Skip to main content
Top
Published in: Knowledge and Information Systems 3/2015

01-12-2015 | Regular Paper

The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services

Authors: Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi, Ali Aydın Selçuk

Published in: Knowledge and Information Systems | Issue 3/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Several techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead to user privacy leakage and query inefficiency. In this paper, we propose a two-phase protocol, we name Cloaked-Centroid, which is designed specifically to protect location privacy for a group of users. We identify location privacy issues for a group of users who may ask an LBS for a meeting place that is closest to the group centroid. Our protocol relies on spatial cloaking, an anonymous veto network and a conference key establishment protocol. In the first phase, member locations are cloaked into a single region based on their privacy profiles, and then, a single query is submitted to an LBS. In the second phase, a special secure multiparty computation extracts the meeting point result from the received answer set. Our protocol is resource aware, taking into account the LBS overhead and the communication cost, i.e., the number of nearest neighbor queries sent to a service provider and the number of returned points of interests. Regarding privacy, Cloaked-Centroid protects the location privacy of each group member from those in the group and from anyone outside the group, including the LBS. Moreover, our protocol provides result-set anonymity, which prevents LBS providers and other possible attackers from learning the meeting place location. Extensive experiments show that the proposed protocol is efficient in terms of computation and communication costs. A security analysis shows the resistance of the protocol against collusion, disruption and background knowledge attacks in a malicious model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
An attacker with a prior knowledge about a user approximate location.
 
Literature
1.
go back to reference Ardagna CA, Cremonini M, De Capitani di Vimercati S et al (2011) An obfuscation-based approach for protecting location privacy. IEEE Trans Dependable Secur Comput (TDSC) 8:13–27CrossRef Ardagna CA, Cremonini M, De Capitani di Vimercati S et al (2011) An obfuscation-based approach for protecting location privacy. IEEE Trans Dependable Secur Comput (TDSC) 8:13–27CrossRef
2.
go back to reference Ashouri-Talouki M, Baraani-Dastjerdi A, Selçuk AA (2012) GLP: a cryptographic approach for group location privacy. Comput Commun 35:1527–1533CrossRef Ashouri-Talouki M, Baraani-Dastjerdi A, Selçuk AA (2012) GLP: a cryptographic approach for group location privacy. Comput Commun 35:1527–1533CrossRef
3.
go back to reference Bamba B, Liu L, Pesti P et al (2008) Supporting anonymous location queries in mobile environments with PrivacyGrid. In: Proceedings of world wide web conference (WWW ’08), pp 237–246 Bamba B, Liu L, Pesti P et al (2008) Supporting anonymous location queries in mobile environments with PrivacyGrid. In: Proceedings of world wide web conference (WWW ’08), pp 237–246
4.
go back to reference Bickson D, Reinman T, Dolev D et al (2009) Peer-to-peer secure multi-party numerical computation facing malicious adversaries. Peer-to-Peer Netw Appl J 3:129–144CrossRef Bickson D, Reinman T, Dolev D et al (2009) Peer-to-peer secure multi-party numerical computation facing malicious adversaries. Peer-to-Peer Netw Appl J 3:129–144CrossRef
5.
go back to reference Boudot F (2000) Efficient proofs that a committed number lies in an interval. In: Proceedings of advances in cryptology (EUROCRYPT’00), pp 431–444 Boudot F (2000) Efficient proofs that a committed number lies in an interval. In: Proceedings of advances in cryptology (EUROCRYPT’00), pp 431–444
6.
go back to reference Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer, Berlin, ISBN 978-3-540-43107-7 Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer, Berlin, ISBN 978-3-540-43107-7
7.
go back to reference Burmester M, Desmedt Y (1994) A secure and efficient conference key distribution system. In: Proceedings of advances in cryptology (EUROCRYPT’94), pp 275–286 Burmester M, Desmedt Y (1994) A secure and efficient conference key distribution system. In: Proceedings of advances in cryptology (EUROCRYPT’94), pp 275–286
8.
go back to reference Camenisch J, Michels M (1999) Proving in zero-knowledge that a number is the product of two safe primes. In: Proceedings of advances in cryptology (EUROCRYPT’99), LNCS, vol 1592, pp 106–121 Camenisch J, Michels M (1999) Proving in zero-knowledge that a number is the product of two safe primes. In: Proceedings of advances in cryptology (EUROCRYPT’99), LNCS, vol 1592, pp 106–121
10.
go back to reference Chen K, Liu L (2011) Geometric data perturbation for privacy preserving outsourced data mining. Knowl Inf Syst 29:657–695CrossRef Chen K, Liu L (2011) Geometric data perturbation for privacy preserving outsourced data mining. Knowl Inf Syst 29:657–695CrossRef
11.
go back to reference Chow CY, Mokbel MF, Aref WG (2009) Casper*: query processing for location services without compromising privacy. ACM Trans Database Syst 34:1–48CrossRef Chow CY, Mokbel MF, Aref WG (2009) Casper*: query processing for location services without compromising privacy. ACM Trans Database Syst 34:1–48CrossRef
12.
go back to reference Chow CY, Mokbel MF, Bao J et al (2011) Query-aware location anonymization for road networks. GeoInformatica 15(3):571–607CrossRef Chow CY, Mokbel MF, Bao J et al (2011) Query-aware location anonymization for road networks. GeoInformatica 15(3):571–607CrossRef
13.
go back to reference Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of international conference on Advances in spatial and temporal databases (SSTD’07), pp 258–273 Chow CY, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of international conference on Advances in spatial and temporal databases (SSTD’07), pp 258–273
14.
go back to reference Chow CY, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems (GIS’06), pp 171–178 Chow CY, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the ACM symposium on advances in geographic information systems (GIS’06), pp 171–178
15.
go back to reference Chow CY, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15:351–380CrossRef Chow CY, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15:351–380CrossRef
16.
go back to reference Cramer R, Franklin MK, Schoenmakers B et al (1996) Multi-authority secret-ballot elections with linear work. In: Proceedings of advanced in cryptology (EUROCRYPT’69), pp 72–83 Cramer R, Franklin MK, Schoenmakers B et al (1996) Multi-authority secret-ballot elections with linear work. In: Proceedings of advanced in cryptology (EUROCRYPT’69), pp 72–83
17.
go back to reference Das K, Bhaduri K, Kargupta H (2010) A local asynchronous distributed privacy preserving feature selection algorithm for large peer-to-peer networks. Knowl Inf Syst 24:341–367CrossRef Das K, Bhaduri K, Kargupta H (2010) A local asynchronous distributed privacy preserving feature selection algorithm for large peer-to-peer networks. Knowl Inf Syst 24:341–367CrossRef
18.
go back to reference Dewri R (2011) Location privacy and attacker knowledge: who are we fighting against? In: Proceeding of 7th international ICST conference on security and privacy in communication networks, SecureComm, London, UK Dewri R (2011) Location privacy and attacker knowledge: who are we fighting against? In: Proceeding of 7th international ICST conference on security and privacy in communication networks, SecureComm, London, UK
19.
go back to reference Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proceedings of international conference on pervasive computing (Pervasive’05), pp 152–170 Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proceedings of international conference on pervasive computing (Pervasive’05), pp 152–170
20.
go back to reference Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput TMC 7:1–18CrossRef Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput TMC 7:1–18CrossRef
21.
go back to reference Ghinita G, Kalnis P, Skiadopoulos S (2007) MobiHide: a mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of international symposium on advances in spatial and temporal databases (SSTD’07), pp 221–238 Ghinita G, Kalnis P, Skiadopoulos S (2007) MobiHide: a mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of international symposium on advances in spatial and temporal databases (SSTD’07), pp 221–238
22.
go back to reference Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVÉ: anonymous location-based queries in distributed mobile systems. In: Proceedings of international conference on world wide web (WWW’07), pp 371–389 Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVÉ: anonymous location-based queries in distributed mobile systems. In: Proceedings of international conference on world wide web (WWW’07), pp 371–389
23.
go back to reference Ghinita G, Kalnis P, Kantarcioglu M et al (2009) A hybrid technique for private location-based queries with database protection. In: Proceedings of international symposium on advances in spatial and temporal databases (SSTD’09). LNCS, vol 5644, pp 98–116 Ghinita G, Kalnis P, Kantarcioglu M et al (2009) A hybrid technique for private location-based queries with database protection. In: Proceedings of international symposium on advances in spatial and temporal databases (SSTD’09). LNCS, vol 5644, pp 98–116
24.
