Filters








10,436 Hits in 4.0 sec

A reciprocal framework for spatial K-anonymity

Gabriel Ghinita, Keliang Zhao, Dimitris Papadias, Panos Kalnis
2010 Information Systems  
In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations.  ...  Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA.  ...  CONCLUSIONS In this paper we proposed a reciprocal framework that allows the implementation of a variety of secure algorithms for spatial K-anonymity on top of a spatial index.  ... 
doi:10.1016/j.is.2009.10.001 fatcat:4amn7w4vvfetjiiaz4fx5mqm2y

Spatial Anonymity [chapter]

Panos Kalnis, Gabriel Ghinita
2016 Encyclopedia of Database Systems  
The attacker uses current data, but not historical information about movement and behavior S Spatial Anonymity, Fig. 1 Framework and example for spatial k-anonymity patterns of particular clients (e.g  ...  For instance, a query with S Spatial Anonymity, Fig. 4 Example of Casper k D 2 issued by U 3 or U 4 , would generate the ASR h(0,2),(2,4)i (instead of h(1,2),(2,4)i for Casper).  ... 
doi:10.1007/978-1-4899-7993-3_352-2 fatcat:vkhjqv5rqfa7jg44wlrbvcanii

An Approach for Ensuring Robust Safeguard against Location Privacy Violation

Chowdhury S. Hasan, Sheikh I. Ahamed
2010 2010 IEEE 34th Annual Computer Software and Applications Conference  
There is no better way but to use a location anonymizer (LA) to achieve k-anonymity. However, its knowledge of each user's current location makes it susceptible to be a single-point-of-failure.  ...  In this paper, we propose a formal location privacy framework, termed SafeGrid that can work with or without an LA.  ...  The Reciprocity Condition It is a condition for a cloaking technique where it is necessary that the LA generates the same CR for every user in an anonymity set for the same anonymity level.  ... 
doi:10.1109/compsac.2010.14 dblp:conf/compsac/HasanA10 fatcat:bwep33t33jbptpi5hcfz7qukwe

Preventing Location-Based Identity Inference in Anonymous Spatial Queries

P. Kalnis, G. Ghinita, K. Mouratidis, D. Papadias
2007 IEEE Transactions on Knowledge and Data Engineering  
In this paper, we present a framework for preventing locationbased identity inference of users who issue spatial queries to Location Based Services.  ...  We propose transformations based on the well-established K-anonymity concept to compute exact answers for range and nearest neighbor search, without revealing the query source.  ...  Theorem 1: A spatial cloaking algorithm guarantees spatial K-anonymity, if every anonymizing set satisfies the reciprocity property.  ... 
doi:10.1109/tkde.2007.190662 fatcat:pe5hrnf4yregzjjegqpz33b4oi

Efficient algorithms for K-anonymous location privacy in participatory sensing

Khuong Vu, Rong Zheng, Jie Gao
2012 2012 Proceedings IEEE INFOCOM  
K-anonymity is an important measure for privacy to prevent the disclosure of personal data.  ...  The mechanism is shown to preserve both locality and K-anonymity. We then devise an efficient algorithm to answer kNN queries for any point in the spatial cloaks of arbitrary polygonal shape.  ...  Recognizing that Casper does not provide K-anonymity, Ghinita et al. proposed a framework for implementing reciprocal algorithms using any existing spatial index on the user locations [8] .  ... 
doi:10.1109/infcom.2012.6195629 dblp:conf/infocom/VuZG12 fatcat:5hxbrdoslbczrgr6n7hojwrgua

T-SR: A Location Privacy Protection Algorithm Based on POI Query

Li Kuang, Shuai He, Yuyou Fan, Huan Zhang, Ruyi Shi
2019 IEEE Access  
Third, the POI semantics within the grid will be split into several buckets according to query times record, anonymity degree k, and semantic degree l, then the dummy locations will be selected from various  ...  relationship between the query semantic and the user's location, as well, seldom considered whether the constructed anonymity sets of fake-locations can fulfill the property of reciprocity.  ...  For example, the anonymity set constructed by the user U requesting the POI query at a certain moment is AS k (U ), where k is an anonymity degree, and for ∀V ∈ AS k (U ) , AS k (V ) = AS k (U ) is satisfied  ... 
doi:10.1109/access.2019.2913547 fatcat:h55jq557u5hormr3ub4kp5gezm

Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity [chapter]

Kar Way Tan, Yimin Lin, Kyriakos Mouratidis
2009 Lecture Notes in Computer Science  
Spatial cloaking techniques provide privacy in the form of k-anonymity; i.e., they guarantee that the (location of the) querying user u is indistinguishable from at least k-1 others, where k is a parameter  ...  To achieve this, they form a group of k users, including u, and forward their minimum bounding rectangle (termed anonymizing spatial region, ASR) to the LBS.  ...  Reciprocity is defined as follows: Definition 1. Let AS k (u) be the anonymizing set of u for anonymity degree k.  ... 
doi:10.1007/978-3-642-02982-0_10 fatcat:ltu4lys2i5fzjkm72jlygr5ioa

