skip to main content
10.1145/2448556.2448624acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A cooperative method for privacy preservation in real-time location monitoring services

Published: 17 January 2013 Publication History

Abstract

This paper explores the problem of preserving location privacy in real-time location monitoring services. Because monitoring personal locations with untrusted service providers may breach monitored individuals' privacy, we adopt the system model that depends on a trusted anonymizer. The main role of the anonymizer is to blur individuals' locations into the cloaking regions for providing location k-anonymity to them. Most existing methods assume that the monitored individuals continually communicate with the anonymizer to report their current locations, and the anonymizer periodically regenerate their cloaking regions. However, this degrades the system performance due to the increased workload at the anonymizer as well as the severe communication bottleneck. With this problem in mind, we propose a distributed and cooperative privacy-preserving method, which leverages the computing capabilities of individuals' handheld devices in order to provide privacy guarantee (i.e., location k-anonymity) for the individuals in an efficient manner in terms of the workload at the anonymizer and the communication cost. The basic idea is to make the anonymizer and the individuals share the process of generating and keeping up-to-date cloaking regions. Through a series of simulations, we verify the efficiency of our work.

References

[1]
S. Ilarri, E. Mena, and A. Illarramendi, "Location-Dependent Query Processing: Where We Are and Where We Are Heading," ACM Computing Surveys, 42 (3), 2010, pp. 1--73.
[2]
B. Gedik, and L. Liu, "Mobieyes: A Distributed Location Monitoring Service Using Moving Location Queries," IEEE Trans. on Mobile Computing, 5 (10), 2006, pp. 1384--1402.
[3]
Y. Cai, K. A. Hua, G. Cao, and T. Xu, "Real-Time Processing of Range- Monitoring Queries in Heterogeneous Mobile Databases," IEEE Trans. on Mobile Computing, 5 (7), 2006, pp. 931--942.
[4]
H. Hu, J. Xu, and D. L. Lee, "PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects," IEEE Trans. on Knowledge and Data Engineering, 22 (3), 2010, pp. 404--419.
[5]
H. Jung, Y. D. Chung, and L. Liu, "Processing Generalized k-Nearest Neighbor Queries on a Wireless Broadcast Stream," Information Sciences, 188 (1), 2012, pp. 64--79.
[6]
H. Jung, Y. S. Kim, and Y. D. Chung, "SPQI: An Efficient Index for Continuous Range Queries in Mobile Environments," Journal of Information Science and Engineering, to appear, 2013
[7]
A. Gkoulalas. Divanis, P. Kalnis, and V. S. Verykios, "Providing K Anonymity in Location Based Services," ACM SIGKDD Explorations, 12 (1), 2010, pp. 3--10.
[8]
B. Gedik and L. Liu, "Location Privacy in Mobile Systems: A Personalized Anonymization Model," in Proc. of ICDCS, 2005, pp. 620--629.
[9]
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," in Proc. of MobiSys, pp. 31--42, 2003.
[10]
M. F. Mokbel, C. Y. Chow, and W. G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy," in Proc. of VLDB, 2006, pp. 763.774.
[11]
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Trans. on Knowledge and Data Engineering, 19 (12), 2007, pp. 1719--1733.
[12]
L. Sweeney, "Achieving k-anonymity Privacy Protection using Generalization and Suppression," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002, pp. 571--588.
[13]
L. Sweeney, "k-anonymity: A Model for Protecting Privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002, pp. 557--570.
[14]
J. Broch, D. A. Maltz, D. Johnson, Y.-C. Hu, and J. Jetcheva, "A performance comparison ofmulti-hop wireless ad hoc network routing protocols," in Proc. ACM/IEEE MobiCom, 1998, pp 85--97.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '13: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
January 2013
772 pages
ISBN:9781450319584
DOI:10.1145/2448556
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. location k-anonymity
  2. location monitoring systems
  3. location privacy

Qualifiers

  • Research-article

Conference

ICUIMC '13
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 218
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media