Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings

Research Article

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS

Download135 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-16161-2_5,
        author={Rinku Dewri and Indrakshi Ray and Indrajit Ray and Darrell Whitley},
        title={On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS},
        proceedings={Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={historical k-anonymity continuous LBS anonymity sets},
        doi={10.1007/978-3-642-16161-2_5}
    }
    
  • Rinku Dewri
    Indrakshi Ray
    Indrajit Ray
    Darrell Whitley
    Year: 2012
    On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-16161-2_5
Rinku Dewri1,*, Indrakshi Ray2,*, Indrajit Ray2,*, Darrell Whitley2,*
  • 1: University of Denver
  • 2: Colorado State University
*Contact email: rdewri@cs.du.edu, iray@cs.colostate.edu, indrajit@cs.colostate.edu, whitley@cs.colostate.edu

Abstract

Privacy preservation in location based services (LBS) has received extensive attention in recent years. One of the less explored problems in this domain is associated with services that rely on continuous updates from the mobile object. Cloaking algorithms designed to hide user locations in single requests perform poorly in this scenario. The historical -anonymity property is therefore enforced to ensure that all cloaking regions include at least objects in common. However, the mobility of the objects can easily render increasingly bigger cloaking regions and degrade the quality of service. To this effect, this paper presents an algorithm to efficiently enforce historical -anonymity by partitioning of an object’s cloaking region. We further enforce some degree of directional similarity in the common peers in order to prevent an excessive expansion of the cloaking region.