Sciweavers

Share
PERCOM
2009
ACM

A Distributed k-Anonymity Protocol for Location Privacy

10 years 9 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking the person’s location such that there are at least k − 1 other people within the cloaked area and by revealing only the cloaked area to a location-based service. Previous research has explored two ways of cloaking: First, have a central server that knows everybody’s location determine the cloaked area. However, this server needs to be trusted by all users and is a single point of failure. Second, have users jointly determine the cloaked area. However, this approach requires that all users trust each other, which will likely not hold in practice. We propose a distributed approach that does not have these drawbacks. Our approach assumes that there are multiple servers, each deployed by a different organization. A user’s locati...
Ge Zhong, Urs Hengartner
Added 19 May 2010
Updated 19 May 2010
Type Conference
Year 2009
Where PERCOM
Authors Ge Zhong, Urs Hengartner
Comments (0)
books