Title :
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Author :
Li, Po-Yi ; Peng, Wen-Chih ; Wang, Tsung-Wei ; Ku, Wei-Shinn ; Xu, Jianliang ; Hamilton, J.A., Jr.
Author_Institution :
Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu
Abstract :
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible for cloaking at least k users´ locations for protecting location privacy. A location anonymizer will generate cloaked regions in which there are at least k users for query processing. Prior works only explore grid shape cloaked regions. However, grid shape cloaked regions result in a considerable amount of query results, thereby increasing the overhead of filtering unwanted query results. In this paper, we propose a cloaking algorithm in which cloaked regions are generated acording to the features of spatial networks. By exploring the features of spatial networks, the cloaked regions are very efficient for reducing query results and improving cache utilization of mobile devices. Furthermore, an index structure for spatial networks is built and in light of the proposed index structure, we develop a Spatial-Temporal Connective Cloaking algorithm(abbreviated as STCC). A simulator is implemented and extensive experiments are conducted. Experimental results show that our proposed algorithm out-performs prior cloaking algorithms in terms of the candidate query results and the cache utilization.
Keywords :
cache storage; data privacy; mobile computing; spatiotemporal phenomena; cache utilization; index structure; k-anonymity; location privacy protection; mobile device; query result; spatial network; spatial-temporal connective cloaking algorithm; Computer networks; Computer science; Mobile computing; Pervasive computing; Privacy; Protection; Roads; Shape; Software algorithms; Software engineering;
Conference_Titel :
Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE International Conference on
Conference_Location :
Taichung
Print_ISBN :
978-0-7695-3158-8
Electronic_ISBN :
978-0-7695-3158-8
DOI :
10.1109/SUTC.2008.56