p-Sensitivity: A semantic privacy-protection model for location-based services

Zhen Xiao*, Jianliang Xu, Xiaofeng Meng

*Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

45 Citations (Scopus)

Abstract

Several methods have been proposed to support location-based services without revealing mobile users' privacy information. There are two types of privacy concerns in location-based services: location privacy and query privacy. Existing work, based on location k-anonymity, mainly focused on location privacy and are insufficient to protect query privacy. In particular, due to lack of semantics, location k-anonymity suffers from query homogeneity attack. In this paper, we introduce p-sensitivity, a novel privacy-protection model that considers query diversity and semantic information in anonymizing user locations. We propose a PE-Tree for implementing the p-sensitivity model. Search algorithms and heuristics are developed to efficiently find the optimal p-sensitivity anonymization in the tree. Preliminary experiments show that p-sensitivity provides high-quality services without compromising users' query privacy.

Original languageEnglish
Title of host publication2008 9th International Conference on Mobile Data Management Workshops, MDMW 2008
PublisherIEEE Computer Society
Pages47-54
Number of pages8
ISBN (Print)9781424444847
DOIs
Publication statusPublished - 2008
Event2008 9th International Conference on Mobile Data Management Workshops, MDMW 2008 - Beijing, China
Duration: 27 Apr 200830 Apr 2008

Publication series

Name2008 9th International Conference on Mobile Data Management Workshops, MDMW 2008

Conference

Conference2008 9th International Conference on Mobile Data Management Workshops, MDMW 2008
Country/TerritoryChina
CityBeijing
Period27/04/0830/04/08

Scopus Subject Areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'p-Sensitivity: A semantic privacy-protection model for location-based services'. Together they form a unique fingerprint.

Cite this