go back to reference Ghinita G, Kalnis P, Khoshgozaran A et al (2008) Private queries in location based services: Anonymizers are not necessary. In: Proceedings of the ACM international conference on management of data (SIGMOD’08), pp 121–132 Ghinita G, Kalnis P, Khoshgozaran A et al (2008) Private queries in location based services: Anonymizers are not necessary. In: Proceedings of the ACM international conference on management of data (SIGMOD’08), pp 121–132
25.
go back to reference Goldreich O, Micali S, Wigderson A (1987) How to play any mental game or a completeness theorem for protocols with honest majority. In: Proceedings of the nineteenth annual ACM conference on theory of computing (STOC’87), pp 218–229 Goldreich O, Micali S, Wigderson A (1987) How to play any mental game or a completeness theorem for protocols with honest majority. In: Proceedings of the nineteenth annual ACM conference on theory of computing (STOC’87), pp 218–229
26.
go back to reference Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys, pp 31–42 Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys, pp 31–42
27.
go back to reference Gruteser M, Schelle G, Jain A et al (2003) Privacy-aware location sensor networks. In: Proceedings of USENIX workshop on hot topics in operating systems (HOTOS’03) Gruteser M, Schelle G, Jain A et al (2003) Privacy-aware location sensor networks. In: Proceedings of USENIX workshop on hot topics in operating systems (HOTOS’03)
28.
go back to reference Hao F, Zielinski P (2006) A 2-round anonymous veto protocol. In: Proceedings of the 14th international workshop on security protocols, Cambridge. LNCS, vol 5087, pp 202–211 Hao F, Zielinski P (2006) A 2-round anonymous veto protocol. In: Proceedings of the 14th international workshop on security protocols, Cambridge. LNCS, vol 5087, pp 202–211
29.
go back to reference Hao F, Zielinski P (2009) The power of anonymous veto in public discussion. Trans Comput Sci IV 5430:41–52CrossRef Hao F, Zielinski P (2009) The power of anonymous veto in public discussion. Trans Comput Sci IV 5430:41–52CrossRef
30.
go back to reference Hashem T and Kulik L (2007) Safeguarding location privacy in wireless ad-hoc networks. In: Proceedings of international conference on ubiquitous computing (Ubicomp’07), pp 372–390 Hashem T and Kulik L (2007) Safeguarding location privacy in wireless ad-hoc networks. In: Proceedings of international conference on ubiquitous computing (Ubicomp’07), pp 372–390
31.
go back to reference Hashem T, Kulik L, Zhang R (2010) Privacy preserving group nearest neighbor queries. In: Proceedings of international conference on extending database technology (EDBT’10), pp 489–500 Hashem T, Kulik L, Zhang R (2010) Privacy preserving group nearest neighbor queries. In: Proceedings of international conference on extending database technology (EDBT’10), pp 489–500
32.
go back to reference Hu H, Xu J (2009) Non-exposure location anonymity. In: Proceedings of IEEE international conference on data engineering (ICDE’09), pp 1120–1131 Hu H, Xu J (2009) Non-exposure location anonymity. In: Proceedings of IEEE international conference on data engineering (ICDE’09), pp 1120–1131
33.
go back to reference Kalnis P, Ghinita G, Mouratidis K et al (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng (IEEE TKDE) 19:1719–1733CrossRef Kalnis P, Ghinita G, Mouratidis K et al (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng (IEEE TKDE) 19:1719–1733CrossRef
34.
go back to reference Khoshgozaran A, Shahabi C, Shirani-Mehr H (2011) Location privacy: going beyond K-anonymity, cloaking and anonymizers. Knowl Inf Syst 26:435–465CrossRef Khoshgozaran A, Shahabi C, Shirani-Mehr H (2011) Location privacy: going beyond K-anonymity, cloaking and anonymizers. Knowl Inf Syst 26:435–465CrossRef
35.
go back to reference Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of international conference on advances in spatial and temporal databases (SSTD’07), pp 239–257 Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of international conference on advances in spatial and temporal databases (SSTD’07), pp 239–257
36.
go back to reference Kiayias A, Yung M (2003) Non-interactive zero-sharing with applications to private distributed decision making. In: Proceedings of financial cryptography. LNCS, vol 2742, pp 303–320 Kiayias A, Yung M (2003) Non-interactive zero-sharing with applications to private distributed decision making. In: Proceedings of financial cryptography. LNCS, vol 2742, pp 303–320
37.
go back to reference Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of the 4th international conference on ubiquitous computing (UbiComp’02), pp 237–245 Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of the 4th international conference on ubiquitous computing (UbiComp’02), pp 237–245
38.
go back to reference Lee B, Oh J, Yu H et al. (2011) Protecting location privacy using location semantics. In: Proceedings of ACM international conference on knowledge discovery and data mining (KDD’11), pp 1289–1297 Lee B, Oh J, Yu H et al. (2011) Protecting location privacy using location semantics. In: Proceedings of ACM international conference on knowledge discovery and data mining (KDD’11), pp 1289–1297
40.
go back to reference Mao W (1998) Guaranteed correct sharing of integer factorization with off-line shareholders. In: Proceedings of public key cryptography (PKC’98), pp 27–42 Mao W (1998) Guaranteed correct sharing of integer factorization with off-line shareholders. In: Proceedings of public key cryptography (PKC’98), pp 27–42
41.
go back to reference Menezes AJ, Van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca RatonMATH Menezes AJ, Van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca RatonMATH
42.
go back to reference Mokbel MF (2008) Privacy-preserving location services. In: Proceedings of IEEE international conference on data engineering (ICDM’08), Pisa, Italy (3-hours tutorial) Mokbel MF (2008) Privacy-preserving location services. In: Proceedings of IEEE international conference on data engineering (ICDM’08), Pisa, Italy (3-hours tutorial)
43.
go back to reference Mokbel MF, Chow CY, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on very large data bases (VLDB’06), pp 763–774 Mokbel MF, Chow CY, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on very large data bases (VLDB’06), pp 763–774
44.
go back to reference Mokbel MF (2007) Privacy in location-based services: state-of-the-art and research directions. In: IEEE international conference on mobile data management, MDM 2007, Mannheim, Germany (3-hours tutorial) Mokbel MF (2007) Privacy in location-based services: state-of-the-art and research directions. In: IEEE international conference on mobile data management, MDM 2007, Mannheim, Germany (3-hours tutorial)
45.
go back to reference Olumofin F, Tysowski PK, Goldberg I et al (2010) Achieving efficient query privacy for location based services. In: Proceedings of the 10th international conference on privacy enhancing technologies (PETS’10), pp 93–110 Olumofin F, Tysowski PK, Goldberg I et al (2010) Achieving efficient query privacy for location based services. In: Proceedings of the 10th international conference on privacy enhancing technologies (PETS’10), pp 93–110
46.
go back to reference Paillier P, Pointcheval D (1999) Efficient public-key cryptosystems provably secure against active adversaries. In: Advances in cryptology (ASIACRYPT’99), pp 165–179 Paillier P, Pointcheval D (1999) Efficient public-key cryptosystems provably secure against active adversaries. In: Advances in cryptology (ASIACRYPT’99), pp 165–179
47.
go back to reference Papadias D, Tao Y, Mouratidis K et al (2005) Aggregate nearest neighbor queries in spatial databases. ACM Trans Database Syst (TODS) 30:529–576CrossRef Papadias D, Tao Y, Mouratidis K et al (2005) Aggregate nearest neighbor queries in spatial databases. ACM Trans Database Syst (TODS) 30:529–576CrossRef
48.
go back to reference Peng K, Bao F (2010) Batch range proof for practical small ranges. In: Proceedings of the AFRICACRYPT. LNCS, vol 6055, pp 114–130 Peng K, Bao F (2010) Batch range proof for practical small ranges. In: Proceedings of the AFRICACRYPT. LNCS, vol 6055, pp 114–130
49.
go back to reference Pieprzyk J, Hardjono T, Seberry J (2003) Fundamentals of computer security. Springer, Berlin, ISBN 978-3-540-43101-5 Pieprzyk J, Hardjono T, Seberry J (2003) Fundamentals of computer security. Springer, Berlin, ISBN 978-3-540-43101-5
50.
go back to reference Pohlig S, Hellman M (1978) An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans Inf Theory 24:106–110MathSciNetCrossRefMATH Pohlig S, Hellman M (1978) An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans Inf Theory 24:106–110MathSciNetCrossRefMATH
51.
go back to reference Ramakrishnan R, Gehrke J (2009) Database Manag Syst, 3rd edn. WCB/McGraw-Hill, New York Ramakrishnan R, Gehrke J (2009) Database Manag Syst, 3rd edn. WCB/McGraw-Hill, New York
52.
