1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

Research Article

Protecting Location Privacy Through Path Confusion

  • @INPROCEEDINGS{10.1109/SECURECOMM.2005.33,
        author={ Baik  Hoh and M.  Gruteser},
        title={Protecting Location Privacy Through Path Confusion},
        proceedings={1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2006},
        month={3},
        keywords={},
        doi={10.1109/SECURECOMM.2005.33}
    }
    
  • Baik Hoh
    M. Gruteser
    Year: 2006
    Protecting Location Privacy Through Path Confusion
    SECURECOMM
    IEEE
    DOI: 10.1109/SECURECOMM.2005.33
Baik Hoh1, M. Gruteser1
  • 1: WINLAB

Abstract

We present a path perturbation algorithm which can maximize users’ location privacy given a quality of service constraint. This work concentrates on a class of applications that continuously collect location samples from a large group of users, where just removing user identifiers from all samples is insufficient because an adversary could use trajectory information to track paths and follow users’ footsteps home. The key idea underlying the perturbation algorithm is to cross paths in areas where at least two users meet. This increases the chances that an adversary would confuse the paths of different users. We first formulate this privacy problem as a constrained optimization problem and then develop heuristics for an efficient privacy algorithm. Using simulations with randomized movement models we verify that the algorithm improves privacy while minimizing the perturbation of location samples.