skip to main content
10.1145/2245276.2232010acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Indistinguishable regions in geographic privacy

Published:26 March 2012Publication History

ABSTRACT

The ubiquity of positioning devices poses a natural security challenge: users want to take advantage of location-related services as well as social sharing of their position but at the same time have security concerns about how much information should be shared about their exact position. This paper discusses different location-privacy problems, their formalization and the novel notion of indistinguishability regions that allows one to proof that a given obfuscation function provides a good trade-off between location sharing and privacy.

References

  1. C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati. An Obfuscation-Based Approach for Protecting Location Privacy. IEEE Trans. Dependable Secur. Comput., 8: 13--27, January 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Barnes, M. Thomson, J. Winterbottom, and H. Tschofenig. Location Configuration Extensions for Policy Management. http://www.ietf.org/id/draft-ietf-geopriv-policy-uri-01.txt, June 2011.Google ScholarGoogle Scholar
  3. A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 02(1): 46--55, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems. In Proceedings of the 16th international conference on World Wide Web, WWW '07, pages 371--380, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pages 31--42, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Kim. Location-based services worth $10B by 2016. http://gigaom.com/2011/06/09/location-based-services-worth-10b-by-2016/, June 2011.Google ScholarGoogle Scholar
  7. J. Krumm. Inference Attacks on Location Tracks. In Proceedings of the 5th international conference on Pervasive computing, PERVASIVE'07, pages 127--143, Berlin, Heidelberg, 2007. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Samarati and L. Sweeney. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. In Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P), Oakland, CA, May 1998.Google ScholarGoogle Scholar
  9. H. Schulzrinne, H. Tschofenig, J. Morris, J. Cuellar, J. Polk, and J. Rosenberg. Common Policy: A Document Format for Expressing Privacy Preferences. http://tools.ietf.org/html/rfc4745, Feb 2007.Google ScholarGoogle Scholar
  10. Senator Edwards, J. Location Privacy Protection Act of 2001. http://www.techlawjournal.com/cong107/privacy/location/s1164is.asp, July 2001.Google ScholarGoogle Scholar
  11. J.-H. Song, V. W. Wong, and V. C. Leung. Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks. Mob. Netw. Appl., 15: 160--171, February 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Thomson. Obscuring Location. http://tools.ietf.org/html/draft-thomson-geopriv-location-obscuring-03, June 2011.Google ScholarGoogle Scholar
  13. C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-Related Privacy in Geo-Social Networks. IEEE Internet Computing, 15: 20--27, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. F. Westin. Privacy and Freedom. New York Atheneum, 1 edition, 1967.Google ScholarGoogle Scholar

Index Terms

  1. Indistinguishable regions in geographic privacy

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
        March 2012
        2179 pages
        ISBN:9781450308571
        DOI:10.1145/2245276
        • Conference Chairs:
        • Sascha Ossowski,
        • Paola Lecca

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 March 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SAC '12 Paper Acceptance Rate270of1,056submissions,26%Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader