An Obfuscation-Based Approach for Protecting Location Privacy

The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2011-01, Vol.8 (1), p.13-27
Hauptverfasser: Ardagna, Claudio A, Cremonini, Marco, De Capitani di Vimercati, Sabrina, Samarati, Pierangela
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 27
container_issue 1
container_start_page 13
container_title IEEE transactions on dependable and secure computing
container_volume 8
creator Ardagna, Claudio A
Cremonini, Marco
De Capitani di Vimercati, Sabrina
Samarati, Pierangela
description The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated solutions able to guarantee different levels of location privacy to the users. In this paper, we address this problem and present a solution based on different obfuscation operators that, when used individually or in combination, protect the privacy of the location information of users. We also introduce an adversary model and provide an analysis of the proposed obfuscation operators to evaluate their robustness against adversaries aiming to reverse the obfuscation effects to retrieve a location that better approximates the location of the users. Finally, we present some experimental results that validate our solution.
doi_str_mv 10.1109/TDSC.2009.25
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_771946501</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5089332</ieee_id><sourcerecordid>2189057611</sourcerecordid><originalsourceid>FETCH-LOGICAL-c380t-eaf2f485f8d6e32a585fbb61cfabb657e9d4cbf0109072279698f0255c8eb1dc3</originalsourceid><addsrcrecordid>eNpdkD1PwzAQhi0EEqWwsbFELCyknB07sQeGUj6lSkWizJbj2JCqjYOdIPXf4yiIgelenR6d3nsQOscwwxjEzfr-bTEjAGJG2AGaYEFxCoD5YcyMspSJAh-jkxA2AIRyQSfodt4kq9L2Qauudk16p4Kpknnbeqf0Z2KdT16964zu6uYjWboRi7v6W-n9KTqyahvM2e-covfHh_XiOV2unl4W82WqMw5dapQllnJmeZWbjCgWY1nmWFsVByuMqKguLcQfoCCkELngFghjmpsSVzqboqvxbqz11ZvQyV0dtNluVWNcHySnguYEYxzJy3_kxvW-ieVkUUQhOYMBuh4h7V0I3ljZ-nqn_F5ikINJOZiUg0lJWMQvRrw2xvyhDLjIMpL9APWDbfo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>771946501</pqid></control><display><type>article</type><title>An Obfuscation-Based Approach for Protecting Location Privacy</title><source>IEEE Electronic Library (IEL)</source><creator>Ardagna, Claudio A ; Cremonini, Marco ; De Capitani di Vimercati, Sabrina ; Samarati, Pierangela</creator><creatorcontrib>Ardagna, Claudio A ; Cremonini, Marco ; De Capitani di Vimercati, Sabrina ; Samarati, Pierangela</creatorcontrib><description>The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated solutions able to guarantee different levels of location privacy to the users. In this paper, we address this problem and present a solution based on different obfuscation operators that, when used individually or in combination, protect the privacy of the location information of users. We also introduce an adversary model and provide an analysis of the proposed obfuscation operators to evaluate their robustness against adversaries aiming to reverse the obfuscation effects to retrieve a location that better approximates the location of the users. Finally, we present some experimental results that validate our solution.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2009.25</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Accuracy ; Approximation ; Business ; Business communication ; Cellular phones ; Cellular telephones ; Context ; Costs ; Diffusion ; Digital Object Identifier ; Identity management systems ; Location based services ; Mathematical models ; Mobile communication ; Mobile communications networks ; Network security ; obfuscation techniques ; Operators ; Personal information ; Position (location) ; Privacy ; Protection ; Robustness ; Social network services ; Studies ; Technology</subject><ispartof>IEEE transactions on dependable and secure computing, 2011-01, Vol.8 (1), p.13-27</ispartof><rights>Copyright IEEE Computer Society Jan-Mar 2011</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c380t-eaf2f485f8d6e32a585fbb61cfabb657e9d4cbf0109072279698f0255c8eb1dc3</citedby><cites>FETCH-LOGICAL-c380t-eaf2f485f8d6e32a585fbb61cfabb657e9d4cbf0109072279698f0255c8eb1dc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5089332$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5089332$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ardagna, Claudio A</creatorcontrib><creatorcontrib>Cremonini, Marco</creatorcontrib><creatorcontrib>De Capitani di Vimercati, Sabrina</creatorcontrib><creatorcontrib>Samarati, Pierangela</creatorcontrib><title>An Obfuscation-Based Approach for Protecting Location Privacy</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated solutions able to guarantee different levels of location privacy to the users. In this paper, we address this problem and present a solution based on different obfuscation operators that, when used individually or in combination, protect the privacy of the location information of users. We also introduce an adversary model and provide an analysis of the proposed obfuscation operators to evaluate their robustness against adversaries aiming to reverse the obfuscation effects to retrieve a location that better approximates the location of the users. Finally, we present some experimental results that validate our solution.</description><subject>Accuracy</subject><subject>Approximation</subject><subject>Business</subject><subject>Business communication</subject><subject>Cellular phones</subject><subject>Cellular telephones</subject><subject>Context</subject><subject>Costs</subject><subject>Diffusion</subject><subject>Digital Object Identifier</subject><subject>Identity management systems</subject><subject>Location based services</subject><subject>Mathematical models</subject><subject>Mobile communication</subject><subject>Mobile communications networks</subject><subject>Network security</subject><subject>obfuscation techniques</subject><subject>Operators</subject><subject>Personal information</subject><subject>Position (location)</subject><subject>Privacy</subject><subject>Protection</subject><subject>Robustness</subject><subject>Social network services</subject><subject>Studies</subject><subject>Technology</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>BENPR</sourceid><recordid>eNpdkD1PwzAQhi0EEqWwsbFELCyknB07sQeGUj6lSkWizJbj2JCqjYOdIPXf4yiIgelenR6d3nsQOscwwxjEzfr-bTEjAGJG2AGaYEFxCoD5YcyMspSJAh-jkxA2AIRyQSfodt4kq9L2Qauudk16p4Kpknnbeqf0Z2KdT16964zu6uYjWboRi7v6W-n9KTqyahvM2e-covfHh_XiOV2unl4W82WqMw5dapQllnJmeZWbjCgWY1nmWFsVByuMqKguLcQfoCCkELngFghjmpsSVzqboqvxbqz11ZvQyV0dtNluVWNcHySnguYEYxzJy3_kxvW-ieVkUUQhOYMBuh4h7V0I3ljZ-nqn_F5ikINJOZiUg0lJWMQvRrw2xvyhDLjIMpL9APWDbfo</recordid><startdate>201101</startdate><enddate>201101</enddate><creator>Ardagna, Claudio A</creator><creator>Cremonini, Marco</creator><creator>De Capitani di Vimercati, Sabrina</creator><creator>Samarati, Pierangela</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PKEHL</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201101</creationdate><title>An Obfuscation-Based Approach for Protecting Location Privacy</title><author>Ardagna, Claudio A ; Cremonini, Marco ; De Capitani di Vimercati, Sabrina ; Samarati, Pierangela</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c380t-eaf2f485f8d6e32a585fbb61cfabb657e9d4cbf0109072279698f0255c8eb1dc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Accuracy</topic><topic>Approximation</topic><topic>Business</topic><topic>Business communication</topic><topic>Cellular phones</topic><topic>Cellular telephones</topic><topic>Context</topic><topic>Costs</topic><topic>Diffusion</topic><topic>Digital Object Identifier</topic><topic>Identity management systems</topic><topic>Location based services</topic><topic>Mathematical models</topic><topic>Mobile communication</topic><topic>Mobile communications networks</topic><topic>Network security</topic><topic>obfuscation techniques</topic><topic>Operators</topic><topic>Personal information</topic><topic>Position (location)</topic><topic>Privacy</topic><topic>Protection</topic><topic>Robustness</topic><topic>Social network services</topic><topic>Studies</topic><topic>Technology</topic><toplevel>online_resources</toplevel><creatorcontrib>Ardagna, Claudio A</creatorcontrib><creatorcontrib>Cremonini, Marco</creatorcontrib><creatorcontrib>De Capitani di Vimercati, Sabrina</creatorcontrib><creatorcontrib>Samarati, Pierangela</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied &amp; Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ardagna, Claudio A</au><au>Cremonini, Marco</au><au>De Capitani di Vimercati, Sabrina</au><au>Samarati, Pierangela</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Obfuscation-Based Approach for Protecting Location Privacy</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2011-01</date><risdate>2011</risdate><volume>8</volume><issue>1</issue><spage>13</spage><epage>27</epage><pages>13-27</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated solutions able to guarantee different levels of location privacy to the users. In this paper, we address this problem and present a solution based on different obfuscation operators that, when used individually or in combination, protect the privacy of the location information of users. We also introduce an adversary model and provide an analysis of the proposed obfuscation operators to evaluate their robustness against adversaries aiming to reverse the obfuscation effects to retrieve a location that better approximates the location of the users. Finally, we present some experimental results that validate our solution.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2009.25</doi><tpages>15</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2011-01, Vol.8 (1), p.13-27
issn 1545-5971
1941-0018
language eng
recordid cdi_proquest_journals_771946501
source IEEE Electronic Library (IEL)
subjects Accuracy
Approximation
Business
Business communication
Cellular phones
Cellular telephones
Context
Costs
Diffusion
Digital Object Identifier
Identity management systems
Location based services
Mathematical models
Mobile communication
Mobile communications networks
Network security
obfuscation techniques
Operators
Personal information
Position (location)
Privacy
Protection
Robustness
Social network services
Studies
Technology
title An Obfuscation-Based Approach for Protecting Location Privacy
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-17T15%3A01%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Obfuscation-Based%20Approach%20for%20Protecting%20Location%20Privacy&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Ardagna,%20Claudio%20A&rft.date=2011-01&rft.volume=8&rft.issue=1&rft.spage=13&rft.epage=27&rft.pages=13-27&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2009.25&rft_dat=%3Cproquest_RIE%3E2189057611%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=771946501&rft_id=info:pmid/&rft_ieee_id=5089332&rfr_iscdi=true