Unraveling an old cloak: k-anonymity for location privacy

  title={Unraveling an old cloak: k-anonymity for location privacy},
  author={Reza Shokri and Carmela Troncoso and Claudia D{\'i}az and Julien Freudiger and Jean-Pierre Hubaux},
There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders of a query, thus achieving k-anonymity. This paper analyzes the effectiveness of k-anonymity approaches for protecting location privacy in the presence of various types of adversaries. The unraveling of the scheme unfolds the inconsistency… CONTINUE READING
Highly Cited
This paper has 142 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper


Publications citing this paper.
Showing 1-10 of 69 extracted citations

Online Location Trace Privacy: An Information Theoretic Approach

IEEE Transactions on Information Forensics and Security • 2019
View 1 Excerpt

A Real-Time Location Privacy Protection Method Based on Space Transformation

2018 14th International Conference on Computational Intelligence and Security (CIS) • 2018
View 1 Excerpt

142 Citations

Citations per Year
Semantic Scholar estimates that this publication has 142 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.