The problem of protecting user's privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving "historical k- anonymity" in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.
Anonymity and historical-anonymity in location-based services / C. Bettini, S. Mascetti, X.S. Wang, D. Freni, S. Jajodia (LECTURE NOTES IN COMPUTER SCIENCE). - In: Privacy in location-based applications: research issues and emerging trends / [a cura di] C. Bettini, S. Jajodia, P. Samarati, S. X. Wang. - Berlin : Springer, 2009. - ISBN 9783642035104. - pp. 1-30 [10.1007/978-3-642-03511-1_1]
Anonymity and historical-anonymity in location-based services
C. BettiniPrimo
;S. MascettiSecondo
;D. FreniPenultimo
;
2009
Abstract
The problem of protecting user's privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving "historical k- anonymity" in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.File | Dimensione | Formato | |
---|---|---|---|
bok%3A978-3-642-03511-1.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Dimensione
5.41 MB
Formato
Adobe PDF
|
5.41 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.