TY - GEN
T1 - Location privacy via geo-indistinguishability
AU - Chatzikokolakis, Konstantinos
AU - Palamidessi, Catuscia
AU - Stronati, Marco
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015/1/1
Y1 - 2015/1/1
N2 - In this paper we report on the ongoing research of our team Comète on location privacy. In particular,we focus on the problem of protecting the privacy of the user when dealing with location-based services. The starting point of our approach is the principle of geo-indistinguishability, a formal notion of privacy that protects the user’s exact location, while allowing approximate information-typically needed to obtain a certain desired service-to be released. Then, we discuss the problem that raise in the case of traces, when the user makes consecutive uses of the location based system, while moving along a path: since the points of a trace are correlated, a simple repetition of the mechanism would cause a rapid decrease of the level of privacy. We then show a method to limit such degradation, based on the idea of predicting a point from previously reported points, instead of generating a new noisy point. Finally, we discuss a method to make our mechanism more flexible over space: we start from the observation that space is not uniform from the point of view of location hiding, and we propose an approach to adapt the level of privacy to each zone.
AB - In this paper we report on the ongoing research of our team Comète on location privacy. In particular,we focus on the problem of protecting the privacy of the user when dealing with location-based services. The starting point of our approach is the principle of geo-indistinguishability, a formal notion of privacy that protects the user’s exact location, while allowing approximate information-typically needed to obtain a certain desired service-to be released. Then, we discuss the problem that raise in the case of traces, when the user makes consecutive uses of the location based system, while moving along a path: since the points of a trace are correlated, a simple repetition of the mechanism would cause a rapid decrease of the level of privacy. We then show a method to limit such degradation, based on the idea of predicting a point from previously reported points, instead of generating a new noisy point. Finally, we discuss a method to make our mechanism more flexible over space: we start from the observation that space is not uniform from the point of view of location hiding, and we propose an approach to adapt the level of privacy to each zone.
U2 - 10.1007/978-3-319-25150-9_2
DO - 10.1007/978-3-319-25150-9_2
M3 - Conference contribution
AN - SCOPUS:84958545023
SN - 9783319251493
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 28
EP - 38
BT - Theoretical Aspects of Computing – ICTAC 2015 - 12th International Colloquium, Proceedings
A2 - Rueda, Camilo
A2 - Valencia, Frank D.
A2 - Valencia, Frank D.
A2 - Leucker, Martin
PB - Springer Verlag
T2 - 12th International Colloquium on Theoretical Aspects of Computing, ICTAC 2015
Y2 - 29 October 2015 through 31 October 2015
ER -