Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity

Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide priv...

Full description

Saved in:
Bibliographic Details
Main Authors: TAN, Kar Way, LIN, Yimin, MOURATIDIS, Kyriakos
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/880
https://ink.library.smu.edu.sg/context/sis_research/article/1879/viewcontent/SSTD09_20__20Information_20Leakage.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1879
record_format dspace
spelling sg-smu-ink.sis_research-18792016-05-03T03:59:28Z Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity TAN, Kar Way LIN, Yimin MOURATIDIS, Kyriakos Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide privacy in the form of k-anonymity; i.e., they guarantee that the (location of the) querying user u is indistinguishable from at least k-1 others, where k is a parameter specified by u at query time. To achieve this, they form a group of k users, including u, and forward their minimum bounding rectangle (termed anonymzing spatial region, ASR) to the LBS. The rationale behind sending an ASR instead of the distinct k locations is that exact user positions (querying or not) should not be disclosed to the LBS. This results in large ASRs with considerable dead-space, and leads to unnecessary performance degradation. Additionally, there is no guarantee regarding the amount of location information that is actually revealed to the LBS. In this paper, we introduce the concept of information leakage in spatial cloaking. We provide measures of this leakage, and show how we can trade it for better performance in a tunable manner. The proposed methodology directly applies to centralized and decentralized cloaking models, and is readily deployable on existing systems. 2009-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/880 info:doi/10.1007/978-3-642-02982-0_10 https://ink.library.smu.edu.sg/context/sis_research/article/1879/viewcontent/SSTD09_20__20Information_20Leakage.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Dead-space Existing systems Information leakage K-Anonymity Location information Location-Based Services Minimum bounding rectangle Mobile users On-Demand Performance degradation Privacy issue Query time Spatial regions User location Databases and Information Systems Numerical Analysis and Scientific Computing
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Dead-space
Existing systems
Information leakage
K-Anonymity
Location information
Location-Based Services
Minimum bounding rectangle
Mobile users
On-Demand
Performance degradation
Privacy issue
Query time
Spatial regions
User location
Databases and Information Systems
Numerical Analysis and Scientific Computing
spellingShingle Dead-space
Existing systems
Information leakage
K-Anonymity
Location information
Location-Based Services
Minimum bounding rectangle
Mobile users
On-Demand
Performance degradation
Privacy issue
Query time
Spatial regions
User location
Databases and Information Systems
Numerical Analysis and Scientific Computing
TAN, Kar Way
LIN, Yimin
MOURATIDIS, Kyriakos
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
description Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide privacy in the form of k-anonymity; i.e., they guarantee that the (location of the) querying user u is indistinguishable from at least k-1 others, where k is a parameter specified by u at query time. To achieve this, they form a group of k users, including u, and forward their minimum bounding rectangle (termed anonymzing spatial region, ASR) to the LBS. The rationale behind sending an ASR instead of the distinct k locations is that exact user positions (querying or not) should not be disclosed to the LBS. This results in large ASRs with considerable dead-space, and leads to unnecessary performance degradation. Additionally, there is no guarantee regarding the amount of location information that is actually revealed to the LBS. In this paper, we introduce the concept of information leakage in spatial cloaking. We provide measures of this leakage, and show how we can trade it for better performance in a tunable manner. The proposed methodology directly applies to centralized and decentralized cloaking models, and is readily deployable on existing systems.
format text
author TAN, Kar Way
LIN, Yimin
MOURATIDIS, Kyriakos
author_facet TAN, Kar Way
LIN, Yimin
MOURATIDIS, Kyriakos
author_sort TAN, Kar Way
title Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
title_short Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
title_full Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
title_fullStr Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
title_full_unstemmed Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
title_sort spatial cloaking revisited: distinguishing information leakage from anonymity
publisher Institutional Knowledge at Singapore Management University
publishDate 2009
url https://ink.library.smu.edu.sg/sis_research/880
https://ink.library.smu.edu.sg/context/sis_research/article/1879/viewcontent/SSTD09_20__20Information_20Leakage.pdf
_version_ 1770570748660809728