Sciweavers

Share
SUTC
2008
IEEE

A Cloaking Algorithm Based on Spatial Networks for Location Privacy

10 years 9 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible for cloaking at least k users’ locations for protecting location privacy. A location anonymizer will generate cloaked regions in which there are at least k users for query processing. Prior works only explore grid shape cloaked regions. However, grid shape cloaked regions result in a considerable amount of query results, thereby increasing the overhead of filtering unwanted query results. In this paper, we propose a cloaking algorithm in which cloaked regions are generated according to the features of spatial networks. By exploring the features of spatial networks, the cloaked regions are very efficient for reducing query results and improving cache utilization of mobile devices. Furthermore, an index structure for spatial networks is built and in light of the propose...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn
Added 01 Jun 2010
Updated 01 Jun 2010
Type Conference
Year 2008
Where SUTC
Authors Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn Ku, Jianliang Xu, John A. Hamilton Jr.
Comments (0)
books