A cloaking algorithm based on spatial networks for location privacy

Po Yi Li*, Wen-Chih Peng, Tsung Wei Wang, Wei Shinn Ku, Jianliang Xu, J. A. Hamilton

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

34 Scopus citations

Abstract

Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible for cloaking at least k users' locations for protecting location privacy. A location anonymizer will generate cloaked regions in which there are at least k users for query processing. Prior works only explore grid shape cloaked regions. However, grid shape cloaked regions result in a considerable amount of query results, thereby increasing the overhead of filtering unwanted query results. In this paper, we propose a cloaking algorithm in which cloaked regions are generated according to the features of spatial networks. By exploring the features of spatial networks, the cloaked regions are very efficient for reducing query results and improving cache utilization of mobile devices. Furthermore, an index structure for spatial networks is built and in light of the proposed index structure, we develop a Spatial-Temporal Connective Cloaking algorithm(abbreviated as STCC). A simulator is implemented and extensive experiments are conducted. Experimental results show that our proposed algorithm outperforms prior cloaking algorithms in terms of the candidate query results and the cache utilization.

Original languageEnglish
Title of host publication2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008
Pages90-97
Number of pages8
DOIs
StatePublished - 9 Sep 2008
Event2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008 - Taichung, Taiwan
Duration: 11 Jun 200813 Jun 2008

Publication series

NameProceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing

Conference

Conference2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008
CountryTaiwan
CityTaichung
Period11/06/0813/06/08

Fingerprint Dive into the research topics of 'A cloaking algorithm based on spatial networks for location privacy'. Together they form a unique fingerprint.

Cite this