Jump to content

Spatial cloaking: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
No edit summary
Line 2: Line 2:


== Background ==
== Background ==
With the emergence and popularity of [[location-based service]]s, people are getting more personalized services, such as getting the names and locations of nearby restaurants and gas stations. Receiving these services requires users to send their positions either directly or indirectly to the service provider. A user's location information could be shared more than 5000 times in two weeks.<ref name=":4">{{Cite journal|last=Liu|first=B.|last2=Zhou|first2=W.|last3=Zhu|first3=T.|last4=Gao|first4=L.|last5=Xiang|first5=Y.|date=2018|title=Location Privacy and Its Applications: A Systematic Study|url=https://ieeexplore.ieee.org/document/8329504|journal=IEEE Access|volume=6|pages=17606–17624|doi=10.1109/ACCESS.2018.2822260|issn=2169-3536}}</ref><ref>{{Cite book |last=Almuhimedi|first=Hazim|last2=Schaub|first2=Florian|last3=Sadeh|first3=Norman|last4=Adjerid|first4=Idris|last5=Acquisti|first5=Alessandro|last6=Gluck|first6=Joshua|last7=Cranor|first7=Lorrie Faith|last8=Agarwal|first8=Yuvraj|date=2015 |chapter=Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging |title=Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems|series=CHI '15|location=New York, NY, USA|publisher=ACM|pages=787–796|doi=10.1145/2702123.2702210|isbn=978-1-4503-3145-6 }}</ref> Therefore, this convenience also exposes users’ privacy to certain risks, since the attackers may illegally identify the users’ locations and even further exploit their personal information.<ref name=":22">{{Cite journal|last=Puttaswamy|first=K. P. N.|last2=Wang|first2=S.|last3=Steinbauer|first3=T.|last4=Agrawal|first4=D.|last5=Abbadi|first5=A. E.|last6=Kruegel|first6=C.|last7=Zhao|first7=B. Y.|date=Jan 2014|title=Preserving Location Privacy in Geosocial Applications |journal=IEEE Transactions on Mobile Computing|volume=13|issue=1|pages=159–173|doi=10.1109/TMC.2012.247 }}</ref><ref name=":82">{{Cite journal|last=Bettini|first=Claudio|last2=Wang|first2=X. Sean|last3=Jajodia|first3=Sushil|date=|title=Protecting Privacy Against Location-based Personal Identification|url=http://www.cs.uvm.edu/~xwang4/publications/bettini_wang_jajodia_sdm05.pdf|journal=The Computer Journal|volume=|pages=|via=}}</ref> Continuously tracking users' location has not only been identified as a technical issue, but also a privacy concern as well.<ref name=":5">{{Cite web|url=https://www.researchgate.net/publication/3436752_Liu_L_Protecting_Location_Privacy_with_Personalized_k-Anonymity_Architecture_and_Algorithms_IEEE_Transactions_on_Mobile_Computing_71_1-18|title=(PDF) Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing 7(1), 1-18|website=ResearchGate|language=en|access-date=2019-04-25}}</ref> It has been realized that [[Quasi-identifier]]s, which refer to a set of information attributes, can be used to re-identify the user when linked with some external information.<ref name=":82" /> For example, the social security number could be used to identify a specific user by adversaries,<ref name=":82" /> and the combined disclosure of birth date, zip code, and gender can uniquely identify a user.<ref name=":5" /> Thus, multiple solutions have been proposed to preserve and enhance users’ privacy when using location-based services. Among all the proposed mechanisms, spatial cloaking is one of those which has been widely accepted and revised, thus having been integrated into many practical applications.
With the emergence and popularity of [[location-based service]]s, people are getting more personalized services, such as getting the names and locations of nearby restaurants and gas stations. Receiving these services requires users to send their positions either directly or indirectly to the service provider. A user's location information could be shared more than 5000 times in two weeks.<ref name=":4">{{cite journal |last1=Liu |first1=Bo |last2=Zhou |first2=Wanlei |last3=Zhu |first3=Tianqing |last4=Gao |first4=Longxiang |last5=Xiang |first5=Yong |title=Location Privacy and Its Applications: A Systematic Study |journal=IEEE Access |date=2018 |volume=6 |pages=17606–24 |doi=10.1109/ACCESS.2018.2822260 }}</ref><ref>{{Cite book |last=Almuhimedi|first=Hazim|last2=Schaub|first2=Florian|last3=Sadeh|first3=Norman|last4=Adjerid|first4=Idris|last5=Acquisti|first5=Alessandro|last6=Gluck|first6=Joshua|last7=Cranor|first7=Lorrie Faith|last8=Agarwal|first8=Yuvraj|date=2015 |chapter=Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging |title=Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems|series=CHI '15|location=New York, NY, USA|publisher=ACM|pages=787–796|doi=10.1145/2702123.2702210|isbn=978-1-4503-3145-6 }}</ref> Therefore, this convenience also exposes users’ privacy to certain risks, since the attackers may illegally identify the users’ locations and even further exploit their personal information.<ref name=":22">{{Cite journal|last=Puttaswamy|first=K. P. N.|last2=Wang|first2=S.|last3=Steinbauer|first3=T.|last4=Agrawal|first4=D.|last5=Abbadi|first5=A. E.|last6=Kruegel|first6=C.|last7=Zhao|first7=B. Y.|date=Jan 2014|title=Preserving Location Privacy in Geosocial Applications |journal=IEEE Transactions on Mobile Computing|volume=13|issue=1|pages=159–173|doi=10.1109/TMC.2012.247 }}</ref><ref name=":82">{{cite book |doi=10.1007/11552338_13 |chapter=Protecting Privacy Against Location-Based Personal Identification |title=Secure Data Management |volume=3674 |pages=185–199 |series=Lecture Notes in Computer Science |year=2005 |last1=Bettini |first1=Claudio |last2=Wang |first2=X. Sean |last3=Jajodia |first3=Sushil |isbn=978-3-540-28798-8 }}</ref> Continuously tracking users' location has not only been identified as a technical issue, but also a privacy concern as well.<ref name=":5">{{cite journal |last1=Gedik |first1=Bugra |last2=Liu |first2=Ling |title=Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms |journal=IEEE Transactions on Mobile Computing |date=January 2008 |volume=7 |issue=1 |pages=1–18 |doi=10.1109/TMC.2007.1062 }}</ref> It has been realized that [[Quasi-identifier]]s, which refer to a set of information attributes, can be used to re-identify the user when linked with some external information.<ref name=":82" /> For example, the social security number could be used to identify a specific user by adversaries,<ref name=":82" /> and the combined disclosure of birth date, zip code, and gender can uniquely identify a user.<ref name=":5" /> Thus, multiple solutions have been proposed to preserve and enhance users’ privacy when using location-based services. Among all the proposed mechanisms, spatial cloaking is one of those which has been widely accepted and revised, thus having been integrated into many practical applications.


