 20(4), 541–566 (2011)
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, K.-L. Tan, Private queries in location based services: anonymizers are not necessary, in Proceedings of ther ACM SIGMOD (2008), pp. 121–132
G.F. Marias, C. Delakouridis, L. Kazatzopoulos, P. Georgiadis, Location privacy through secret sharing techniques, in Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (IEEE, 2005), pp. 614–620
P. Chen, Y. Lin, W. Zhang, X. Li, S. Zhang, Preserving location and content privacy for secure ranked queries in location based services, in Proceedings of the IEEE Trustcom/BigDataSE/ISPA (IEEE, 2016), pp. 892–899
M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in Proceedings of the ACM MobiSys (2003), pp. 31–42
B. Gedik, L. Liu, Location privacy in mobile systems: a personalized anonymization model, in Proceedings of the IEEE ICDCS (2005), pp. 620–629
T. Xu, Y. Cai, Exploring historical location data for anonymity preservation in location-based services, in Proceedings of the IEEE INFOCOM (2008)
Z. Huo, Y. Huang, X. Meng, History trajectory privacy-preserving through graph partition, in Proceedings of the ACM Workshop on Mobile Location-Based Service (2011), pp. 71–78
C. Bettini, S. Mascetti, X.S. Wang, D. Freni, S. Jajodia, Anonymity and historical-anonymity in location-based services, in Privacy in Location-Based Applications (Springer, Berlin, 2009), pp. 1–30
G. Zhong, U. Hengartner, A distributed k-anonymity protocol for location privacy, in Proceedings of the IEEE PerCom (2009), pp. 1–10
J. Li, H. Yan, Z. Liu, X. Chen, X. Huang, D.S. Wong, Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Syst. J. 11(2), 439–448 (2017)
C.-Y. Chow, M.F. Mokbel, X. Liu, Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351–380 (2011)
A. Solanas, F. Sebé, J. Domingo-Ferrer, Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond, in Proceedings of the ACM International Workshop on Privacy and Anonymity in Information Society (2008), pp. 61–69
A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3 (2007)
B. Bamba, L. Liu, P. Pesti, T. Wang, Supporting anonymous location queries in mobile environments with privacygrid, in Proceedings of the ACM International Conference on World Wide Web (2008), pp. 237–246
S. Mascetti, C. Bettini, X.S. Wang, D. Freni, S. Jajodia, Providenthider: an algorithm to preserve historical k-anonymity in LBS, in Proceedings of the IEEE International Conference on Mobile Data Management: Systems, Services and Middleware (2009), pp. 172–181
J. Krumm, Inference attacks on location tracks, in Proceeding of the IEEE Percom (2007), pp. 127–143
B. Palanisamy, L. Liu, Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans. Mob. Comput. 14(3), 495–508 (2015)
A.R. Beresford, F. Stajano, Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)
B. Ying, D. Makrakis, H.T. Mouftah, Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 17(8), 1524–1527 (2013)
R. Lu, X. Lin, T.H. Luan, X. Liang, X. Shen, Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 61(1), 86–96 (2012)
S. Gao, J. Ma, W. Shi, G. Zhan, C. Sun, TrPF: a trajectory privacy-preserving framework for participatory sensing. IEEE Trans. Inf. Forensics Secur. 8(6), 874–887 (2013)
Z. Xu, H. Zhang, X. Yu, Multiple mix-zones deployment for continuous location privacy protection, in Proceedings of the IEEE Trustcom/BigDataSE/ISPA (IEEE, 2016), pp. 760–766
J. Freudiger, M.H. Manshaei, J.-P. Hubaux, D.C. Parkes, Non-cooperative location privacy. IEEE Trans. Dependable Secur. Comput. 10(2), 84–98 (2013)
