Exploiting Service Similarity for Privacy in Location-Based Search Queries

被引:24
作者
Dewri, Rinku [1 ]
Thurimella, Ramakrisha [1 ]
机构
[1] Univ Denver, Dept Comp Sci, Denver, CO 80208 USA
基金
美国国家科学基金会;
关键词
Privacy-supportive LBS; location privacy; service quality; ANONYMITY;
D O I
10.1109/TPDS.2013.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighboring points of interests. However, location knowledge is often perceived as personal information. One of the immediate issues hindering the wide acceptance of location-based applications is the lack of appropriate methodologies that offer fine grain privacy controls to a user without vastly affecting the usability of the service. While a number of privacy-preserving models and algorithms have taken shape in the past few years, there is an almost universal need to specify one's privacy requirement without understanding its implications on the service quality. In this paper, we propose a user-centric location-based service architecture where a user can observe the impact of location inaccuracy on the service accuracy before deciding the geo-coordinates to use in a query. We construct a local search application based on this architecture and demonstrate how meaningful information can be exchanged between the user and the service provider to allow the inference of contours depicting the change in query results across a geographic area. Results indicate the possibility of large default privacy regions (areas of no change in result set) in such applications.
引用
收藏
页码:374 / 383
页数:10
相关论文
共 18 条
[1]  
Agarwal P. K., 1994, Proceedings of the Tenth Annual Symposium on Computational Geometry, P67, DOI 10.1145/177424.177521
[2]  
Aurenhammer F., 1991, P 7 ANN S COMP GEOM, P142
[3]  
Beygelzimer A., 2006, ICML, DOI DOI 10.1145/1143844.1143857
[4]  
Cheng R, 2006, LECT NOTES COMPUT SC, V4258, P393
[5]  
Duckham M, 2005, LECT NOTES COMPUT SC, V3468, P152
[6]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[7]  
Ghinita G., 2007, Proceedings of 16th International Conference on World Wide Web, P371, DOI DOI 10.1145/1242572.1242623
[8]   A reciprocal framework for spatial K-anonymity [J].
Ghinita, Gabriel ;
Zhao, Keliang ;
Papadias, Dimitris ;
Kalnis, Panos .
INFORMATION SYSTEMS, 2010, 35 (03) :299-314
[9]  
Golle P, 2009, LECT NOTES COMPUT SC, V5538, P390, DOI 10.1007/978-3-642-01516-8_26
[10]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42