Protecting location privacy with personalized k-anonymity:: Architecture and algorithms

被引:498
作者
Gedik, Bugra
Liu, Ling
机构
[1] IBM Thomas J Watson Res Ctr, Hawthorne, NY 10532 USA
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
k-anonymity; location privacy; location-based applications; mobile computing systems;
D O I
10.1109/TMC.2007.1062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in the wide deployment of location-based services (LBSs) is the privacy-aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper describes a scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs. This architecture includes the development of a personalized location anonymization model and a suite of location perturbation algorithms. A unique characteristic of our location privacy architecture is the use of a flexible privacy personalization framework to support location k-anonymity for a wide range of mobile clients with context-sensitive privacy requirements. This framework enables each mobile client to specify the minimum level of anonymity that it desires and the maximum temporal and spatial tolerances that it is willing to accept when requesting k-anonymity-preserving LBSs. We devise an efficient message perturbation engine to implement the proposed location privacy framework. The prototype that we develop is designed to be run by the anonymity server on a trusted platform and performs location anonymization on LBS request messages of mobile clients such as identity removal and spatio-temporal cloaking of the location information. We study the effectiveness of our location cloaking algorithms under various conditions by using realistic location data that is synthetically generated from real road maps and traffic volume data. Our experiments show that the personalized location k-anonymity model, together with our location perturbation engine, can achieve high resilience to location privacy threats without introducing any significant performance penalty.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 32 条
[1]   Cyberguide: A mobile context-aware tour guide [J].
Abowd, Gregory D. ;
Atkeson, Christopher G. ;
Hong, Jason ;
Long, Sue ;
Kooper, Rob ;
Pinkerton, Mike .
WIRELESS NETWORKS, 1997, 3 (05) :421-433
[2]  
AGGARWAL G, 2005, P 10 INT C DAT THEOR, P246
[3]  
Beck L. L., 1980, ACM Transactions on Database Systems, V5, P316, DOI 10.1145/320613.320617
[4]  
BECKMANN N, 1990, SIGMOD REC, V19, P322, DOI 10.1145/93605.98741
[5]   The chemical classification of the AGB star IRAS 17515-2407 [J].
Chen, PS ;
Zhang, P .
CHINESE JOURNAL OF ASTRONOMY AND ASTROPHYSICS, 2003, 3 (06) :551-554
[6]   AUDITING AND INFERENCE CONTROL IN STATISTICAL DATABASES [J].
CHIN, FY ;
OZSOYOGLU, G .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1982, 8 (06) :574-582
[7]  
*COMP SCI TEL BOAR, 2006, IT ROADM GEOSP FUT
[8]  
Denning D. E., 1980, ACM Transactions on Database Systems, V5, P291, DOI 10.1145/320613.320616
[9]  
Dobkin D., 1979, ACM Transactions on Database Systems, V4, P97, DOI 10.1145/320064.320068
[10]  
DURI S, 2002, P INTL WORKSH MOB CO