2015
DOI: 10.1109/tmc.2014.2321747
|View full text |Cite
|
Sign up to set email alerts
|

Attack-Resilient Mix-zones over Road Networks: Architecture and Algorithms

Abstract: Abstract-Continuous exposure of location information, even with spatially cloaked resolution, may lead to breaches of location privacy due to statistics-based inference attacks. An alternative and complementary approach to spatial cloaking based location anonymization is to break the continuity of location exposure by introducing techniques, such as mix-zones, where no application can trace user movements. Several factors impact on the effectiveness of mix-zone approach, such as user population, mix-zone geome… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 100 publications
(43 citation statements)
references
References 29 publications
0
43
0
Order By: Relevance
“…Le et al [30] improved the effectiveness of mix-zone with dynamic deployment. Palanisamy et al [5,6,31,32] further this scheme with delay-tolerant and non-rectangular structure, which made the mix-zone able to resist such as timing attack, transition attack and continuous query correlation attack. Gao et al [33] utilized this scheme in participatory sensing.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Le et al [30] improved the effectiveness of mix-zone with dynamic deployment. Palanisamy et al [5,6,31,32] further this scheme with delay-tolerant and non-rectangular structure, which made the mix-zone able to resist such as timing attack, transition attack and continuous query correlation attack. Gao et al [33] utilized this scheme in participatory sensing.…”
Section: Related Workmentioning
confidence: 99%
“…Assume that Alice queries for the nearest gas station and Bob queries for the restaurant. Although their trajectories are disturbed by mix-zone deployed in n 6 , query contents of them are not changed. As the adversary may gain the sub-trajectories between n 5 -n 6 and n 9 -n 6 , the request for gas station is denoted as triangles and the request for restaurants as pentagons may be mined out, so the real location with these contents will be correlated.…”
Section: Pr L T Sim P P Pr L T Pr Sim P P L T Pr Sim P P Pr L T Pr Simentioning
confidence: 99%
See 2 more Smart Citations
“…Various privacy protection algorithms proposed for data privacy have been adopted for protecting location privacy of mobile users. The types of privacy protection algorithms include anonymization [1,5,8,10,13,20], data suppression [18], trajectory inference prevention [2,3,[14][15][16] and encryption [11]. While most of the existing schemes are aimed at preventing the adversary from distinguishing the location of a given user from that of other users, their perturbation techniques are mostly unidirectional and lack the ability to de-anonymize the perturbed information even when a user accessing the information has suitable credentials for obtaining finer information.…”
Section: Related Workmentioning
confidence: 99%