Abstract
Widespread using of mobile positioning devices makes location based service (LBS) more and more popular. Since LBS need users’ current location and some of users’ personal interest as input, it would incurs some privacy related issues about the users. One important and comparatively effective method to protect users’ privacy in LBS is spatial cloaking based on k-anonymity, however there are some inherent drawbacks of traditional k-anonymity techniques in protecting users’ privacy in LBS. In this paper, we analysis some security attacks that utilized these drawbacks to encroach users’ privacy in LBS, and then we proposed some novel methods to defend these attacks. At the end, some suggestions for constructing a security scheme to protect the users’ privacy in using LBS are given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer (August 2004)
Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., Anderson, J.: Wireless Sensor Networks for Habitat Monitoring. In: WSNA 2002, Atlanta, Georgia (September 2002)
Gruteser, M., Grunwald, D.: Anonymous usage of location-basedservices through spatial and temporal cloaking. In: MobiSys (2003)
Dewri, R., Ray, I., Ray, I., Whitley, D.: Query m-invariance: Preventing query disclosures in continuous location-based services. In: MDM (2010)
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE (2007)
Moon, B., Jagadish, H., Faloutsos, C.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE 12(1), 124–141 (2001)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB, pp. 763–774 (2006)
Pingley, A., Zhang, N., Fu, X., Choi, H., Subramaniam, S., Zhao, W.: Protection of query privacy for continuous location based services. In: 2011 Proceedings of the INFOCOM, pp. 1710–1718. IEEE (2011)
Samarati, P.: Protecting respondent’s privacy in microdata release. IEEE Transactions on Knowledgeand Data Engineering 12(6), 1010–1027 (2001)
Samet, H.: The Design and Analysis of Spatial Data Structures. Addison-Wesley (1990)
Lin, X., Li, S.P., Yang, Z.H.: Attacking algorithms against continuous queries in LBS and anonymity measurement. Journal of Software 20(4), 1058–1068 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Juncheng, P., Huimin, D., Yinghui, S., Dong, L. (2014). Potential Attacks against k-Anonymity on LBS and Solutions for Defending the Attacks. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_124
Download citation
DOI: https://doi.org/10.1007/978-3-642-41674-3_124
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41673-6
Online ISBN: 978-3-642-41674-3
eBook Packages: EngineeringEngineering (R0)