Abstract
This article examines a new problem of k-anonymity with respect to a reference dataset in privacy-aware location data publishing: given a user dataset and a sensitive event dataset, we want to generalize the user dataset such that by joining it with the event dataset through location, each event is covered by at least k users. Existing k-anonymity algorithms generalize every k user locations to the same vague value, regardless of the events. Therefore, they tend to overprotect against the privacy compromise and make the published data less useful. In this article, we propose a new generalization paradigm called local enlargement, as opposed to conventional hierarchy- or partition-based generalization. Local enlargement guarantees that user locations are enlarged just enough to cover all events k times, and thus maximize the usefulness of the published data. We develop an O(Hn)-approximate algorithm under the local enlargement paradigm, where n is the maximum number of events a user could possibly cover and Hn is the Harmonic number of n. With strong pruning techniques and mathematical analysis, we show that it runs efficiently and that the generalized user locations are up to several orders of magnitude smaller than those by the existing algorithms. In addition, it is robust enough to protect against various privacy attacks.
- Bayardo, R. and Agrawal, R. 2005. Data privacy through optimal k-anonymization. In Proceedings of the International Conference on Data Engineering (ICDE'05). 217--228. Google ScholarDigital Library
- Brinkhoff, T. 2002. A framework for generating network-based moving objects. Geoinformatica 6, 2, 153--180. Google ScholarDigital Library
- Chen, B.-C., LeFevre, K., and Ramakrishnan, R. 2007. Privacy skyline: Privacy with multi-dimensional adversarial knowledge. In Proceedings of the International Conference on Very Large Databases (VLDB'07). Google ScholarDigital Library
- Du, Y., Xia, T., Tao, Y., Zhang, D., and Zhu, F. 2007. On multidimensional k-anonymity with local recoding generalization (poster paper). In Proceedings of the International Conference on Data Engineering (ICDE'07).Google Scholar
- Fung, C. M., Wang, K., and Yu, P. S. 2005. Top-Down specialization for information and privacy preservation. In Proceedings of the International Conference on Data Engineering (ICDE'05). 205--216. Google ScholarDigital Library
- Gedik, B. and Liu, L. 2005. Location-Privacy in mobile systems: A personalized anonymization model. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS'05). Google ScholarDigital Library
- Gedik, B. and Liu, L. 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mobile Comput. 7, 1, 1--18. Google ScholarDigital Library
- Ghinita, G., Kalnis, P., and Skiadopoulos, S. 2007a. Mobihide: A mobile peer-to-peer system for anonymous location-based queries. In Proceedings of the International Symposium in Spatial and Temporal Databases (SSTD'07). 221--238. Google ScholarDigital Library
- Ghinita, G., Kalnis, P., and Skiadopoulos, S. 2007b. Prive: Anonymous location-based queries in distributed mobile systems. In Proceedings of the International World Wide Web Conference (WWW '07). 371--380. Google ScholarDigital Library
- Gruteser, M. and Grunwald, D. 2003. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the ACM International Conference on Mobile Systems, Applications and Services (MobiSys'03). 31--42. Google ScholarDigital Library
- Iwuchukwu, T. and Naughton, J. F. 2007. K-Anonymization as spatial indexing: Toward scalable and incremental anonymization. In Proceedings of the International Conference on Very Large Databases (VLDB'07). Google ScholarDigital Library
- Iyengar, V. 2002. Transforming data to satisfy privacy constraints. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 279--288. Google ScholarDigital Library
- LeFevre, K., D.DeWitt, and Ramakrishnan, R. 2005. Incognito: Efficient full-domain k-anonymity. In Proceedings of the ACM Conference on Management of Data (SIGMOD'05). 49--60. Google ScholarDigital Library
- LeFevre, K., DeWitt, D. J., and Ramakrishnan, R. 2006. Mondrian multidimensional k-anonymity. In Proceedings of the International Conference on Data Engineering (ICDE'06). Google ScholarDigital Library
- Li, N., Li, T., and Venkatasubramanian, S. 2007. t-Closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE'07). 106--115.Google Scholar
- Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. 2006. l-Diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE'06). 24--35. Google ScholarDigital Library
- Martin, D. J., Kifer, D., Machanavajjhala, A., Gehrke, J., and Halpern, J. Y. 2007. Worst-Case background knowledge for privacy-preserving data publishing. In Proceedings of the International Conference on Data Engineering (ICDE'07).Google Scholar
- Mokbel, M. F., Chow, C.-Y., and Aref, W. G. 2006. The new casper: Query processing for location services without compromising privacy. In Proceedings of the International Conference on Very Large Databases (VLDB'06). Google ScholarDigital Library
- Samarati, P. 2001. Protecting respondents privacy in microdata release. IEEE Trans. Knowl. Data Engin. 13, 6, 1010--1027. Google ScholarDigital Library
- Sweeney, L. 2002. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty, Fuzz. Knowl.-based Syst. 10, 5, 571--588. Google ScholarDigital Library
- Vazirani, V. V. 2001. Approximation Algorithms. Springer. Google ScholarDigital Library
- Wang, K., Yu, P. S., and Chakraborty, S. 2004. Bottom-Up generalization: A data mining solution to privacy protection. In Proceedings of the IEEE International Conference on Data Mining (ICDM'04). 249--256. Google ScholarDigital Library
- Xiao, X. and Tao, Y. 2006a. Anatomy: Simple and effective privacy preservation. In Proceedings of the 32nd International Conference on Very Large Databases (VLDB '06). 139--150. Google ScholarDigital Library
- Xiao, X. and Tao, Y. 2006b. Personalized privacy preservation. In Proceedings of the ACM Conference on Management of Data (SIGMOD'06). 229--240. Google ScholarDigital Library
Index Terms
- Privacy-aware location data publishing
Recommendations
A privacy-aware location cloaking technique reducing bandwidth consumption in location-based services
QUeST '12: Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal DataThe explosive growth of location-detection devices, such as GPS (Global Positioning System), continuously increases users' privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/...
Privacy-Aware Cloaking Technique in Location-Based Services
MS '12: Proceedings of the 2012 IEEE First International Conference on Mobile ServicesThe explosive growth of location-detection devices, such as GPS (Global Positioning System), continuously increasing users' privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/...
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An ...
Comments