2008
DOI: 10.1007/s10707-008-0047-2
|View full text |Cite
|
Sign up to set email alerts
|

Cloaking locations for anonymous location based services: a hybrid approach

Abstract: Abstract. An important privacy issue in Location Based Services(LBS) is to hide a user's identity while still provide quality location based services. Previous work has addressed the problem of locational K-anonymity either based on centralized or decentralized schemes. However, a centralized scheme relies on an anonymizing server(AS) for location cloaking, which may become the performance bottleneck when there are large number of clients. More importantly, holding information in a centralized place is more vu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(25 citation statements)
references
References 22 publications
0
25
0
Order By: Relevance
“…K-anonymity protects the location information of a user by hiding it among other K-1 user locations (which may include dummies). In the literature, many approaches based on cloaking, K-anonymity, and dummies have been proposed to reduce the possibility of identifying a user's location [4,5,24,[26][27][28][29].…”
Section: Anonymity-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…K-anonymity protects the location information of a user by hiding it among other K-1 user locations (which may include dummies). In the literature, many approaches based on cloaking, K-anonymity, and dummies have been proposed to reduce the possibility of identifying a user's location [4,5,24,[26][27][28][29].…”
Section: Anonymity-based Approachesmentioning
confidence: 99%
“…Anonymizers increase the implementation and maintenance costs; additionally, they may become a potential point of failure or security breach. Instead of using an anonymizer, queries could be anonymized among the users in a decentralized manner [4,29]. In such an approach, each user should trust all other users in the system.…”
Section: Anonymity-based Approachesmentioning
confidence: 99%
“…This architecture model could pose a scalability issue because it requires all the mobile users to periodically report their exact locations to the location anonymizer. Also, storing the user's exact location at a server could pose a privacy breach, i.e., a single point of attacks [9,10,27]. For the distributed architecture model [9,10], the users maintain a complex data structure to anonymize their location information through fixed communication infrastructure, i.e., base stations.…”
Section: Related Workmentioning
confidence: 99%
“…For the distributed architecture model [9,10], the users maintain a complex data structure to anonymize their location information through fixed communication infrastructure, i.e., base stations. However, such a complex data structure leads to difficulties to apply this model to highly dynamic location-based mobile applications [27]. For the peer-to-peer model, to our best knowledge, our previous work is the only spatial cloaking algorithm for this architecture model [4].…”
Section: Related Workmentioning
confidence: 99%
“…The metadata of the representative are copied to all queries before they are transmitted to the LBS server, thereby satisfying -anonymity and obfuscation requirements. Anonymizers typically create obfuscation areas in grid [7,[10][11][12] or pyramid structure to mask user locations. In [13], a method was proposed to resolve the incompatibility between the original obfuscation area and query criteria by creating an additional obfuscated query area to keep privacy.…”
Section: Introductionmentioning
confidence: 99%