2PASS: Bandwidth-optimized location cloaking for anonymous location-based services

Haibo Hu*, Jianliang Xu

*Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review

30 Citations (Scopus)

Abstract

Protection of users' location privacy is a critical issue for location-based services. Location cloaking has been proposed to blur users' accurate locations with cloaked regions. Although various cloaking algorithms have been studied, none of the prior work has explored the impact of cloaking on the bandwidth usage of requested services. In this paper, we develop an innovative result-aware location cloaking approach, called 2PASS. Based on the notion of Voronoi cells, 2PASS minimizes the number of objects to request, and hence, the bandwidth while meeting the same privacy requirement. The core component of 2PASS is a lightweight WAG-tree index, based on which efficient and secure client and server procedures are designed. Through threat analysis and experimental results, we argue that 2PASS is robust and outperforms state-of-the-art approaches in terms of various metrics, such as query response time and bandwidth consumption. We also enclose a case study of 2PASS in a real-life application.

Original languageEnglish
Article number5406506
Pages (from-to)1458-1472
Number of pages15
JournalIEEE Transactions on Parallel and Distributed Systems
Volume21
Issue number10
DOIs
Publication statusPublished - Oct 2010

Scopus Subject Areas

  • Signal Processing
  • Hardware and Architecture
  • Computational Theory and Mathematics

User-Defined Keywords

  • distributed applications
  • integrity
  • Mobile applications
  • protection
  • security

Fingerprint

Dive into the research topics of '2PASS: Bandwidth-optimized location cloaking for anonymous location-based services'. Together they form a unique fingerprint.

Cite this