Research Article
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
@INPROCEEDINGS{10.1007/978-3-642-16161-2_5, author={Rinku Dewri and Indrakshi Ray and Indrajit Ray and Darrell Whitley}, title={On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS}, proceedings={Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, proceedings_a={SECURECOMM}, year={2012}, month={5}, keywords={historical k-anonymity continuous LBS anonymity sets}, doi={10.1007/978-3-642-16161-2_5} }
- Rinku Dewri
Indrakshi Ray
Indrajit Ray
Darrell Whitley
Year: 2012
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
SECURECOMM
Springer
DOI: 10.1007/978-3-642-16161-2_5
Abstract
Privacy preservation in location based services (LBS) has received extensive attention in recent years. One of the less explored problems in this domain is associated with services that rely on continuous updates from the mobile object. Cloaking algorithms designed to hide user locations in single requests perform poorly in this scenario. The historical -anonymity property is therefore enforced to ensure that all cloaking regions include at least objects in common. However, the mobility of the objects can easily render increasingly bigger cloaking regions and degrade the quality of service. To this effect, this paper presents an algorithm to efficiently enforce historical -anonymity by partitioning of an object’s cloaking region. We further enforce some degree of directional similarity in the common peers in order to prevent an excessive expansion of the cloaking region.