A Distributed k-Anonymity Protocol for Location Privacy

被引:0
|
作者
Zhong, Ge [1 ]
Hengartner, Urs [1 ]
机构
[1] Univ Waterloo, Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person's location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking the person's location such that there are at least k - 1 other people within the cloaked area and by revealing only the cloaked area to a location-based service. Previous research has explored two ways of cloaking: First, have a central server that knows everybody's location determine the cloaked area. However, this server needs to be trusted by all users and is a single point of failure. Second, have users jointly determine the cloaked area. However, this approach requires that all users trust each other, which will likely not hold in practice. We propose a distributed approach that does not have these drawbacks. Our approach assumes that there are multiple servers, each deployed by a different organization. A user's location is known to only one of the servers (e.g., to her cellphone provider), so there is no single entity that knows everybody's location. With the help of cryptography, the servers and a user jointly determine whether the k-anonymity property holds for the user's area, without the servers learning any additional information, not even whether the property holds. A user learns whether the k-anonymity property is satisfied and no other information. The evaluation of our sample implementation shows that our distributed k-anonymity protocol is sufficiently fast to be practical. Moreover, our protocol integrates well with existing infrastructures for location-based services, as opposed to the previous research.
引用
收藏
页码:253 / 262
页数:10
相关论文
共 50 条
  • [31] A personalized k-anonymity privacy preserving method
    Xu, Yong
    Qin, Xiaolin
    Yang, Zhongxue
    Yang, Yitao
    Li, Kun
    Journal of Information and Computational Science, 2013, 10 (01): : 139 - 155
  • [32] Privacy in VoIP Networks: A k-Anonymity Approach
    Srivatsa, Mudhakar
    Iyengar, Arun
    Liu, Ling
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2856 - 2860
  • [33] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [34] PEAK: Privacy-Enhanced Incentive Mechanism for Distributed K-Anonymity in LBS
    Zhang, Man
    Li, Xinghua
    Miao, Yinbin
    Luo, Bin
    Ren, Yanbing
    Ma, Siqi
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (02) : 781 - 794
  • [35] Medical Ethics Privacy Protection Based on Combining Distributed Randomization With K-anonymity
    Xie, Yonghong
    He, Qing
    Zhang, Dezheng
    Hu, Xiaojing
    2015 8th International Congress on Image and Signal Processing (CISP), 2015, : 1577 - 1582
  • [36] Balancing between Utility and Privacy for k-Anonymity
    Babu, Korra Sathya
    Jena, Sanjay Kumar
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 1 - 8
  • [37] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [38] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [39] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561
  • [40] A hierarchical distributed trusted location service achieving location k-anonymity against the global observer
    Buccafurri, Francesco
    De Angelis, Vincenzo
    Idone, Maria Francesca
    Labrini, Cecilia
    COMPUTER NETWORKS, 2024, 243