X. Gong, X. Chen, K. Xing, D.-H. Shin, M. Zhang, J. Zhang, From social group utility maximization to personalized location privacy in mobile networks. IEEE/ACM Trans. Netw. (2017)
D. Yang, X. Fang, G. Xue, Truthful incentive mechanisms for k-anonymity location privacy, in Proceedings of the IEEE INFOCOM (2013), pp. 2994–3002
X. Gong, X. Chen, K. Xing, D.-H. Shin, M. Zhang, J. Zhang, Personalized location privacy in mobile networks: a social group utility approach, in Proceedings of the IEEE INFOCOM (2015), pp. 1008–1016
K. Chatzikokolakis, C. Palamidessi, A. Pazii, Methods for location privacy: a comparative overview (2016)
G. Ghinita, Privacy for location-based services. Synth. Lect. Inf. Secur. Priv. Trust 4(1), 1–85 (2013)
S. Zhang, Q. Liu, G. Wang, Enhancing location privacy through user-defined grid in location-based services, in Proceedings of the IEEE Trustcom/BigDataSE/ISPA (IEEE, 2016), pp. 730–736
H. Kido, Y. Yanagisawa, T. Satoh, An anonymous communication technique using dummies for location-based services, in Proceedings of the IEEE ICPS (2005), pp. 88–97
T.-H. You, W.-C. Peng, W.-C. Lee, Protecting moving trajectories with dummies, in Proceedings of the IEEE International Conference on Mobile Data Management (2007), pp. 278–282
P.-R. Lei, W.-C. Peng, I.-J. Su, C.-P. Chang, Dummy-based schemes for protecting movement trajectories. J. Inf. Sci. Eng. 28(2), 335–350 (2012)
J. Krumm, Realistic driving trips for location privacy, in Proceedings of the IEEE PerCom (2009), pp. 25–41
R. Chow, P. Golle, Faking contextual data for fun, profit, and privacy, in Proceedings of the ACM workshop on Privacy in the Electronic Society (ACM, 2009), pp. 105–108
H.J. Do, Y.-S. Jeong, H.-J. Choi, K. Kim, Another dummy generation technique in location-based services, in Proceedings of the IEEE International Conference on Big Data and Smart Computing (BigComp) (IEEE, 2016), pp. 532–538
T. Hara, A. Suzuki, M. Iwata, Y. Arase, X. Xie, Dummy-based user location anonymization under real-world constraints. IEEE Access 4, 673–687 (2016)
C.A. Ardagna, M. Cremonini, E. Damiani, S.D.C. Di Vimercati, P. Samarati, Location privacy protection through obfuscation-based techniques, in Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy (Springer, 2007), pp. 47–60
C.A. Ardagna, M. Cremonini, S.D.C. di Vimercati, P. Samarati, An obfuscation-based approach for protecting location privacy. IEEE Trans. Dependable Secur. Comput. 8(1), 13–27 (2011)
A. Gutscher, Coordinate transformation-a solution for the privacy problem of location based services? in Proceedings of the IEEE International Parallel & Distributed Processing Symposium (2006), pp. 7–13
R.-H. Hwang, Y.-L. Hsueh, H.-W. Chung, A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput. 7(2), 126–139 (2014)
M. Terrovitis, N. Mamoulis, Privacy preservation in the publication of trajectories, in Proceedings of the IEEE International Conference on Mobile Data Management (2008), pp. 65–72
G. Ghinita, M.L. Damiani, C. Silvestri, E. Bertino, Preventing velocity-based linkage attacks in location-aware applications, in Proceedings of the ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (2009), pp. 246–255
M. Duckham, L. Kulik, A formal model of obfuscation and negotiation for location privacy, in Proceedings of the IEEE PerCom (2005), pp. 152–170
Y. Xiao, L. Xiong, Protecting locations with differential privacy under temporal correlations, in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2015), pp. 1298–1309
M.E. Andrés, N.E. Bordenabe, K. Chatzikokolakis, C. Palamidessi, Geo-indistinguishability: Differential privacy for location-based systems, in Proceedings of the ACM SIGSAC Conference on Computer & Communications Security (2013), pp. 901–914