== Location privacy ==
== Location privacy ==
Location privacy is usually considered falling into the category of [[information privacy]], though there is little consensus on the definition of location privacy.<ref name=":4" /> There are often three aspects of location information: identity, location(spatial information), and time(temporal information).<ref name=":10" /><ref name=":4" /> Identity usually refers to a user's name, email address, or any characteristic which makes a user distinguishable. For example, [[Pokémon Go]] requires a consistent user identity, since users are required to log in.<ref name=":4" /> Spatial information is considered as the main approach to determine a location.<ref name=":4" /> Temporal information can be separated into real-time and non-real time and is usually described as a time stamp with a place.<ref name=":4" /> If a link is established between them, then the location privacy is considered violated.<ref name=":10" /> Accessing personal location data has been raised as a severe privacy concern, even with personal permission.<ref name=":4" /> Therefore, privacy-aware management of location information has been identified as an essential challenge, which is designed to provide privacy protection against abuse of location information.<ref name=":5" /> The overall idea of preserving location privacy is to introduce enough noise and quantization to reduce the chances of successful attacks.<ref name=":9">{{Cite journal|last=Krumm|first=John|date=Aug 2009|title=A Survey of Computational Location Privacy |journal=Personal Ubiquitous Comput.|volume=13|issue=6|pages=391–399|doi=10.1007/s00779-008-0212-5 }}</ref>
Location privacy is usually considered falling into the category of [[information privacy]], though there is little consensus on the definition of location privacy.<ref name=":4" /> There are often three aspects of location information: identity, location(spatial information), and time(temporal information).<ref name=":10" /><ref name=":4" /> Identity usually refers to a user's name, email address, or any characteristic which makes a user distinguishable. For example, [[Pokémon Go]] requires a consistent user identity, since users are required to log in.<ref name=":4" /> Spatial information is considered as the main approach to determine a location.<ref name=":4" /> Temporal information can be separated into real-time and non-real time and is usually described as a time stamp with a place.<ref name=":4" /> If a link is established between them, then the location privacy is considered violated.<ref name=":10" /> Accessing personal location data has been raised as a severe privacy concern, even with personal permission.<ref name=":4" /> Therefore, privacy-aware management of location information has been identified as an essential challenge, which is designed to provide privacy protection against abuse of location information.<ref name=":5" /> The overall idea of preserving location privacy is to introduce enough noise and quantization to reduce the chances of successful attacks.<ref name=":9">{{Cite journal|last=Krumm|first=John|date=Aug 2009|title=A Survey of Computational Location Privacy |journal=Personal Ubiquitous Comput.|volume=13|issue=6|pages=391–399|doi=10.1007/s00779-008-0212-5 }}</ref>


In recent years, researchers have been making a connection between social aspects and technological aspects regarding location information. For example, if co-location information is considered as the data which potential attackers would get and take into consideration, the location privacy is decreased by more than 60%.<ref>{{Cite journal|last=Olteanu|first=A.|last2=Huguenin|first2=K.|last3=Shokri|first3=R.|last4=Humbert|first4=M.|last5=Hubaux|first5=J.|date=March 2017|title=Quantifying Interdependent Privacy Risks with Location Data|url=https://ieeexplore.ieee.org/document/7464358|journal=IEEE Transactions on Mobile Computing|volume=16|issue=3|pages=829–842|doi=10.1109/TMC.2016.2561281|issn=1536-1233|via=}}</ref> Also, by a constant report of a user's location information, a movement profile could be constructed for this specific user based on statistical analysis, and a large amount of information could be exploited and generated from this profile such as user's office location, medical records, financial status, and political views.<ref name=":42">{{Cite journal|last=Schlegel|first=R.|last2=Chow|first2=C.|last3=Huang|first3=Q.|last4=Wong|first4=D. S.|date=Oct 2015|title=User-Defined Privacy Grid System for Continuous Location-Based Services|url=https://ieeexplore.ieee.org/document/7004070|journal=IEEE Transactions on Mobile Computing|volume=14|issue=10|pages=2158–2172|doi=10.1109/TMC.2015.2388488|issn=1536-1233|via=}}</ref><ref name=":82" /><ref name=":42"/> Therefore, more and more researchers have taken account of the social influence in their algorithms, since this socially networked information is accessible to the public and might be used by potential attackers.
In recent years, researchers have been making a connection between social aspects and technological aspects regarding location information. For example, if co-location information is considered as the data which potential attackers would get and take into consideration, the location privacy is decreased by more than 60%.<ref>{{cite journal |last1=Olteanu |first1=Alexandra-Mihaela |last2=Huguenin |first2=Kevin |last3=Shokri |first3=Reza |last4=Humbert |first4=Mathias |last5=Hubaux |first5=Jean-Pierre |title=Quantifying Interdependent Privacy Risks with Location Data |journal=IEEE Transactions on Mobile Computing |date=1 March 2017 |volume=16 |issue=3 |pages=829–842 |doi=10.1109/TMC.2016.2561281 }}</ref> Also, by a constant report of a user's location information, a movement profile could be constructed for this specific user based on statistical analysis, and a large amount of information could be exploited and generated from this profile such as user's office location, medical records, financial status, and political views.<ref name=":42">{{cite journal |last1=Schlegel |first1=Roman |last2=Chow |first2=Chi-Yin |last3=Huang |first3=Qiong |last4=Wong |first4=Duncan S. |title=User-Defined Privacy Grid System for Continuous Location-Based Services |journal=IEEE Transactions on Mobile Computing |date=1 October 2015 |volume=14 |issue=10 |pages=2158–2172 |doi=10.1109/TMC.2015.2388488 }}</ref><ref name=":82" /><ref name=":42"/> Therefore, more and more researchers have taken account of the social influence in their algorithms, since this socially networked information is accessible to the public and might be used by potential attackers.


== History ==
== History ==
In order to meet user's requirements for location privacy in the process of data transportation, researchers have been exploring and investigating models to address the disclosure of private information.<ref name=":12" />
In order to meet user's requirements for location privacy in the process of data transportation, researchers have been exploring and investigating models to address the disclosure of private information.<ref name=":12" />


The secure-multi-party model is constructed based on the idea of sharing accurate information among n parties. Each party has access to a particular segment of the precise information and at the same time being prevented from acquiring the other shares of the data.<ref>{{Cite journal|last=Du|first=Wenliang|last2=Atallah|first2=Mikhail J.|date=2001|title=Secure multi-party computation problems and their applications|url=https://dl.acm.org/citation.cfm?id=508174|journal=Proceedings of the 2001 workshop on New security paradigms - NSPW '01|location=New York, New York, USA|publisher=ACM Press|pages=13–22|doi=10.1145/508171.508174|isbn=1581134576}}</ref><ref name=":12" /> However, the computation problem is introduced in the process, since a large amount of data processing is required to satisfy the requirement.<ref name=":12" />
The secure-multi-party model is constructed based on the idea of sharing accurate information among n parties. Each party has access to a particular segment of the precise information and at the same time being prevented from acquiring the other shares of the data.<ref>{{cite book |doi=10.1145/508171.508174 |chapter=Secure multi-party computation problems and their applications |title=Proceedings of the 2001 workshop on New security paradigms - NSPW '01 |pages=13 |year=2001 |last1=Du |first1=Wenliang |last2=Atallah |first2=Mikhail J. |isbn=978-1-58113-457-5 }}</ref><ref name=":12" /> However, the computation problem is introduced in the process, since a large amount of data processing is required to satisfy the requirement.<ref name=":12" />