go back to reference Reed MG, Syverson PF, Goldschlag DM (1998) Anonymous connections and onion routing. IEEE J Sel Areas Commun 16:482–494CrossRef Reed MG, Syverson PF, Goldschlag DM (1998) Anonymous connections and onion routing. IEEE J Sel Areas Commun 16:482–494CrossRef
53.
go back to reference Sakuma J, Kobayashi S (2010) Large-scale k-means clustering with user-centric privacy-preservation. Knowl Inf Syst 25:253–279CrossRef Sakuma J, Kobayashi S (2010) Large-scale k-means clustering with user-centric privacy-preservation. Knowl Inf Syst 25:253–279CrossRef
55.
go back to reference Solanas A, Domingo-Ferrer J, Martínez-Ballesté A (2008) Location privacy in location-based services: beyond TTP-based schemes. In: Proceeding of 1st international workshop on privacy in location-based applications (PILBA) within 13th European symposium on research in computer security (ESORICS), pp 12–23 Solanas A, Domingo-Ferrer J, Martínez-Ballesté A (2008) Location privacy in location-based services: beyond TTP-based schemes. In: Proceeding of 1st international workshop on privacy in location-based applications (PILBA) within 13th European symposium on research in computer security (ESORICS), pp 12–23
56.
go back to reference Solanas A, Martínez-Ballesté A (2008) A TTP-free protocol for location privacy in location-based services. Comput Commun 31:1181–1191CrossRef Solanas A, Martínez-Ballesté A (2008) A TTP-free protocol for location privacy in location-based services. Comput Commun 31:1181–1191CrossRef
57.
go back to reference Strassman M, Collier C (2004) Case study: the development of the find friends application. In: Schiller JH, Voisard A (eds) Location-based services. Morgan Kaufmann, Los Altos, pp 27–40CrossRef Strassman M, Collier C (2004) Case study: the development of the find friends application. In: Schiller JH, Voisard A (eds) Location-based services. Morgan Kaufmann, Los Altos, pp 27–40CrossRef
58.
go back to reference Tai CH, Yu PS, Yang DN et al (2011) Privacy-preserving social network publication against friendship attacks. In: Proceedings of ACM international conference on knowledge discovery and data mining (KDD’11), pp 1262–1270 Tai CH, Yu PS, Yang DN et al (2011) Privacy-preserving social network publication against friendship attacks. In: Proceedings of ACM international conference on knowledge discovery and data mining (KDD’11), pp 1262–1270
60.
go back to reference Yang B, Nakagawa B, Sato I, Sakuma J (2010) Collusion-resistant privacy-preserving data mining. In: Proceedings of the ACM international conference on knowledge discovery and data mining (KDD’10), pp 483–492 Yang B, Nakagawa B, Sato I, Sakuma J (2010) Collusion-resistant privacy-preserving data mining. In: Proceedings of the ACM international conference on knowledge discovery and data mining (KDD’10), pp 483–492
61.
go back to reference Yiu ML, Jensen C, Huang X et al (2008) SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of IEEE international conference on data engineering (ICDE’08), pp 366–375 Yiu ML, Jensen C, Huang X et al (2008) SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of IEEE international conference on data engineering (ICDE’08), pp 366–375
62.
go back to reference Zhong G, Goldberg I, Hengartner U (2007) Louis, lester and pierre: three protocols for location privacy. In: Proceedings of privacy enhancing technologies (PET’07), pp 62–76 Zhong G, Goldberg I, Hengartner U (2007) Louis, lester and pierre: three protocols for location privacy. In: Proceedings of privacy enhancing technologies (PET’07), pp 62–76
63.
go back to reference Zhong G, Hengartner U (2009) A distributed k-anonymity protocol for location privacy. In: Proceedings of IEEE international conference on pervasive computing and communications (PerCom’09), pp 253–262 Zhong G, Hengartner U (2009) A distributed k-anonymity protocol for location privacy. In: Proceedings of IEEE international conference on pervasive computing and communications (PerCom’09), pp 253–262
Metadata
Title
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
Authors
Maede Ashouri-Talouki
Ahmad Baraani-Dastjerdi
Ali Aydın Selçuk
Publication date
01-12-2015
Publisher
Springer London
Published in
Knowledge and Information Systems / Issue 3/2015
Print ISSN: 0219-1377
Electronic ISSN: 0219-3116
DOI
https://doi.org/10.1007/s10115-014-0809-0

Other articles of this Issue 3/2015

Knowledge and Information Systems 3/2015 Go to the issue

Premium Partner