Ensuring Privacy in Location-Based Services: An Approach Based on Opacity Enforcement

@inproceedings{Wu2014EnsuringPI,
  title={Ensuring Privacy in Location-Based Services: An Approach Based on Opacity Enforcement},
  author={Yi-Chin Wu and Karthik Abinav Sankararaman and St{\'e}phane Lafortune},
  booktitle={WODES},
  year={2014}
}
Abstract With the proliferation of mobile devices, Location-Based Services (LBS) that provide networked services based on users' locations have become increasingly popular. Such services, providing personalized and timely information, have raised privacy concerns such as unwanted revelation of users' current locations to potential stalkers. Many prior studies have proposed to address LBS privacy by sending “cloaking queries” that contain coarser location information. However, this method has… Expand
Ensuring Privacy in Location-Based Services: A Model-based Approach
TLDR
This paper proposes to model the user mobility pattern and utility of the LBS as a Markov decision process (MDP), and inspired by probabilistic current state opacity notation, a new location privacy metric, namely $\epsilon-$privacy, that quantifies the adversary belief over the user's current location is introduced. Expand
Dynamic Modeling of Location Privacy Protection Mechanisms
TLDR
A metric to evaluate privacy of obfuscated data based on users’ points of interest as well as a predictive model of the impact of a LPPM on these measure; both working in a real time fashion are presented. Expand
A Control-Theoretic Approach for Location Privacy in Mobile Applications
TLDR
The paper presents the first control formulation of POI-related privacy measure, as well as dynamic modeling and a simple yet efficient PI control strategy and the evaluation using simulated mobility records shows the relevance and efficiency of the presented approach. Expand
Incremental Observer Abstraction for Opacity Verification and Synthesis
With the proliferation of communication networks and mobile devices, the privacy and security concerns on their information flow are raised. Given a critical system that may leak confidentialExpand
K-memory-embedded insertion mechanism for opacity enforcement
TLDR
This paper defines the property of i k -E-enforceability that a k -memory-embedded insertion function needs to satisfy for opacity enforcement, and construct a verifier to determine whether a given opacity notion of the system is i k-E-Enforceable or not. Expand
Incremental Observer Reduction Applied to Opacity Verification and Synthesis
TLDR
It is proved that observer generation can be done locally before synchronizing the subsystems, and the incremental local observer generation along with an abstraction method lead to a significant state space reduction compared to traditional monolithic methods. Expand
Secure Your Intention: On Notions of Pre-Opacity in Discrete-Event Systems
TLDR
A new class of opacity called pre-opacity is proposed that characterizes whether or not the intruder can predict the visit of secret states a certain number of steps ahead before the system actually does so and is shown to be inherently PSPACE-hard. Expand
Verification and Enforcement of Opacity Security Properties in Discrete Event Systems.
TLDR
A novel enforcement mechanism based on event insertion to address opacity enforcement for a class of systems whose dynamics cannot be modified, and an analysis and enforcement procedure is applied to ensuring location privacy in location-based services. Expand
A General Language-Based Framework for Specifying and Verifying Notions of Opacity
TLDR
A general framework of opacity is provided to unify the many existing notions of opacity that exist for discrete event systems and provides a language-based view of K-step opacity encompassing two existing notions and two new ones. Expand
Trajectory Planning under Current-State Opacity Constraints
TLDR
How current-state opacity formulations can be used to capture privacy properties of interest in automated systems that are modeled as controlled finite automata that need to be steered from one state (initial location) to another state (target location), while maintaining certain privacy guarantees is discussed. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 21 REFERENCES
Enabling Private Continuous Queries for Revealed User Locations
TLDR
Experimental results show that the robust spatial cloaking algorithm is scalable and efficient while providing anonymity for large numbers of continuous queries without hiding users' locations. Expand
Protection of query privacy for continuous location based services
TLDR
A novel query-perturbation-based scheme that protects query privacy in continuous LBS even when user-identities are revealed, and unlike most exiting works, this scheme does not require the presence of a trusted third party. Expand
Casper*: Query processing for location services without compromising privacy
TLDR
A privacy-aware query processor embedded inside a location-based database server to deal with snapshot and continuous queries based on the knowledge of the user's cloaked location rather than the exact location, which achieves a trade-off between query processing cost and answer optimality. Expand
Exploring Historical Location Data for Anonymity Preservation in Location-Based Services
  • Toby Xu, Ying Cai
  • Computer Science
  • IEEE INFOCOM 2008 - The 27th Conference on Computer Communications
  • 2008
TLDR
This work depersonalizes location information by ensuring that each location reported for LBSs is a cloaking area that contains K different footprints-historical locations of different mobile nodes, so that the exact identity and location of the service requestor remain anonymous from LBS service providers. Expand
Privacy protection for users of location-based services
TLDR
This article presents a comprehensive overview of the existing schemes for protecting LBS users' privacy and classifies the protection schemes according to their architectural properties and privacy metrics. Expand
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
TLDR
A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area. Expand
A Formal Model of Obfuscation and Negotiation for Location Privacy
TLDR
It is argued that obfuscation is an important technique for protecting an individual's location privacy within a pervasive computing environment and a formal framework within which obfuscated location-based services are defined is set out. Expand
An anonymous communication technique using dummies for location-based services
TLDR
This paper proposes an anonymous communication technique to protect the location privacy of the users of location-based services and describes a cost reduction technique for communication between a client and a server. Expand
Unraveling an old cloak: k-anonymity for location privacy
TLDR
It is shown that constructing cloaking regions based on the users' locations does not reliably relate to location privacy, and it is argued that this technique may even be detrimental to users' location privacy. Expand
Synthesis of insertion functions for enforcement of opacity security properties
TLDR
The problem of enforcing opacity in systems modeled as partially-observed finite-state automata is considered, and a novel enforcement mechanism based on the use of insertion functions is proposed. Expand
...
1
2
3
...