Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers

被引:89
作者
Dewri, Rinku [1 ]
机构
[1] Univ Denver, Dept Comp Sci, Denver, CO 80208 USA
基金
美国国家科学基金会;
关键词
Location privacy; differential privacy; query approximations; ANONYMITY;
D O I
10.1109/TMC.2012.208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location privacy research has received wide attention in the past few years owing to the growing popularity of location-based applications, and the skepticism thereof on the collection of location information. A large section of this research is directed toward mechanisms based on location obfuscation enforced using cloaking regions. The primary motivation for this engagement comes from the relatively well-researched area of database privacy. Researchers in this sibling domain have indicated multiple times that any notion of privacy is incomplete without explicit statements on the capabilities of an adversary. As a result, we have started to see some efforts to categorize the various forms of background knowledge that an adversary may possess in the context of location privacy. Along this line, we consider some preliminary forms of attacker knowledge, and explore what implication does a certain form of knowledge has on location privacy. Continuing on, we extend our insights to a form of adversarial knowledge related to the geographic uncertainty that the adversary has in correctly locating a user. We empirically demonstrate that the use of cloaking regions can adversely impact the preservation of privacy in the presence of such approximate location knowledge, and demonstrate how perturbation-based mechanisms can instead provide a well-balanced tradeoff between privacy and service accuracy.
引用
收藏
页码:2360 / 2372
页数:13
相关论文
共 36 条
  • [1] Bamba B., 2008, Proceeding of 17th International Conference on World Wide Web, P237, DOI DOI 10.1145/1367497.1367531
  • [2] Mix zones: User privacy in location-aware services
    Beresford, AR
    Stajano, F
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 127 - 131
  • [3] Cheng R, 2006, LECT NOTES COMPUT SC, V4258, P393
  • [4] Dewri Rinku, 2010, Proceedings 11th International Conference on Mobile Data Management (MDM 2010), P95, DOI 10.1109/MDM.2010.52
  • [5] Dewri R., 2011, P 7 INT ICST C SEC P, P96
  • [6] Dewri R, 2010, L N INST COMP SCI SO, V50, P71
  • [7] Duckham M, 2005, LECT NOTES COMPUT SC, V3468, P152
  • [8] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [9] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [10] Ghinita G., 2007, Proceedings of 16th International Conference on World Wide Web, P371, DOI DOI 10.1145/1242572.1242623