The problem of protecting user's privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving "historical k- anonymity" in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

Anonymity and historical-anonymity in location-based services / C. Bettini, S. Mascetti, X.S. Wang, D. Freni, S. Jajodia (LECTURE NOTES IN COMPUTER SCIENCE). - In: Privacy in location-based applications: research issues and emerging trends / [a cura di] C. Bettini, S. Jajodia, P. Samarati, S. X. Wang. - Berlin : Springer, 2009. - ISBN 9783642035104. - pp. 1-30 [10.1007/978-3-642-03511-1_1]

Anonymity and historical-anonymity in location-based services

C. Bettini
Primo
;
S. Mascetti
Secondo
;
D. Freni
Penultimo
;
2009

Abstract

The problem of protecting user's privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving "historical k- anonymity" in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.
Agent based; Defense techniques; Deployment scenarios; Experimental evaluation; K-Anonymity; Location-Based Services; Privacy protection; Realistic simulation; User movement
Settore INF/01 - Informatica
2009
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
bok%3A978-3-642-03511-1.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 5.41 MB
Formato Adobe PDF
5.41 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/154177
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 65
  • ???jsp.display-item.citation.isi??? 33
social impact