About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

Research Article

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS

Download(Requires a free EAI acccount)
500 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-16161-2_5,
        author={Rinku Dewri and Indrakshi Ray and Indrajit Ray and Darrell Whitley},
        title={On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS},
        proceedings={Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={historical k-anonymity continuous LBS anonymity sets},
        doi={10.1007/978-3-642-16161-2_5}
    }
    
  • Rinku Dewri
    Indrakshi Ray
    Indrajit Ray
    Darrell Whitley
    Year: 2012
    On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-16161-2_5
Rinku Dewri1,*, Indrakshi Ray2,*, Indrajit Ray2,*, Darrell Whitley2,*
  • 1: University of Denver
  • 2: Colorado State University
*Contact email: rdewri@cs.du.edu, iray@cs.colostate.edu, indrajit@cs.colostate.edu, whitley@cs.colostate.edu

Abstract

Privacy preservation in location based services (LBS) has received extensive attention in recent years. One of the less explored problems in this domain is associated with services that rely on continuous updates from the mobile object. Cloaking algorithms designed to hide user locations in single requests perform poorly in this scenario. The historical -anonymity property is therefore enforced to ensure that all cloaking regions include at least objects in common. However, the mobility of the objects can easily render increasingly bigger cloaking regions and degrade the quality of service. To this effect, this paper presents an algorithm to efficiently enforce historical -anonymity by partitioning of an object’s cloaking region. We further enforce some degree of directional similarity in the common peers in order to prevent an excessive expansion of the cloaking region.

Keywords
historical k-anonymity continuous LBS anonymity sets
Published
2012-05-28
http://dx.doi.org/10.1007/978-3-642-16161-2_5
Copyright © 2010–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL