ABSTRACT
A plethora of applications benefit from location context, but a person's whereabouts can be linked to her personal sensitive information. Hence, protection mechanisms have been proposed that add systematic noise to a user's location before sending it out of the user's device. We describe the same-origin attack, to which a group of such mechanisms are vulnerable, we evaluate it against two mechanisms (spatial cloaking and geo-indistinguishability), and we propose our own mechanism, inspired by the maximum entropy principle. We find that spatial cloaking is much worse than the other two, and the maximum-entropy mechanism performs slightly better than geo-indistinguishability. Designing an optimal mechanism remains an open problem.
- M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In CCS 2013. Google ScholarDigital Library
- K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, and C. Palamidessi. Broadening the scope of differential privacy using metrics. In PETS 2013.Google Scholar
- K. Chatzikokolakis, C. Palamidessi, and M. Stronati. A predictive differentially-private mechanism for mobility traces. In PETS 2014.Google Scholar
- T. Cover, and J. Thomas. Elements of Information Theory. John Wiley and Sons, 2006. Google ScholarDigital Library
- C. Dwork. Differential privacy. In LNCS 4052, 2006. Google ScholarDigital Library
- K. Fawaz, and K. Shin. Location privacy protection for smartphone users. In CCS 2014. Google ScholarDigital Library
- R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux. Quantifying location privacy. In SP 2011. Google ScholarDigital Library
- R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Protecting location privacy: optimal strategy against localization attacks. In CCS 2012. Google ScholarDigital Library
- G. Theodorakopoulos, R. Shokri, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec. Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services. In WPES 2014. Google ScholarDigital Library
Index Terms
- The Same-Origin Attack against Location Privacy
Recommendations
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy
The mainstream approach to protecting the privacy of mobile users in location-based services (LBSs) is to alter (e.g., perturb, hide, and so on) the users’ actual locations in order to reduce exposed sensitive information. In order to be effective, a ...
Protecting location privacy using location semantics
KDD '11: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data miningAs the use of mobile devices increases, a location-based service (LBS) becomes increasingly popular because it provides more convenient context-aware services. However, LBS introduces problematic issues for location privacy due to the nature of the ...
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An ...
Comments