A reciprocal framework for spatial K-anonymity

被引:53
作者
Ghinita, Gabriel [1 ]
Zhao, Keliang [2 ]
Papadias, Dimitris [3 ]
Kalnis, Panos
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[3] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
Location-based services; Anonymity; Privacy; Spatial databases;
D O I
10.1016/j.is.2009.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then. we present case studies of applying our framework on top of two Popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:299 / 314
页数:16
相关论文
共 33 条
[1]   AB+-TREE STRUCTURE FOR LARGE QUADTREES [J].
ABEL, DJ .
COMPUTER VISION GRAPHICS AND IMAGE PROCESSING, 1984, 27 (01) :19-31
[2]  
Aggarwal G., 2006, ACHIEVING ANONYMITY
[3]  
Bayardo R.J., 2005, Data privacy through optimal k-anonymization
[4]  
Beckmann N, 1990, R TREE EFFICIENT ROB
[5]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[6]  
BETTINI C, 2005, VLDB WORKSH SEC DAT
[7]  
BUTZ AR, 1971, IEEE T COMPUTERS APR
[8]  
CHENG R, 2006, PRIV ENH TECHN WORKS
[9]  
Chow C.-Y., 2007, ENABLING PRIVATE CON
[10]  
Chow C.-Y., 2006, PEER TO PEER SPATIAL