{"title":"User density and spatial cloaking algorithm selection: Improving privacy protection of mobile users","authors":"Matthew Chan, Hassan Elsherbini, Xiaowen Zhang","doi":"10.1109/SARNOF.2016.7846722","DOIUrl":null,"url":null,"abstract":"Data sharing and privacy protection of mobile users have always been a challenge to research and development, as well as commercial and enterprise deployment of the Global Positioning System (GPS) and location-based mobile applications. The concepts of k-anonymity, two spatial cloaking algorithms — Nearest Neighbor Cloak (NNC) and Hilbert Cloak (HC) — that utilize k-anonymity, as well as user density's impacts on the performance are discussed in this paper. The proposed research seeks to examine and adopt an adaptive scheme that utilizes these cloaking algorithms to improve security, privacy protection and performance of a system, using k-anonymity to generate the k-ASR in an anonymizer.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 37th Sarnoff Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SARNOF.2016.7846722","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Data sharing and privacy protection of mobile users have always been a challenge to research and development, as well as commercial and enterprise deployment of the Global Positioning System (GPS) and location-based mobile applications. The concepts of k-anonymity, two spatial cloaking algorithms — Nearest Neighbor Cloak (NNC) and Hilbert Cloak (HC) — that utilize k-anonymity, as well as user density's impacts on the performance are discussed in this paper. The proposed research seeks to examine and adopt an adaptive scheme that utilizes these cloaking algorithms to improve security, privacy protection and performance of a system, using k-anonymity to generate the k-ASR in an anonymizer.