• DocumentCode
    1902203
  • Title

    A Cloaking Algorithm Based on Spatial Networks for Location Privacy

  • Author

    Li, Po-Yi ; Peng, Wen-Chih ; Wang, Tsung-Wei ; Ku, Wei-Shinn ; Xu, Jianliang ; Hamilton, J.A., Jr.

  • Author_Institution
    Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu
  • fYear
    2008
  • fDate
    11-13 June 2008
  • Firstpage
    90
  • Lastpage
    97
  • Abstract
    Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible for cloaking at least k users´ locations for protecting location privacy. A location anonymizer will generate cloaked regions in which there are at least k users for query processing. Prior works only explore grid shape cloaked regions. However, grid shape cloaked regions result in a considerable amount of query results, thereby increasing the overhead of filtering unwanted query results. In this paper, we propose a cloaking algorithm in which cloaked regions are generated acording to the features of spatial networks. By exploring the features of spatial networks, the cloaked regions are very efficient for reducing query results and improving cache utilization of mobile devices. Furthermore, an index structure for spatial networks is built and in light of the proposed index structure, we develop a Spatial-Temporal Connective Cloaking algorithm(abbreviated as STCC). A simulator is implemented and extensive experiments are conducted. Experimental results show that our proposed algorithm out-performs prior cloaking algorithms in terms of the candidate query results and the cache utilization.
  • Keywords
    cache storage; data privacy; mobile computing; spatiotemporal phenomena; cache utilization; index structure; k-anonymity; location privacy protection; mobile device; query result; spatial network; spatial-temporal connective cloaking algorithm; Computer networks; Computer science; Mobile computing; Pervasive computing; Privacy; Protection; Roads; Shape; Software algorithms; Software engineering;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE International Conference on
  • Conference_Location
    Taichung
  • Print_ISBN
    978-0-7695-3158-8
  • Electronic_ISBN
    978-0-7695-3158-8
  • Type

    conf

  • DOI
    10.1109/SUTC.2008.56
  • Filename
    4545744