Anonymous Query Processing in Road Networks

Kyriakos Mouratidis, Man Lung Yiu
2010 IEEE Transactions on Knowledge and Data Engineering  
., driving time through the roads of a city). In this paper, we propose a framework for anonymous query processing in road networks.  ...  To address this issue, spatial anonymity techniques obfuscate user locations, forwarding to the LBS a sufficiently large region instead.  ...  a given K) NETWORK-BASED ANONYMIZATION In this section, we present the cloaking algorithm of our NAP framework.  ... 
doi:10.1109/tkde.2009.48 fatcat:lbtgoj7zgnbgboig6iu5hmv5r4

PRIVE

Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos
2007 Proceedings of the 16th international conference on World Wide Web - WWW '07  
(ii) We propose Privé, a decentralized architecture for preserving the anonymity of users issuing spatial queries to LBS.  ...  In this paper we address two issues: (i) We show that existing approaches may fail to provide spatial anonymity for some distributions of user locations and describe a novel technique which solves this  ...  spatial K-anonymity if every generated K-ASR satisfies the reciprocity property.  ... 
doi:10.1145/1242572.1242623 dblp:conf/www/GhinitaKS07 fatcat:tnqjcwxu55cfnp3jhjzpq4yqbu

Personal Privacy in Mobile Networks [chapter]

Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
2011 Mobile Technologies for Conflict Management  
This scenario results in a renewed interest in solutions for protecting the privacy of mobile users, especially in those environments where lack of protection may result in persecution, political violence  ...  It finally presents several solutions for the protection of location privacy in different setting and mobile networks.  ...  Zhang and Huang present a framework called HiSC for location and query anonymization (Zhang and Huang 2008) .  ... 
doi:10.1007/978-94-007-1384-0_14 fatcat:d77oitt6xrg3jcqexrcvfesadi

MeshCloak: A Map-Based Approach for Personalized Location Privacy [article]

Hiep H. Nguyen
2017 arXiv   pre-print
In this paper, we present MeshCloak, a novel map-based model for personalized location privacy, which is formulated entirely in map-based setting and resists inference attacks at a minimal performance  ...  A problem in the existing cloaking schemes is that location vulnerabilities may be exposed when an attacker exploits a street map in their attacks.  ...  Reciprocal framework [8] generalized the idea of reciprocity to be adaptable to any existing spatial index on the user locations.  ... 
arXiv:1709.03642v1 fatcat:i56fci5co5d2xpdm7g3g74bqqi

Direct Reciprocity in Spatial Populations Enhances R-Reciprocity As Well As ST-Reciprocity

Kohei Miyaji, Jun Tanimoto, Zhen Wang, Aya Hagishima, Naoki Ikegaya, Matjaz Perc
2013 PLoS ONE  
Thus, our study indicates that direct reciprocity in structured populations can be regarded as a more powerful factor for the sustainability of cooperation.  ...  As is well-known, spatial reciprocity plays an important role in facilitating the emergence of cooperative traits, and the effect of direct reciprocity is also obvious for explaining the cooperation dynamics  ...  Conclusion We have presented a new framework of direct reciprocity on spatial populations in 262 games, where two strategy profile parameters p and q are taken into account.  ... 
doi:10.1371/journal.pone.0071961 pmid:23951272 pmcid:PMC3737211 fatcat:yiazif33mbelhoie7yefp6usbe

Cloud Computing-System Implementation for Business Applications

S. Silas Sargunam
2016 Circuits and Systems  
The challenges and opportunities for efficient parallel data processing in cloud environments have been demonstrated and Nephele, the first data processing framework, has been presented to exploit the  ...  As the traditional database systems cannot handle this task in a cost-efficient manner, companies have built customized data processing frameworks.  ...  NAP relies on a global user ordering and bucketization that satisfies reciprocity and guarantees K-anonymity.  ... 
doi:10.4236/cs.2016.76076 fatcat:m27u2edsizchtc7mfws3ctc7pi

Privacy preservation in the dissemination of location data

Manolis Terrovitis
2011 SIGKDD Explorations  
Research in the data management field has put significant effort on anonymization techniques that obfuscate spatial information in order to hide the identity of the user or her exact location.  ...  Privacy guaranties and anonymization algorithms become increasingly sophisticated offering better and more efficient protection in data publishing and data exchange.  ...  The solution proposed in [30; 38] and extended in [31] is to add the requirement for reciprocity in the creation of a CR for k-anonymity.  ... 
doi:10.1145/2031331.2031334 fatcat:mo3t2n6fijazbgrot22rilduyq

Towards Region Queries with Strong Location Privacy in Mobile Network

Songtao Yang, Qingfeng Jiang, Daniel G. Reina
2021 Mobile Information Systems  
Armed with previous privacy-preserving technologies, for example, OT, in this work, we first develop a novel region queries framework that can provide robust privacy for location-dependent queries.  ...  In short, the common query of the client in our solution can be divided into two parts, the region query R q and the content query C q , to achieve location k -anonymity, location m -diversity, and query  ...  Given an anonymous spatial region, a set of m location points L � l 1 , . . . , l m 􏼈 􏼉.  ... 
doi:10.1155/2021/5972486 fatcat:cwje4wrnkfbapc2wrjlcxwjxsm
« Previous Showing results 1 — 15 out of 10,436 results