The minimal information sharing model is introduced to use cryptographic techniques to perform join and intersection operations. However, the inflexibility of this model to fit into other queries makes it hard to be satisfying to most practical applications.<ref name=":12" />
The minimal information sharing model is introduced to use cryptographic techniques to perform join and intersection operations. However, the inflexibility of this model to fit into other queries makes it hard to be satisfying to most practical applications.<ref name=":12" />
Line 24: Line 24:


=== Location perturbation ===
=== Location perturbation ===
The idea of location perturbation is to replace the exact location information with a coarser grained spatial range, and thus uncertainty would be introduced when the adversaries try to match the user to either a known location identity or external observation of location identity.<ref name=":5" /> Location perturbation is usually satisfied by using spatial cloaking, temporal cloaking, or location [[obfuscation]].<ref name=":12" /> Spatial and temporal cloaking refers to the wrong or imprecise location and time reported to the service providers, instead of the exact information.<ref name=":22" /><ref name=":9" /> For example, location privacy could be enhanced by increasing the time between location reports, since higher report frequencies makes reidentification more possible to happen through data mining.<ref name=":9" /><ref name=":3">{{Cite journal|last=Gruteser|first=and M.|last2=Alrabady|first2=and A.|date=Oct 2006|title=Enhancing Security and Privacy in Traffic-Monitoring Systems|url=https://ieeexplore.ieee.org/abstract/document/1717364|journal=IEEE Pervasive Computing|volume=5|issue=4|pages=38–46|doi=10.1109/MPRV.2006.69|issn=1536-1268|via=}}</ref> There are other cases when the report of location information is delayed until the visit of K users is identified in that region.<ref name=":10" />
The idea of location perturbation is to replace the exact location information with a coarser grained spatial range, and thus uncertainty would be introduced when the adversaries try to match the user to either a known location identity or external observation of location identity.<ref name=":5" /> Location perturbation is usually satisfied by using spatial cloaking, temporal cloaking, or location [[obfuscation]].<ref name=":12" /> Spatial and temporal cloaking refers to the wrong or imprecise location and time reported to the service providers, instead of the exact information.<ref name=":22" /><ref name=":9" /> For example, location privacy could be enhanced by increasing the time between location reports, since higher report frequencies makes reidentification more possible to happen through data mining.<ref name=":9" /><ref name=":3">{{cite journal |last1=Hoh |first1=Baik |last2=Gruteser |first2=M. |last3=Xiong |first3=Hui |last4=Alrabady |first4=A. |title=Enhancing Security and Privacy in Traffic-Monitoring Systems |journal=IEEE Pervasive Computing |date=October 2006 |volume=5 |issue=4 |pages=38–46 |doi=10.1109/MPRV.2006.69 }}</ref> There are other cases when the report of location information is delayed until the visit of K users is identified in that region.<ref name=":10" />


However, this approach could affect the service reported by the service providers since the data they received are not accurate. The accuracy and timelessness issues are usually discussed in this approach. Also, some attacks have been recognized based on the idea of cloaking and break user privacy.<ref name=":22" />
However, this approach could affect the service reported by the service providers since the data they received are not accurate. The accuracy and timelessness issues are usually discussed in this approach. Also, some attacks have been recognized based on the idea of cloaking and break user privacy.<ref name=":22" />
Line 55: Line 55:


=== Peer-to-peer environment ===
=== Peer-to-peer environment ===
A [[peer-to-peer]] (P2P) environment relies on the direct communication and information exchange between devices in a community where users could only communicate through P2P [[Multi-hop routing|multi-hop]] [[routing]] without fixed communication infrastructures.<ref name=":1" /> The P2P environment aims to extend the scope of cellular coverage in a sparse environment.<ref name=":52">{{Cite journal|last=Haus|first=M.|last2=Waqas|first2=M.|last3=Ding|first3=A. Y.|last4=Li|first4=Y.|last5=Tarkoma|first5=S.|last6=Ott|first6=J.|date=Jan 2017|title=Security and Privacy in Device-to-Device (D2D) Communication: A Review|url=https://ieeexplore.ieee.org/document/7809147|journal=IEEE Communications Surveys Tutorials|volume=19|issue=2|pages=1054–1079|doi=10.1109/COMST.2017.2649687|issn=1553-877X|via=}}</ref> In this environment, peers have to trust each other and work together, since their location information would be reported to each other when a cloaked area is constructed to achieve the desired K-anonymity during the requesting for location-based services.<ref name=":42"/><ref name=":1" />
A [[peer-to-peer]] (P2P) environment relies on the direct communication and information exchange between devices in a community where users could only communicate through P2P [[Multi-hop routing|multi-hop]] [[routing]] without fixed communication infrastructures.<ref name=":1" /> The P2P environment aims to extend the scope of cellular coverage in a sparse environment.<ref name=":52">{{cite journal |last1=Haus |first1=Michael |last2=Waqas |first2=Muhammad |last3=Ding |first3=Aaron Yi |last4=Li |first4=Yong |last5=Tarkoma |first5=Sasu |last6=Ott |first6=Jorg |title=Security and Privacy in Device-to-Device (D2D) Communication: A Review |journal=IEEE Communications Surveys & Tutorials |date=undefined NaN |volume=19 |issue=2 |pages=1054–1079 |doi=10.1109/COMST.2017.2649687 }}</ref> In this environment, peers have to trust each other and work together, since their location information would be reported to each other when a cloaked area is constructed to achieve the desired K-anonymity during the requesting for location-based services.<ref name=":42"/><ref name=":1" />


Researchers have been discussing some privacy requirements and security requirements which would make the privacy-preserving techniques appropriate for the peer-to-peer environment. For example, [[authentication]] and [[authorization]] are required to secure and identify the user and thus making authorized users distinguishable from unauthorized users. [[Confidentiality]] and integrity make sure that only those who are authorized have access to the data transmitted between peers, and the transmitted information cannot be modified.<ref name=":52" />
Researchers have been discussing some privacy requirements and security requirements which would make the privacy-preserving techniques appropriate for the peer-to-peer environment. For example, [[authentication]] and [[authorization]] are required to secure and identify the user and thus making authorized users distinguishable from unauthorized users. [[Confidentiality]] and integrity make sure that only those who are authorized have access to the data transmitted between peers, and the transmitted information cannot be modified.<ref name=":52" />
Line 68: Line 68:


=== K-anonymity ===
=== K-anonymity ===
The concept of [[K-anonymity]] was first introduced in relational [[data privacy]] to guarantee the usefulness of the data and the privacy of users, when data holders want to release their data.<ref name=":5" /><ref>{{Cite web|url=https://www.researchgate.net/publication/284332229_k-Anonymity_A_Model_for_Protecting_Privacy|title=k-Anonymity: A Model for Protecting Privacy|website=ResearchGate|language=en|access-date=2019-04-25}}</ref><ref>{{Cite web|url=https://www.semanticscholar.org/paper/Protecting-Privacy-when-Disclosing-Information:-and-Samaratiy/7df12c498fecedac4ab6034d3a8032a6d1366ca6|title=Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression|last=Samaratiy|first=Pierangela|date=1998|website=www.semanticscholar.org|language=en|access-date=2019-04-25}}</ref><ref>{{Cite journal|last=Samarati|first=P.|date=Nov 2001|title=Protecting respondents identities in microdata release|url=https://ieeexplore.ieee.org/document/971193|journal=IEEE Transactions on Knowledge and Data Engineering|volume=13|issue=6|pages=1010–1027|doi=10.1109/69.971193|issn=1041-4347|via=}}</ref> K-anonymity usually refers to the requirement that the information of the user should be indistinguishable from a minimum of <math>k-1
The concept of [[K-anonymity]] was first introduced in relational [[data privacy]] to guarantee the usefulness of the data and the privacy of users, when data holders want to release their data.<ref name=":5" /><ref>{{cite journal |last1=Sweeney |first1=Latanya |title=k-anonymity: A model for protecting privacy |journal=International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems |date=October 2002 |volume=10 |issue=05 |pages=557–570 |doi=10.1142/S0218488502001648 }}</ref><ref>{{cite web |last1=Samarati |first1=Pierangela |last2=Sweeney |first2=Latanya |year=1998 |title=Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression |url=http://www.csl.sri.com/papers/sritr-98-04/ |citeseerx=10.1.1.37.5829 }}</ref><ref>{{cite journal |last1=Samarati |first1=P. |title=Protecting respondents identities in microdata release |journal=IEEE Transactions on Knowledge and Data Engineering |volume=13 |issue=6 |pages=1010–1027 |doi=10.1109/69.971193 }}</ref> K-anonymity usually refers to the requirement that the information of the user should be indistinguishable from a minimum of <math>k-1
</math>people in the same region, with k being any real number.<ref name=":12" /><ref name=":42"/><ref name=":9" /><ref name=":4" /><ref name=":6" /> Thus, the disclosed location scope would be expected to keep expanding until <math>k</math>users could be identified in the region and these <math>k</math>people form an anonymity set.<ref name=":9" /><ref name=":6" /> Usually, the higher the K-anonymity, the stricter the requirements, the higher the level of anonymity.<ref name=":82" /> If K-anonymity is satisfied, then the possibility of identifying the exact user would be around <math>1/k</math> which subjects to different algorithms, and therefore the location privacy would be effectively preserved. Usually, if the cloaking region is designed to be more significant when the algorithm is constructed, the chances of identifying the exact service requester would be much lower even thought the precise location of the user is exposed to the service providers,<ref name=":82" /> let alone the attackers' abilities to run complex [[machine learning]] or advanced analysis techniques.
</math>people in the same region, with k being any real number.<ref name=":12" /><ref name=":42"/><ref name=":9" /><ref name=":4" /><ref name=":6" /> Thus, the disclosed location scope would be expected to keep expanding until <math>k</math>users could be identified in the region and these <math>k</math>people form an anonymity set.<ref name=":9" /><ref name=":6" /> Usually, the higher the K-anonymity, the stricter the requirements, the higher the level of anonymity.<ref name=":82" /> If K-anonymity is satisfied, then the possibility of identifying the exact user would be around <math>1/k</math> which subjects to different algorithms, and therefore the location privacy would be effectively preserved. Usually, if the cloaking region is designed to be more significant when the algorithm is constructed, the chances of identifying the exact service requester would be much lower even thought the precise location of the user is exposed to the service providers,<ref name=":82" /> let alone the attackers' abilities to run complex [[machine learning]] or advanced analysis techniques.



Revision as of 19:49, 28 April 2019

Spatial cloaking is a privacy mechanism that is used to satisfy specific privacy requirements by blurring users’ exact locations into cloaked regions.[1][2] This technique is usually integrated into applications in various environments to minimize the disclosure of private information when users request location-based service. Since the database server does not receive the accurate location information, a set including the satisfying solution would be sent back to the user.[1] General privacy requirements include K-anonymity, maximum area, and minimum area.[3]

Background

With the emergence and popularity of location-based services, people are getting more personalized services, such as getting the names and locations of nearby restaurants and gas stations. Receiving these services requires users to send their positions either directly or indirectly to the service provider. A user's location information could be shared more than 5000 times in two weeks.[4][5] Therefore, this convenience also exposes users’ privacy to certain risks, since the attackers may illegally identify the users’ locations and even further exploit their personal information.[6][7] Continuously tracking users' location has not only been identified as a technical issue, but also a privacy concern as well.[8] It has been realized that Quasi-identifiers, which refer to a set of information attributes, can be used to re-identify the user when linked with some external information.[7] For example, the social security number could be used to identify a specific user by adversaries,[7] and the combined disclosure of birth date, zip code, and gender can uniquely identify a user.[8] Thus, multiple solutions have been proposed to preserve and enhance users’ privacy when using location-based services. Among all the proposed mechanisms, spatial cloaking is one of those which has been widely accepted and revised, thus having been integrated into many practical applications.

Location privacy

Location privacy is usually considered falling into the category of information privacy, though there is little consensus on the definition of location privacy.[4] There are often three aspects of location information: identity, location(spatial information), and time(temporal information).[2][4] Identity usually refers to a user's name, email address, or any characteristic which makes a user distinguishable. For example, Pokémon Go requires a consistent user identity, since users are required to log in.[4] Spatial information is considered as the main approach to determine a location.[4] Temporal information can be separated into real-time and non-real time and is usually described as a time stamp with a place.[4] If a link is established between them, then the location privacy is considered violated.[2] Accessing personal location data has been raised as a severe privacy concern, even with personal permission.[4] Therefore, privacy-aware management of location information has been identified as an essential challenge, which is designed to provide privacy protection against abuse of location information.[8] The overall idea of preserving location privacy is to introduce enough noise and quantization to reduce the chances of successful attacks.[9]

In recent years, researchers have been making a connection between social aspects and technological aspects regarding location information. For example, if co-location information is considered as the data which potential attackers would get and take into consideration, the location privacy is decreased by more than 60%.[10] Also, by a constant report of a user's location information, a movement profile could be constructed for this specific user based on statistical analysis, and a large amount of information could be exploited and generated from this profile such as user's office location, medical records, financial status, and political views.[11][7][11] Therefore, more and more researchers have taken account of the social influence in their algorithms, since this socially networked information is accessible to the public and might be used by potential attackers.

History

In order to meet user's requirements for location privacy in the process of data transportation, researchers have been exploring and investigating models to address the disclosure of private information.[3]

The secure-multi-party model is constructed based on the idea of sharing accurate information among n parties. Each party has access to a particular segment of the precise information and at the same time being prevented from acquiring the other shares of the data.[12][3] However, the computation problem is introduced in the process, since a large amount of data processing is required to satisfy the requirement.[3]

The minimal information sharing model is introduced to use cryptographic techniques to perform join and intersection operations. However, the inflexibility of this model to fit into other queries makes it hard to be satisfying to most practical applications.[3]

The untrusted third-party model is adopted in peer-to-peer environments.[3]

The most popular model right now is the trusted third-party model. Some of the practical applications have already adopted the idea of a trusted third party into their services to preserve privacy. For example, Anonymizer is integrated into various websites, which could give anonymous surfing service to its users.[3] Also, when purchasing through PayPal, users are not required to provide their credit card information.[3] Therefore, by introducing a trusted-third-party, users’ private information is not directly exposed to the service providers.[3]

Approaches for preserving location information

The promising approach of preserving location privacy is to report data on users' behavior and at the same time protect identity and location privacy.[2] Several methods have been investigated to enhance the performances of location-preserving techniques, such as location perturbation and the report of landmark objects.[3]

Location perturbation

The idea of location perturbation is to replace the exact location information with a coarser grained spatial range, and thus uncertainty would be introduced when the adversaries try to match the user to either a known location identity or external observation of location identity.[8] Location perturbation is usually satisfied by using spatial cloaking, temporal cloaking, or location obfuscation.[3] Spatial and temporal cloaking refers to the wrong or imprecise location and time reported to the service providers, instead of the exact information.[6][9] For example, location privacy could be enhanced by increasing the time between location reports, since higher report frequencies makes reidentification more possible to happen through data mining.[9][13] There are other cases when the report of location information is delayed until the visit of K users is identified in that region.[2]

However, this approach could affect the service reported by the service providers since the data they received are not accurate. The accuracy and timelessness issues are usually discussed in this approach. Also, some attacks have been recognized based on the idea of cloaking and break user privacy.[6]

Landmark objects

Based on the idea of landmark objects, a particular landmark or a significant object is reported to the service provider, instead of a region.[3]

Avoid location tracking

In order to avoid location tracking, usually less or no location information would be reported to the service provider.[3] For example, when requesting weather, a zip code instead of a tracked location would be accurate enough for the quality of the service received.[9]

Environment

Centralized scheme

A centralized scheme is constructed based on a central location anonymizer (anonymizing server) and is considered as an intermediate between the user and the service provider.[14] Generally, the responsibilities of a location anonymizer include tracking users' exact location,[14] blurring user specific location information into cloaked areas and communicate with the service provider.[1][11] For example, one of the methods to achieve this is by replacing the correct network addresses with fake-IDs before the information are forward to the service provider.[7] Sometimes user identity is hidden, while still allowing the service provider to authenticate the user and possibly charge the user for the service.[7] These steps are usually achieved through spatial cloaking or path confusion. Except in some cases where the correct location information are sent for high service quality, the exact location information or temporal information are usually modified to preserve user privacy.[15]

Serving as an intermediate between the user and location-based server, location anonymizer generally conducts the following activities:[3][7]

  • Receiving users’ exact location information and private profile
  • Blurring the location into cloaked areas based on the specific privacy requirements
  • In most of the times, removing user identities from the location information
  • Reporting the cloaked area to the service provider and receiving a list of solutions, which is referred to as a candidate list, from the service provider which satisfies user's requests
  • Deciding the most appropriate solution based on the user's exact location and returning the accurate solution information back to the user ( Some location anonymizer may not adopt this step)

The location anonymizer could also be considered as a trusted-third party[11] since it is trusted by the user with the accurate location information and private profile stored in the location anonymizer.[14] However, this could also expose users’ privacy into great risks at the same time. First, since the anonymizer keeps tracking users' information and has access to the users’ exact location and profile information, it is usually the target of most attackers and thus under higher risks[11][14] Second, the extent to which users trust the location anonymizers could be essential. If a fully trusted third party is integrated into the algorithm, user location information would be reported continuously to the location anonymizer,[11] which may cause privacy issues if the anonymizer is compromised. Third, the location anonymizer may lead to a performance bottleneck when a large amount of requests are presented and required to be cloaked.[14] This is because the location anoymizer is responsible for maintaining the number of users in a region in order to provide an acceptable level of service quality.[14]

Distributed scheme (decentralized scheme)

In a distributed environment, users anonymize their location information through fixed communication infrastructures, such as base stations. Usually, a certification server is introduced in a distributed scheme where users are registered. Before participating in this system, users are required to obtain a certificate which means that they are trusted. Therefore, every time after user request a location-based service and before the exact location information is forward to the server, the auxiliary users registered in this system collaborate to hide the precise location of the user. The number of assistant users involved in cloaking this region is based on K-anonymity, which is usually set be the specific user.[16] In the cases where there are not enough users nearby, S-proximity is generally adopted to generate a high number of paired user identities and location information for the actual user to be indistinguishable in the specific area.[15] The other profiles and location information sent to the service provider are sometimes also referred to as dummies.[3]

However, the complexity of the data structure which is used to anonymize the location could result in difficulties when applying this mechanism to highly dynamic location-based mobile applications.[16] Also, the issue of large computation and communication is posed to the environment.[14]

Peer-to-peer environment

A peer-to-peer (P2P) environment relies on the direct communication and information exchange between devices in a community where users could only communicate through P2P multi-hop routing without fixed communication infrastructures.[1] The P2P environment aims to extend the scope of cellular coverage in a sparse environment.[17] In this environment, peers have to trust each other and work together, since their location information would be reported to each other when a cloaked area is constructed to achieve the desired K-anonymity during the requesting for location-based services.[11][1]

Researchers have been discussing some privacy requirements and security requirements which would make the privacy-preserving techniques appropriate for the peer-to-peer environment. For example, authentication and authorization are required to secure and identify the user and thus making authorized users distinguishable from unauthorized users. Confidentiality and integrity make sure that only those who are authorized have access to the data transmitted between peers, and the transmitted information cannot be modified.[17]

Some of the drawbacks identified in a peer-to-peer environment are the communication costs, not enough users and threats of potential malicious users hiding in the community.[2]

Mobile environments

Mobile devices have been considered as an essential tool for communication, and mobile computing has thus become a research interest in recent years.[15] From online purchase to online banking, mobile devices have frequently been connected to service providers for online activities, and at the same time sending and receiving information.[15] In mobile devices, Global Positioning System(GPS) is the most commonly used component to provide location information.[2] Besides that, Global System for Mobile Communications(GSM) and WiFi signals could also help with estimating locations.[2] There are generally two types of privacy concerns in mobile environments, data privacy and contextual privacy. Usually, location privacy and identity privacy are included in the discussion of contextual privacy in a mobile environment,[15] while the data transferred between various mobile devices is discussed under data privacy.[15] In the process of requesting location-based services and exchanging location data, both the quality of data transferred and the safety of information exchanged could be potentially exposed to malicious people.

Privacy requirements

No matter what the specific privacy-preserving solution is integrated to cloak a particular region in which the service requester stays. It is usually constructed from several angles to satisfy different privacy requirements better. These standards are either adjusted by the users or are decided by the application designers.[3] Some of the privacy parameters include K-anonymity, entropy, minimum area, and maximum area.[3]

K-anonymity

The concept of K-anonymity was first introduced in relational data privacy to guarantee the usefulness of the data and the privacy of users, when data holders want to release their data.[8][18][19][20] K-anonymity usually refers to the requirement that the information of the user should be indistinguishable from a minimum of people in the same region, with k being any real number.[3][11][9][4][14] Thus, the disclosed location scope would be expected to keep expanding until users could be identified in the region and these people form an anonymity set.[9][14] Usually, the higher the K-anonymity, the stricter the requirements, the higher the level of anonymity.[7] If K-anonymity is satisfied, then the possibility of identifying the exact user would be around which subjects to different algorithms, and therefore the location privacy would be effectively preserved. Usually, if the cloaking region is designed to be more significant when the algorithm is constructed, the chances of identifying the exact service requester would be much lower even thought the precise location of the user is exposed to the service providers,[7] let alone the attackers' abilities to run complex machine learning or advanced analysis techniques.

Some approaches have also been discussed to introduce more ambiguity to the system, such as historical K-anonymity, p-sensitivity, and l-diversity.[4] The idea of historical K-anonymity is proposed to guarantee the moving objects by making sure that there are at least users who share the same historical requests, which requires the anonymizer to track not only the current movement of the user but also the sequence location of the user.[7][3][4][14] Therefore, even user's historical location points are disclosed, the adversaries could not distinguish the specific user from a group of potential users.[7] P-sensitivity is used to ensure that the critical attributes such as the identity information have at least different values within users.[21][4] Moreover, l-diversity aims to guarantee the user is unidentifiable from l different physical locations.[22][4]

However, setting a large K value would also requires additional spatial and temporal cloaking which leads to a low resolution of information, which in turn could lead to degraded quality of service.[8]

Minimum area size

Minimum area size refers to the smallest region expanded from the exact location point which satisfies the specific privacy requirements.[3] Usually, the higher the privacy requirements, the bigger the area is required to increase the complicity of distinguishing the exact location of users. Also, the idea of minimum area is particularly important in dense areas when K-anonymity might not be efficient to provide the guaranteed privacy-preserving performance. For example, if the requestor is in a shopping mall which has a promising discount, there might be a lot of people around him or her, and thus this could be considered a very dense environment. Under such a situation, a large K-anonymity such as L=100 would only correspond to a small region, since it does not require a large area to include 100 people near the user. This might result in an inefficient cloaked area since the space where the user could potentially reside is smaller compared with the situation of the same level of K-anonymity, yet people are more scattered from each other.[3]

Maximum area size

Since there is a tradeoff relationship between quality of service and privacy requirements in most location-based services,[3][4][8] sometimes a maximum area size is also required. This is because a sizable cloaked area might introduce too much inaccuracy to the service received by the user, since increasing the reported cloaked area also increases the possible satisfying results to the user's request.[3] These solutions would match the specific requirements of the user, yet are not necessarily applicable to the users’ exact location.

Applications

The cloaked region generated by the method of spatial cloaking could fit into multiple environments, such as snapshot location, continuous location, spatial networks, and wireless sensor networks.[3] Sometimes, the algorithms which generate a cloaked area are designed to fit into various frameworks without changing the original coordinate. In fact, with the specification of the algorithms and well-establishment of most generally adopted mechanisms, more privacy-preserving techniques are designed specifically for the desired environment to fit into different privacy requirements better.

Geosocial applications

Geosocial applications are generally designed to provide a social interaction based on location information. Some of the services include collaborative network services and games, discount coupons, local friend recommendation for dining and shopping, and social rendezvous.[9] For example, Motion Based allows users to share exercise path with others.[9] Foursquare was one of the earliest location-based applications to enable location sharing among friends.[4] Moreover, SCVNGR was a location-based platform where users could earn points by going to places.[6]

Despite the privacy requirements such as K-anonymity, maximum area size, and minimum area size, there are other requirements regarding the privacy preserved in geosocial applications. For example, location and user unlinkability require that the service provider should not be able to identify the user who conducts the same request twice or the correspondence between a given cloaked area and its real-time location. Also, the location data privacy requires that the service provider should not have access to the content of data in a specific location. For example, LoX is mainly designed to satisfy these privacy requirements of geosocial applications.

Location-based services

With the popularity and development of global positioning system (GPS), location-based information services have been in high growth in recent years.[4] It has already been developed and deployed in both the academia and the practical sphere.[8] Many practical applications have integrated the idea and techniques of location-based services,[23] such as mobile social networks, finding places of interest(POI), augmented reality(AR) games,[4] awareness of location-based advertising, transportation service,[11][1] location tracking, and location-aware services.[15] These services usually require the service providers to analyze the received location information based on their algorithms and a database to come up with an optimum solution, and then report it back to the requesting user. Usually, the location-based services are requested either through snapshot queries or continuous queries.[3] Snapshot queries generally require the report of an exact location at a specific time, such as “where is the nearest gas station?” while continuous queries need the tracking of location during a period of time, such as “constantly reporting the nearby gas stations.”[3]

With the advancement of global positioning systems and the development of wireless communication which are introduced in the extensive use of location-based applications, high risks have been placed on user privacy.[8] Both the service providers and users are under the dangers of being attacked and information being abused.[8][24] It has been reported that some GPS devices have been used to exploit personal information and stalk personal locations.[3] Sometimes, only reporting location information would already indicate much private information.[3][7] One of the attacks specific to location-based services is the space or time correlated inference attacks, in which the visited location is correlated with the particular time, and this could lead to the disclosure of private life and private business.[8][25]

Some of the popular location-based services include:[7][2][15]

  • Location-aware emergency service
  • Location-based advertisement
  • Live traffic report
  • Location-based store finders
  • Map and navigation system

Continuous location-based service

Continuous location-based services require a constant report of location information to the service providers.[11] During the process of requesting a continuous location-based service, pressure has been recognized on privacy leakage issues. Since the a series of cloaked areas are reported, with the advancing technological performances, a correlation could be generated between the blurred regions.[11] Therefore, many types of research have been conducted addressing the location privacy issues in continuous location-based services.[11]

Snapshot location-based services

While snapshot location generally refers to the linear relation between the specific location point and a point in the temporal coordinate.  

Some mechanisms have been proposed to either address the privacy-preserving issues in both of the two environments simultaneously or concentrate on fulfilling each privacy requirement respectively. For example, a privacy grid called a dynamic grid system is proposed to fit into both snapshot and continuous location-based service environments.

Other privacy mechanisms

The existing privacy solutions generally fall into two categories: data privacy and context privacy.[15] Besides addressing the issues in location privacy, these mechanisms might be applied to other scenarios. For example, tools such as cryptography, anonymity, obfuscation and caching have been proposed, discussed, and tested to better preserve user privacy. These mechanisms usually try to solve location privacy issues from different angles and thus fit into different situations.

Concerns

Even though the effectiveness of spatial cloaking has been widely accepted and the idea of spatial cloaking has been integrated into multiple designs, there are still some concerns towards it. First, the two schemes of spatial cloaking both have their limitations. For example, in the centralized scheme, although users' other private information including identity has been cloaked, the location itself would be able to release sensitive information,[14] especially when a specific user requests service for multiple times with the same pseudonym.[7] In a decentralized scheme, there are issues with large computation and not enough peers in a region.

Second, the ability of attackers requires a more in-depth consideration and investigation according to the advancement of technology such as machine learning and its connection with social relations, particularly the share of information online.

Third, the credibility of a trusted-third-party has also been identified as one of the issues. There is a large number of software published on app markets every day, and some of them have not undergone a strict examination. Software bugs, configuration errors at the trusted-third-party and malicious administrators could expose private user data under high risks.[6] Based on a study from 2010, two-thirds of all the trusted-third-party applications in the Android market are considered to be suspicious towards sensitive information.[15]

Fourth, location privacy has been recognized as a personalized requirement and is sensitive to various contexts.[8] Customizing privacy parameters has been exploring in recent years since different people have different expectations on the amount of privacy preserved and sometimes the default settings do not fully satisfy user needs.[26][4] Considering that there is often a trade-off relation between privacy and personalization and personalization usually leads to better service,[7][4][8] people would have different preferences. In the situations where users can change the default configurations, accepting the default instead of customizing seems to be a more popular choice.[4][27] Also, people's attitudes towards disclosing their location information could vary based on the service's usefulness, privacy safeguards, and the disclosed quantity etc.[9] In most situations, people are weighing the price of privacy sharing and the benefits they received.[4]

Fifth, there are many protection mechanism proposed in literature yet few of them have been practically integrated into commercial applications.[28] Since there is little analysis regarding the implementation of location privacy-preserving mechanisms, there is still a large gap between theory and privacy.[4]

Attack

During the process of exchanging data, the three main parties -- the user, the server, and the networks -- can be attacked by adversaries.[4][15] The knowledge held by adversaries which could be used to carry out location attacks includes observed location information, precise location information, and context knowledge.[4] The techniques of machine learning and big data have also led to an emerging trend in location privacy,[4] and the popularity of smart devices has led to an increasing number of attacks.[15] Some of the adopted approaches include the virus, the Trojan applications, and several cyber-attacks.[15]

  • Man-in-the-middle attack

Man-in-the-middle attacks usually occur in the mobile environment which assumes that all the information going through the transferring process from user to the service provider could be under attacks and might be manipulated further by attackers revealing more personal information.[15]

  • Cross-service attack

Cross-servicing attacks usually take place when users are using poorly protected wireless connectivity, especially in public places.[15]

  • Video-based attack

Video-based attacks are more prevalent in mobile devices usually due to the use of Bluetooth, camera, and video capacities, since there are malicious software applications secretly recording users’ behavior data and reporting that information to a remote device. Stealthy Video Capture is one of the intentionally designed applications which spies an unconscious user and further report the information.[15]

  • Sensor sniffing attack

Sensor sniffing attacks usually refer to the cases where intentionally designed applications are installed on a device. Under this situation, even adversaries do not have physical contact with the mobile device, users’ personal information would still under risks of being disclosed.[15]

  • Context linking attack

In a localization attack, contextual knowledge is combined with observed location information to disclose a precise location. The contextual knowledge can also be combined with precise location information to carry out identity attacks.[4]

  • Machine/deep learning attack

Integrating learning algorithms and other deep learning methods are posing a huge challenge to location privacy, along with the massive amount of data online.[4] For example, current deep learning methods can come up with predictions about geolocations based on the personal photos from social networks and performs types of object detection based on their abilities to analyze millions of photos and videos.[4][29][30]

Regulations and policies

Policy approaches have also been discussed in recent years which intend to revise relevant guidelines or propose new regulations to better manage location-based service applications. The current technology state does not have a sufficiently aligned policies and legal environment, and there are efforts from both academia and industry trying to address this issue.[4] Two uniformly accepted and well- established requirements are the users' awareness of location privacy policies in a specific service and their consents of sending their personal location to a service provider.[14] Besides these two approaches, researchers have also been focusing on guarding the app markets, since an insecure app market would expose unaware users to several privacy risks. For example, there have been identified much malware in the Android app market, which are designed to carry cyber attacks on Android devices.[15] Without effective and clear guidelines to regulate location information, it would generate both ethical and lawful problems. Therefore, many guidelines have been discussed in years recently, to monitor the use of location information.

European data protection guideline

European data protection guideline was recently revised to include and specify the privacy of an individual's data and personally identifiable information (PIIs). These adjustments intend to make a safe yet effective service environment. Specifically, location privacy is enhanced by making sure that the users are fully aware and consented on the location information which would be sent to the service providers. Another important adjustment is that a complete responsibility would be given to the service providers when users’ private information is being processed.[15]

European Union's Directive

The European Union's Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data specifies that the limited data transfer to non-EU countries which are with "an adequate level of privacy protection".[31] The notion of explicit consent is also introduced in the Directive, which stated that except for legal and contractual purpose, personal data might only be processed if the user has unambiguously given his or her consent.[31]

European Union's Directive 2002/58/EC on privacy and electronic communication explicitly defines location information, user consent requirements and corporate disposal requirement which helps to regulate and protect European citizens' location privacy.[28] Under the situation when data are unlinkable to the user, the legal frameworks such as the EU Directive has no restriction on the collection of anonymous data.[31]

The electronic communications privacy act of 1986

The electronic communications privacy act discusses the legal framework of privacy protection and gives standards of law enforcement access to electronic records and communications.[32] It is also very influential in deciding electronic surveillance issues.[33]

Global system for mobile communication association (GSMA)

GSMA published a new privacy guideline, and some mobile companies in Europe have signed it and started to implement it so that users would have a better understanding of the information recorded and analyzed when using location-based services. Also, GSMA has recommended the operating companies to inform their customers about people who have access to the users’ private information.[15]

Cases

Corporate examples

Even though many privacy preserving mechanisms have not been integrated into common use due to effectiveness, efficiency, and practicality, some location-based service providers have started to address privacy issues in their applications.[4] For example, Twitter enables its users to customize location accuracy.[4] Locations posted in Glympse will automatically expire.[4] Also, SocialRadar allows its users to choose to be anonymous or invisible when using this application.[4]

Google

It has been stated that Google does not meet the European Union’s data privacy law and thus increasing attention has been placed on the advocation of guidelines and policies regarding data privacy.[15]

Facebook

It has been arguing that less than a week after Facebook uses its “Places” feature, the content of that location information has been exploited by thieves and are used to conduct a home invasion.[6]

Court cases

United States v. Knotts case

In this case, the police used a beeper to keep track of the suspect's vehicle. After using the beeper alone to track the suspect, the officers secured a search warrant and confirmed that the suspect was producing illicit drugs in the van. The suspect tried to suppress the evidence based on the tracking device used during the monitoring process, but the court denied this. The court concluded that “A person traveling in an automobile on a public thouroughfare[] has no reasonable expectation of privacy in his movement from one place to another.”[34] Nevertheless, the court reserved the discussion of whether twenty-four-hour surveillance would constitute a search.[34][33]

However, the cases using GPS and other tracking devices are different with this case, since GPS tracking can be conducted without human interaction, while the beeper is considered as a method to increase police's sensory perception through maintaining visual contact of the suspect.[34] Police presence is required when using beepers yet is not needed when using GPS to conduct surveillance. Therefore, law enforcement agents are required to secure a warrant before obtaining vehicle's location information with the GPS tracking devices.[33]

United States v. Jones

In this case(https://www.oyez.org/cases/2011/10-1259), the police had a search warrant to install Global Positioning System on a respondent wife's car, while the actual installation was on the 11th day in Maryland, instead of the authorized installation district and beyond the approved ten days. The District Court ruled that the data recorded on public roads admissible since the respondent Jones had no reasonable exception of privacy in public streets, yet the D.C. Circuit reversed this through the violation of the Fourth Amendment of unwarranted use of GPS device.[35]

Practical applications

  • In George Orwell's novel 1984, a world where everyone being watched is depicted, practically at all time and places.[8]
  • Brønnøysund Register Center(https://www.brreg.no) in Norway provides a free public register service, where people can register and specify that they do not want to receive direct marketing, or sale phone calls or mails.[26]

