Abstract
Location Based Services (LBSs) introduce several privacy issues, the most relevant ones being: (i) how to anonymize a user; (ii) how to specify the level of anonymity; and, (iii) how to guarantee to a given user the same level of desired anonymity for all of his requests. Anonymizing the user within k potential users is a common solution to (i). A recent work [28] highlighted how specifying a practical value of k could be a difficult choice for the user, hence introducing a feeling based model: a user defines the desired level of anonymity specifying a given area (e.g. a shopping mall). The proposal sets the level of anonymity (ii) as the popularity of the area—popularity being measured via the entropy of the footprints of the visitors in that area. To keep the privacy level constant (iii), the proposal conceals the user requests always within an area of the same popularity—independently from the current user’s position.
The main contribution of this work is to highlight the importance of the time when providing privacy in LBSs. Further, we show how applying our considerations user privacy can be violated in the related model, but also in a relaxed one. We support our claim with both analysis and a practical counter-example.
Chapter PDF
Similar content being viewed by others
References
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 185–199. Springer, Heidelberg (2005)
Chow, C., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: GIS 2006, pp. 171–178 (2006)
Damiani, M.L., Bertino, E., Silvestri, C.: The probe framework for the personalized cloaking of private locations. Transactions on Data Privacy, 123–148 (2010)
Di Pietro, R., Michiardi, P., Molva, R.: Confidentiality and integrity for data aggregation in wsn using peer monitoring. Security and Communication Networks 2(2), 181–194 (2009)
Di Pietro, R., Viejo, A.: Location privacy and resilience in wireless sensor networks querying. Computer Communications (to appear)
Freudiger, J., Manshaei, M.H., Hubaux, J., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: CCS 2009, pp. 324–337 (2009)
Freudiger, J., Manshaei, M.H., Le Boudec, J., Hubaux, J.: On the Age of Pseudonyms in Mobile Ad Hoc Networks. In: INFOCOMM 2010, pp. 1577–1585 (2010)
Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.: Mix-zones for location privacy in vehicular networks. In: Win-ITS 2007 (2007)
Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS 2005, pp. 620–629 (2005)
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD 2008, pp. 121–132 (2008)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, pp. 31–42 (2003)
Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Security and Privacy 2(2), 28–34 (2004)
Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM 2005, pp. 194–205 (2005)
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in gps traces via uncertainty-aware path cloaking. In: CCS 2007, pp. 161–171 (2007)
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005, pp. 88–97 (2005)
Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput. 13(6), 391–399 (2009)
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: SIGMOD 2005, pp. 49–60 (2005)
Mokbel, M.F., Chow, C., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: VLDB 2006, pp. 763–774 (2006)
Ortolani, S., Conti, M., Crispo, B., Di Pietro, R.: Event Handoff Unobservability in WSN. In: iNetSec (2010)
Pashalidis, A., Mitchell, C.J.: Limits to anonymity when using credentials. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 4–12. Springer, Heidelberg (2006)
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)
Shokri, R., Freudiger, J., Hubaux, J.: Unified framework for location privacy. In: PETS 2010, pp. 203–214 (2010)
Solanas, A., Di Pietro, R.: A linear-time multivariate micro-aggregation for privacy protection in uniform very large data sets. In: Torra, V., Narukawa, Y. (eds.) MDAI 2008. LNCS (LNAI), vol. 5285, pp. 203–214. Springer, Heidelberg (2008)
Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-Based Systems 5(10), 557–570 (2002)
Xu, T., Cai, Y.: Location anonymity in continuous location-based services. In: GIS 2007, pp. 1–8 (2007)
Xu, T., Cai, Y.: Exploring historical location data for anonimity preservation in location-based services. In: INFOCOM 2008, pp. 547–555 (2008)
Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: CCS 2009, pp. 348–357 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Marconi, L., Di Pietro, R., Crispo, B., Conti, M. (2010). Time Warp: How Time Affects Privacy in LBSs. In: Soriano, M., Qing, S., López, J. (eds) Information and Communications Security. ICICS 2010. Lecture Notes in Computer Science, vol 6476. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17650-0_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-17650-0_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17649-4
Online ISBN: 978-3-642-17650-0
eBook Packages: Computer ScienceComputer Science (R0)