N.E. Bordenabe, K. Chatzikokolakis, C. Palamidessi, Optimal geo-indistinguishable mechanisms for location privacy, in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2014), pp. 251–262
D. Kifer, A. Machanavajjhala, No free lunch in data privacy, in Proceedings of the ACM SIGMOD International Conference on Management of Data (2011), pp. 193–204
A.-M. Olteanu, K. Huguenin, R. Shokri, M. Humbert, J.-P. Hubaux, Quantifying interdependent privacy risks with location data. IEEE Trans. Mob. Comput. 16(3), 829–842 (2017)
S.C. Soma, T. Hashem, M.A. Cheema, S. Samrose, Trip planning queries with location privacy in spatial databases. World Wide Web 20(2), 205–236 (2017)
S. Amini, J. Lindqvist, J. Hong, J. Lin, E. Toch, N.S. Cache, Cache: caching location-enhanced content to improve user privacy, in Proceedings of the IEEE Mobisys (2011)
R. Shokri, G. Theodorakopoulos, P. Papadimitratos, E. Kazemi, J.-P. Hubaux, Hiding in the mobile crowd: locationprivacy through collaboration. IEEE Trans. Dependable Secur. Comput. 11(3), 266–279 (2014)
X. Zhu, H. Chi, B. Niu, W. Zhang, Z. Li, H. Li, Mobicache: when k-anonymity meets cache, in Proceedings of the IEEE Globecom (2013), pp. 820–825
B. Niu, Q. Li, X. Zhu, G. Cao, H. Li, Enhancing privacy through caching in location-based services, in Proceedings of the IEEE INFOCOM (2015)
B. Liu, W. Zhou, T. Zhu, L. Gao, T.H. Luan, H. Zhou, Silence is golden: enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks. IEEE Trans. Veh. Technol. 65(12), 9942–9953 (2016)
B. Liu, W. Zhou, T. Zhu, H. Zhou, X. Lin, Invisible hand: a privacy preserving mobile crowd sensing framework based on economic models. IEEE Trans. Veh. Technol. (2016)
X. Zhang, X. Gui, F. Tian, A framework for measuring query privacy in location-based service. KSII Trans. Internet Inf. Syst. (TIIS) 9(5), 1717–1732 (2015)
I. Wagner, D. Eckhoff, Technical privacy metrics: a systematic survey, http://arxiv.org/abs/1512.00327
M. Duckham, L. Kulik, Simulation of obfuscation and negotiation for location privacy, in International Conference on Spatial Information Theory (Springer, Berlin, 2005), pp. 31–48
Z. Ma, F. Kargl, M. Weber, Measuring long-term location privacy in vehicular communication systems. Comput. Commun. 33(12), 1414–1427 (2010)
B. Hoh, M. Gruteser, Protecting location privacy through path confusion, in Proceedings of the IEEE SecureComm (2005), pp. 194–205
H. Li, H. Zhu, S. Du, X. Liang, X. Shen, Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans. Dependable Secur. Comput. 1, 1–1 (2016)
C. Dwork, Differential privacy: a survey of results, in Proceedings of the International Conference on Theory and Applications of Models of Computation (Springer, Berlin, 2008), pp. 1–19
M. Li, R. Poovendran, K. Sampigethaya, L. Huang, CARAVAN: providing location privacy for VANET, in Proceedings of the Embedded Security in Cars (ESCAR) Workshop, vol. 2 (2005), pp. 13–15
B. Hoh, M. Gruteser, H. Xiong, A. Alrabady, Preserving privacy in GPS traces via uncertainty-aware path cloaking, in Proceedings of the ACM Conference on Computer and Communications Security (2007), pp. 161–171
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Liu, B., Zhou, W., Zhu, T., Xiang, Y., Wang, K. (2018). Location Privacy-Preserving Mechanisms. In: Location Privacy in Mobile Applications. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-1705-7_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-1705-7_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1704-0
Online ISBN: 978-981-13-1705-7
eBook Packages: Computer ScienceComputer Science (R0)