TY - JOUR
T1 - Providing K-Anonymity in location based services
AU - Gkoulalas-Divanis, Aris
AU - Kalnis, Panos
AU - Verykios, Vassilios S.
N1 - KAUST Repository Item: Exported on 2021-04-19
PY - 2010/11/9
Y1 - 2010/11/9
N2 - The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution approaches that have been proposed to tackle this problem, K-anonymity has received increased attention and has been extensively studied in various forms. New forms of data that come into existence, like location data capturing user movement, pave the way for the offering of cutting edge services such as the prevailing Location Based Services (LBSs). Given that these services assume an in-depth knowledge of the mobile users' whereabouts it is certain that the assumed knowledge may breach the privacy of the users. Thus, concrete approaches are necessary to preserve the anonymity of the mobile users when requesting LBSs. In this work, we survey recent advancements for the offering of K-anonymity in LBSs. Most of the approaches that have been proposed heavily depend on a trusted server component -- that acts as an intermediate between the end user and the service provider - to preserve the anonymity of the former entity. Existing approaches are partitioned in three categories: (a) historical K-anonymity, (b) location K-anonymity, and (c) trajectory K-anonymity. In each of these categories we present some of the most prevalentmethodologies that have been proposed and highlight their operation.
AB - The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution approaches that have been proposed to tackle this problem, K-anonymity has received increased attention and has been extensively studied in various forms. New forms of data that come into existence, like location data capturing user movement, pave the way for the offering of cutting edge services such as the prevailing Location Based Services (LBSs). Given that these services assume an in-depth knowledge of the mobile users' whereabouts it is certain that the assumed knowledge may breach the privacy of the users. Thus, concrete approaches are necessary to preserve the anonymity of the mobile users when requesting LBSs. In this work, we survey recent advancements for the offering of K-anonymity in LBSs. Most of the approaches that have been proposed heavily depend on a trusted server component -- that acts as an intermediate between the end user and the service provider - to preserve the anonymity of the former entity. Existing approaches are partitioned in three categories: (a) historical K-anonymity, (b) location K-anonymity, and (c) trajectory K-anonymity. In each of these categories we present some of the most prevalentmethodologies that have been proposed and highlight their operation.
UR - http://hdl.handle.net/10754/667846
UR - https://dl.acm.org/doi/10.1145/1882471.1882473
U2 - 10.1145/1882471.1882473
DO - 10.1145/1882471.1882473
M3 - Article
SN - 1931-0145
VL - 12
SP - 3
EP - 10
JO - ACM SIGKDD Explorations Newsletter
JF - ACM SIGKDD Explorations Newsletter
IS - 1
ER -