Part of the book series:Lecture Notes in Computer Science ((LNISA,volume 5599))
1238Accesses
Abstract
A typical location-based service returns nearby points of interest in response to a user location. As such services are becoming increasingly available and popular, location privacy emerges as an important issue. In a system that does not offer location privacy, users must disclose their exact locations in order to receive the desired services. We view location privacy as an enabling technology that may lead to increased use of location-based services.
In this chapter, we consider location privacy techniques that work in traditional client-server architectures without any trusted components other than the client’s mobile device. Such techniques have important advantages. First, they are relatively easy to implement because they do not rely on any trusted third-party components. Second, they have potential for wide application, as the client-server architecture remains dominant for web services. Third, their effectiveness is independent of the distribution of other users, unlike thek-anonymity approach.
The chapter characterizes the privacy models assumed by existing techniques and categorizes these according to their approach. The techniques are then covered in turn according to their category. The first category of techniques enlarge the client’s position into a region before it is sent to the server. Next, dummy-based techniques hide the user’s true location among fake locations, called dummies. In progressive retrieval, candidate results are retrieved iteratively from the server, without disclosing the exact user location. Finally, transformation-based techniques employ cryptographic transformations so that the service provider is unable to decipher the exact user locations. We end by pointing out promising directions and open problems.
This is a preview of subscription content,log in via an institution to check access.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Voelcker, J.: Stalked by Satellite: An Alarming Rise in GPS-enabled Harassment. IEEE Spectrum 47(7), 15–16 (2006)
Bettini, C., Mascetti, S., Wang, X.S., Jajodia, S.: Anonymity in Location-Based Services: Towards a General Framework. In: MDM, pp. 69–76 (2007)
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Privacy Enhancing Technology Workshop, pp. 393–412 (2006)
Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: DBSec, pp. 47–60 (2007)
Xu, J., Du, J., Tang, X., Hu, H.: Privacy-Preserving Location-based Queries in Mobile Environments. Technical Report, Hong Kong Baptist University (2006)
Du, J., Xu, J., Tang, X., Hu, H.: iPDA: Supporting Privacy-Preserving Location-Based Mobile Services. In: MDM, pp. 212–214 (2007)
Mascetti, S., Bettini, C., Freni, D., Wang, X.S., Jajodia, S.: Privacy-aware proximity based services. In: MDM, pp. 1140–1143 (2009)
Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique using Dummies for Location-based Services. In: IEEE International Conference on Pervasive Services (ICPS), pp. 88–97 (2005)
Lu, H., Jensen, C.S., Yiu, M.L.: PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services. In: MobiDE, pp. 16–23 (2008)
Duckham, M., Kulik, L.: Simulation of Obfuscation and Negotiation for Location Privacy. In: Cohn, A.G., Mark, D.M. (eds.) COSIT 2005. LNCS, vol. 3693, pp. 31–48. Springer, Heidelberg (2005)
Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)
Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: ICDE, pp. 366–375 (2008)
Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007)
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private Queries in Location Based Services: Anonymizers are not Necessary. In: SIGMOD, pp. 121–132 (2008)
Hu, H., Lee, D.L.: Range Nearest-Neighbor Query. IEEE TKDE 18(1), 78–91 (2006)
Tao, Y., Papadias, D., Shen, Q.: Continuous Nearest Neighbor Search. In: VLDB, pp. 287–298 (2002)
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: VLDB, pp. 763–774 (2006)
Hjaltason, G.R., Samet, H.: Distance Browsing in Spatial Databases. TODS 24(2), 265–318 (1999)
Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Outsourcing Search Services on Private Spatial Data. In: ICDE, pp. 1140–1143 (2009)
Author information
Authors and Affiliations
Google Inc., Mountain View, CA, 94043, USA
Christian S. Jensen
Department of Computer Science, Aalborg University, Denmark
Christian S. Jensen, Hua Lu & Man Lung Yiu
- Christian S. Jensen
You can also search for this author inPubMed Google Scholar
- Hua Lu
You can also search for this author inPubMed Google Scholar
- Man Lung Yiu
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Dipartimento di Informatica e Comunicazione (DICO), Universita’ degli Studi di Milano, Via Comelico 39, 20135, Milano, Italy
Claudio Bettini
George Mason University, 4400 University Drive, 22030-4444, Fairfax, VA, USA
Sushil Jajodia
Dipartimento di Tecnologie dell’ Informazione, Universita’ degli Studi di Milano, Via Bramante 65, 26013, Crema, Italy
Pierangela Samarati
Department of Computer Science, University of Vermont, 33 Colchester Avenue, 05405, Burlington, VT, USA
X. Sean Wang
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Jensen, C.S., Lu, H., Yiu, M.L. (2009). Location Privacy Techniques in Client-Server Architectures. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds) Privacy in Location-Based Applications. Lecture Notes in Computer Science, vol 5599. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03511-1_2
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-642-03510-4
Online ISBN:978-3-642-03511-1
eBook Packages:Computer ScienceComputer Science (R0)
Share this chapter
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative