On preserving location privacy in mobile environments

Chien Ping Wu*, Chen Che Huang, Jiun-Long Huang, Chih Lin Hu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

With the proliferation of mobile devices and advances in positioning technologies, the location-based services (LBSs) have emerged as one of the killer applications for mobile users. Preserving user location privacy is one of the most crucial issues for LBSs. In this paper, we propose a new concept of k-anonymity to preserve users' location privacy. We devise a novel cloaking algorithm, called split cloaking, to generate a set of distributed cloaking regions. These distributed cloaking regions achieve higher k-anonymity for mobile users, leading to better privacy protection. In addition, the split cloaking algorithm addresses the problem that the number of querying users is too small to achieve k-anonymity. The experimental results show that the split cloaking algorithm is effective in user location privacy preservation.

Original languageEnglish
Title of host publication2011 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011
Pages490-495
Number of pages6
DOIs
StatePublished - 10 Jun 2011
Event2011 9th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011 - Seattle, WA, United States
Duration: 21 Mar 201125 Mar 2011

Publication series

Name2011 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011

Conference

Conference2011 9th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011
CountryUnited States
CitySeattle, WA
Period21/03/1125/03/11

Keywords

  • location privacy
  • location-based service
  • mobile computing

Fingerprint Dive into the research topics of 'On preserving location privacy in mobile environments'. Together they form a unique fingerprint.

Cite this