2018
DOI: 10.1016/j.cose.2018.07.002
|View full text |Cite
|
Sign up to set email alerts
|

k-Trustee: Location injection attack-resilient anonymization for location privacy

Abstract: Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' location privacy when using location-based services. A fundamental limitation of such mechanisms is that users and their location information in the system are inherently trusted by the Anonymization Server without any verification. In this paper, we show that such an issue could lead to a new class of attacks called location injection attacks which can successfully violate users' in-distinguishability (guaranteed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…In [32], the anonymous server maps all users in two-dimensional space to a onedimensional array according to the Hilbert curve and divides the users into several sets according to the value of k. When a user makes a service request, the anonymous region is constructed by using the user set to which the user belongs. Recently, Jin et al [2] thought the anonymization server could lead to a new class of attacks called location injection attacks which can successfully violate users' indistinguishability (guaranteed by k-anonymity) among a set of users.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [32], the anonymous server maps all users in two-dimensional space to a onedimensional array according to the Hilbert curve and divides the users into several sets according to the value of k. When a user makes a service request, the anonymous region is constructed by using the user set to which the user belongs. Recently, Jin et al [2] thought the anonymization server could lead to a new class of attacks called location injection attacks which can successfully violate users' indistinguishability (guaranteed by k-anonymity) among a set of users.…”
Section: Related Workmentioning
confidence: 99%
“…Examples of such risks include spamming users with unwanted advertisements, drawing sensitive inferences from victims' visits to various locations (e.g., students and teachers' offices), and learning sensitive information about them (identity, religious and political affiliations, etc.). Hence, location privacy protection for smart campus is becoming a critical issue [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the last few years, there has been an explosion of research articles that apply differential privacy to various functional areas such as healthcare [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22], learning [23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38], location-based services [39][40][41][42][43][44][45][46][47], internet-based collaboration [48], Internet of Things [49][50][51], block-chains [52][53][54], cyber-physical systems [55][56][57]…”
Section: Introductionmentioning
confidence: 99%