Skip to main content

Potential Attacks against k-Anonymity on LBS and Solutions for Defending the Attacks

  • Conference paper
Advances in Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 279))

Abstract

Widespread using of mobile positioning devices makes location based service (LBS) more and more popular. Since LBS need users’ current location and some of users’ personal interest as input, it would incurs some privacy related issues about the users. One important and comparatively effective method to protect users’ privacy in LBS is spatial cloaking based on k-anonymity, however there are some inherent drawbacks of traditional k-anonymity techniques in protecting users’ privacy in LBS. In this paper, we analysis some security attacks that utilized these drawbacks to encroach users’ privacy in LBS, and then we proposed some novel methods to defend these attacks. At the end, some suggestions for constructing a security scheme to protect the users’ privacy in using LBS are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer (August 2004)

    Google Scholar 

  2. Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., Anderson, J.: Wireless Sensor Networks for Habitat Monitoring. In: WSNA 2002, Atlanta, Georgia (September 2002)

    Google Scholar 

  3. Gruteser, M., Grunwald, D.: Anonymous usage of location-basedservices through spatial and temporal cloaking. In: MobiSys (2003)

    Google Scholar 

  4. Dewri, R., Ray, I., Ray, I., Whitley, D.: Query m-invariance: Preventing query disclosures in continuous location-based services. In: MDM (2010)

    Google Scholar 

  5. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE (2007)

    Google Scholar 

  6. Moon, B., Jagadish, H., Faloutsos, C.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE 12(1), 124–141 (2001)

    Google Scholar 

  7. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB, pp. 763–774 (2006)

    Google Scholar 

  8. Pingley, A., Zhang, N., Fu, X., Choi, H., Subramaniam, S., Zhao, W.: Protection of query privacy for continuous location based services. In: 2011 Proceedings of the INFOCOM, pp. 1710–1718. IEEE (2011)

    Google Scholar 

  9. Samarati, P.: Protecting respondent’s privacy in microdata release. IEEE Transactions on Knowledgeand Data Engineering 12(6), 1010–1027 (2001)

    Article  Google Scholar 

  10. Samet, H.: The Design and Analysis of Spatial Data Structures. Addison-Wesley (1990)

    Google Scholar 

  11. Lin, X., Li, S.P., Yang, Z.H.: Attacking algorithms against continuous queries in LBS and anonymity measurement. Journal of Software 20(4), 1058–1068 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pan Juncheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Juncheng, P., Huimin, D., Yinghui, S., Dong, L. (2014). Potential Attacks against k-Anonymity on LBS and Solutions for Defending the Attacks. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_124

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41674-3_124

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41673-6

  • Online ISBN: 978-3-642-41674-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics