Utilizing Spatio-temporal Data Index for Location Privacy Protection

T. K. Dang, V. N. Nguyen, D. Vu, J. Küng
{"title":"Utilizing Spatio-temporal Data Index for Location Privacy Protection","authors":"T. K. Dang, V. N. Nguyen, D. Vu, J. Küng","doi":"10.1109/DEXA.2013.7","DOIUrl":null,"url":null,"abstract":"Situation management systems are developing quickly nowadays. Among their vast applications, disaster management, homeland security and traffic management are of the most important ones. In domains above, the locations of people inside the observed areas are great sources of information. While we can put the accuracy of the location information first in emergency domains, such as disaster management, we need to care about users' locations privacy in civil domains, such as traffic management. Thus, privacy-preserving techniques have gained special attention from researchers, such as obfuscation-based or k-anonymity. While existing solutions have integrated obfuscation-based into the indexed Spatio-temporal data to gain performance boost, the lack of reciprocity in these solutions grants the attackers ability to infer the exact users location by using some tricks, e.g. Query Sampling Attacks. Meanwhile, an important property of Hilbert Cloaking algorithm is reciprocity. This property ensures that any user in the k-Anonymizing Spatial Region has the same blurred region, thus the disadvantage of the above solutions is overcome. In this paper, we propose a new solution that combines Hilbert Cloaking algorithm and obfuscation-based technique to increase the privacy protection. Our solution is also integrated into Spatio-temporal data index structure so that it can be used for commercial Database Management Systems.","PeriodicalId":428515,"journal":{"name":"2013 24th International Workshop on Database and Expert Systems Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 24th International Workshop on Database and Expert Systems Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DEXA.2013.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Situation management systems are developing quickly nowadays. Among their vast applications, disaster management, homeland security and traffic management are of the most important ones. In domains above, the locations of people inside the observed areas are great sources of information. While we can put the accuracy of the location information first in emergency domains, such as disaster management, we need to care about users' locations privacy in civil domains, such as traffic management. Thus, privacy-preserving techniques have gained special attention from researchers, such as obfuscation-based or k-anonymity. While existing solutions have integrated obfuscation-based into the indexed Spatio-temporal data to gain performance boost, the lack of reciprocity in these solutions grants the attackers ability to infer the exact users location by using some tricks, e.g. Query Sampling Attacks. Meanwhile, an important property of Hilbert Cloaking algorithm is reciprocity. This property ensures that any user in the k-Anonymizing Spatial Region has the same blurred region, thus the disadvantage of the above solutions is overcome. In this paper, we propose a new solution that combines Hilbert Cloaking algorithm and obfuscation-based technique to increase the privacy protection. Our solution is also integrated into Spatio-temporal data index structure so that it can be used for commercial Database Management Systems.
利用时空数据索引进行位置隐私保护
当前态势管理系统发展迅速。在其广泛的应用中,灾害管理、国土安全和交通管理是最重要的应用。在上述领域中,观察区域内人员的位置是重要的信息来源。在灾害管理等应急领域,我们可以把位置信息的准确性放在首位,而在交通管理等民用领域,我们需要关心用户的位置隐私。因此,隐私保护技术得到了研究人员的特别关注,例如基于混淆或k-匿名的技术。虽然现有的解决方案已经将基于混淆的数据集成到索引的时空数据中以获得性能提升,但这些解决方案中缺乏互惠性,使得攻击者能够通过使用一些技巧来推断用户的确切位置,例如查询抽样攻击。同时,希尔伯特隐身算法的一个重要性质是互易性。该属性保证了k-Anonymizing空间区域中的任何用户都具有相同的模糊区域,从而克服了上述解决方案的缺点。本文提出了一种结合希尔伯特隐身算法和基于模糊的技术来增强隐私保护的新方案。我们的解决方案还集成到时空数据索引结构中,因此它可以用于商业数据库管理系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信