See also

References

  1. ^ a b c d e f Chow, Chi-Yin; Mokbel, Mohamed F.; Liu, Xuan (2011-04-01). "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments". GeoInformatica. 15 (2): 351–380. doi:10.1007/s10707-009-0099-y.
  2. ^ a b c d e f g h i Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43.
  3. ^ a b c d e f g h i j k l m n o p q r s t u v w x y z aa ab Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591.
  4. ^ a b c d e f g h i j k l m n o p q r s t u v w x y z aa ab ac ad ae af Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. doi:10.1109/ACCESS.2018.2822260.
  5. ^ Almuhimedi, Hazim; Schaub, Florian; Sadeh, Norman; Adjerid, Idris; Acquisti, Alessandro; Gluck, Joshua; Cranor, Lorrie Faith; Agarwal, Yuvraj (2015). "Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging". Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. CHI '15. New York, NY, USA: ACM. pp. 787–796. doi:10.1145/2702123.2702210. ISBN 978-1-4503-3145-6.
  6. ^ a b c d e f Puttaswamy, K. P. N.; Wang, S.; Steinbauer, T.; Agrawal, D.; Abbadi, A. E.; Kruegel, C.; Zhao, B. Y. (Jan 2014). "Preserving Location Privacy in Geosocial Applications". IEEE Transactions on Mobile Computing. 13 (1): 159–173. doi:10.1109/TMC.2012.247.
  7. ^ a b c d e f g h i j k l m n o Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8.
  8. ^ a b c d e f g h i j k l m n Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062.
  9. ^ a b c d e f g h i Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal Ubiquitous Comput. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5.
  10. ^ Olteanu, Alexandra-Mihaela; Huguenin, Kevin; Shokri, Reza; Humbert, Mathias; Hubaux, Jean-Pierre (1 March 2017). "Quantifying Interdependent Privacy Risks with Location Data". IEEE Transactions on Mobile Computing. 16 (3): 829–842. doi:10.1109/TMC.2016.2561281.
  11. ^ a b c d e f g h i j k l Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488.
  12. ^ Du, Wenliang; Atallah, Mikhail J. (2001). "Secure multi-party computation problems and their applications". Proceedings of the 2001 workshop on New security paradigms - NSPW '01. p. 13. doi:10.1145/508171.508174. ISBN 978-1-58113-457-5.
  13. ^ Hoh, Baik; Gruteser, M.; Xiong, Hui; Alrabady, A. (October 2006). "Enhancing Security and Privacy in Traffic-Monitoring Systems". IEEE Pervasive Computing. 5 (4): 38–46. doi:10.1109/MPRV.2006.69.
  14. ^ a b c d e f g h i j k l Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. doi:10.1007/s10707-008-0047-2.
  15. ^ a b c d e f g h i j k l m n o p q r s t u Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments". Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008.
  16. ^ a b Ghinita, Gabriel; Kalnis, Panos; Skiadopoulos, Spiros (2007). "PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems". Proceedings of the 16th International Conference on World Wide Web. WWW '07. New York, NY, USA: ACM. pp. 371–380. doi:10.1145/1242572.1242623. ISBN 978-1-59593-654-7.
  17. ^ a b Haus, Michael; Waqas, Muhammad; Ding, Aaron Yi; Li, Yong; Tarkoma, Sasu; Ott, Jorg (undefined NaN). "Security and Privacy in Device-to-Device (D2D) Communication: A Review". IEEE Communications Surveys & Tutorials. 19 (2): 1054–1079. doi:10.1109/COMST.2017.2649687. {{cite journal}}: Check date values in: |date= (help)
  18. ^ Sweeney, Latanya (October 2002). "k-anonymity: A model for protecting privacy". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 10 (05): 557–570. doi:10.1142/S0218488502001648.
  19. ^ Samarati, Pierangela; Sweeney, Latanya (1998). "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression". CiteSeerX 10.1.1.37.5829.
  20. ^ Samarati, P. "Protecting respondents identities in microdata release". IEEE Transactions on Knowledge and Data Engineering. 13 (6): 1010–1027. doi:10.1109/69.971193.
  21. ^ Solanas, Agusti; Sebé, Francesc; Domingo-Ferrer, Josep (2008). "Micro-aggregation-based Heuristics for P-sensitive K-anonymity: One Step Beyond". Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society. PAIS '08. New York, NY, USA: ACM. pp. 61–69. doi:10.1145/1379287.1379300. ISBN 978-1-59593-965-4.
  22. ^ Machanavajjhala, A.; Gehrke, J.; Kifer, D.; Venkitasubramaniam, M. (April 2006). "L-diversity: privacy beyond k-anonymity". 22nd International Conference on Data Engineering (ICDE'06): 24–24. doi:10.1109/ICDE.2006.1.
  23. ^ Zhao, Dapeng; Jin, Yuanyuan; Zhang, Kai; Wang, Xiaoling; Hung, Patrick C. K.; Ji, Wendi (2018-01-01). "EPLA: efficient personal location anonymity". GeoInformatica. 22 (1): 29–47. doi:10.1007/s10707-017-0303-4.
  24. ^ Gibbons, Jonathan; Falcao, Veronica; Hopper, Andy; Want, Roy (1992). "The Active Badge Location System". undefined. Retrieved 2019-04-25.
  25. ^ Gruteser, Marco; Grunwald, Dirk (2003). "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking". Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. MobiSys '03. New York, NY, USA: ACM: 31–42. doi:10.1145/1066116.1189037.
  26. ^ a b Snekkenes, Einar (2001). "Concepts for Personal Location Privacy Policies". Proceedings of the 3rd ACM Conference on Electronic Commerce. EC '01. New York, NY, USA: ACM. pp. 48–57. doi:10.1145/501158.501164. ISBN 978-1-58113-387-5.
  27. ^ Mislove, Alan; Gummadi, Krishna P.; Viswanath, Bimal; Liu, Yabing; Mondal, Mainack (2014). "Understanding and Specifying Social Access Control Lists". undefined. Retrieved 2019-04-24.
  28. ^ a b "(PDF) A Survey on Privacy in Location-Based Services". ResearchGate. Retrieved 2019-04-17.
  29. ^ "CSDL | IEEE Computer Society". www.computer.org. Retrieved 2019-04-24.
  30. ^ "PlaNet - Photo Geolocation with Convolutional Neural Networks | Request PDF". ResearchGate. Retrieved 2019-04-24.
  31. ^ a b c Langheinrich, Marc (2001). "Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems". In Abowd, Gregory D.; Brumitt, Barry; Shafer, Steven (eds.). Ubicomp 2001: Ubiquitous Computing. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 273–91. doi:10.1007/3-540-45427-6_23. ISBN 978-3-540-45427-4.
  32. ^ Mulligan, Deirdre (2004-08-01). "Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act". George Washington Law Review: 1557.
  33. ^ a b c Koppel, Adam (2010-04-01). "Warranting A Warrant: Fourth Amendment Concerns Raised By Law Enforcement's Warrantless Use Of GPS And Cellular Phone Tracking". University of Miami Law Review. 64 (3): 1061.
  34. ^ a b c Dickman, Bethany (Jan 2011). "Untying Knotts: The Application of Mosaic Theory to GPS Surveillance in UNITED STATES V. MAYNARD". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  35. ^ "After US v. Jones, After the Fourth Amendment Third Party Doctrine - NC Journal of Law & Technology". ncjolt.org. Retrieved 2019-04-25.