Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide priv...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2009
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/880 https://ink.library.smu.edu.sg/context/sis_research/article/1879/viewcontent/SSTD09_20__20Information_20Leakage.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1879 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-18792016-05-03T03:59:28Z Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity TAN, Kar Way LIN, Yimin MOURATIDIS, Kyriakos Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide privacy in the form of k-anonymity; i.e., they guarantee that the (location of the) querying user u is indistinguishable from at least k-1 others, where k is a parameter specified by u at query time. To achieve this, they form a group of k users, including u, and forward their minimum bounding rectangle (termed anonymzing spatial region, ASR) to the LBS. The rationale behind sending an ASR instead of the distinct k locations is that exact user positions (querying or not) should not be disclosed to the LBS. This results in large ASRs with considerable dead-space, and leads to unnecessary performance degradation. Additionally, there is no guarantee regarding the amount of location information that is actually revealed to the LBS. In this paper, we introduce the concept of information leakage in spatial cloaking. We provide measures of this leakage, and show how we can trade it for better performance in a tunable manner. The proposed methodology directly applies to centralized and decentralized cloaking models, and is readily deployable on existing systems. 2009-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/880 info:doi/10.1007/978-3-642-02982-0_10 https://ink.library.smu.edu.sg/context/sis_research/article/1879/viewcontent/SSTD09_20__20Information_20Leakage.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Dead-space Existing systems Information leakage K-Anonymity Location information Location-Based Services Minimum bounding rectangle Mobile users On-Demand Performance degradation Privacy issue Query time Spatial regions User location Databases and Information Systems Numerical Analysis and Scientific Computing |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Dead-space Existing systems Information leakage K-Anonymity Location information Location-Based Services Minimum bounding rectangle Mobile users On-Demand Performance degradation Privacy issue Query time Spatial regions User location Databases and Information Systems Numerical Analysis and Scientific Computing |
spellingShingle |
Dead-space Existing systems Information leakage K-Anonymity Location information Location-Based Services Minimum bounding rectangle Mobile users On-Demand Performance degradation Privacy issue Query time Spatial regions User location Databases and Information Systems Numerical Analysis and Scientific Computing TAN, Kar Way LIN, Yimin MOURATIDIS, Kyriakos Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity |
description |
Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide privacy in the form of k-anonymity; i.e., they guarantee that the (location of the) querying user u is indistinguishable from at least k-1 others, where k is a parameter specified by u at query time. To achieve this, they form a group of k users, including u, and forward their minimum bounding rectangle (termed anonymzing spatial region, ASR) to the LBS. The rationale behind sending an ASR instead of the distinct k locations is that exact user positions (querying or not) should not be disclosed to the LBS. This results in large ASRs with considerable dead-space, and leads to unnecessary performance degradation. Additionally, there is no guarantee regarding the amount of location information that is actually revealed to the LBS. In this paper, we introduce the concept of information leakage in spatial cloaking. We provide measures of this leakage, and show how we can trade it for better performance in a tunable manner. The proposed methodology directly applies to centralized and decentralized cloaking models, and is readily deployable on existing systems. |
format |
text |
author |
TAN, Kar Way LIN, Yimin MOURATIDIS, Kyriakos |
author_facet |
TAN, Kar Way LIN, Yimin MOURATIDIS, Kyriakos |
author_sort |
TAN, Kar Way |
title |
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity |
title_short |
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity |
title_full |
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity |
title_fullStr |
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity |
title_full_unstemmed |
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity |
title_sort |
spatial cloaking revisited: distinguishing information leakage from anonymity |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2009 |
url |
https://ink.library.smu.edu.sg/sis_research/880 https://ink.library.smu.edu.sg/context/sis_research/article/1879/viewcontent/SSTD09_20__20Information_20Leakage.pdf |
_version_ |
1770570748660809728 |