A Clustering K-Anonymity Scheme for Location Privacy Preservation

Lin YAO  Guowei WU  Jia WANG  Feng XIA  Chi LIN  Guojun WANG  

Publication
IEICE TRANSACTIONS on Information and Systems   Vol.E95-D   No.1   pp.134-142
Publication Date: 2012/01/01
Online ISSN: 1745-1361
DOI: 10.1587/transinf.E95.D.134
Print ISSN: 0916-8532
Type of Manuscript: Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
K-anonymity,  spatial-temporal constraints,  location-based services,  location privacy,  clustering,  

Full Text: PDF(1.1MB)>>
Buy this Article




Summary: 
The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of Location-Based Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity scheme for location privacy preservation (namely CK) is proposed. The CK scheme does not rely on a trusted third party to anonymize the location information of users. In CK scheme, the whole area that all the users reside is divided into clusters recursively in order to get cloaked area. The exact location information of the user is replaced by the cloaked spatial temporal boundary (STB) including K users. The user can adjust the resolution of location information with spatial or temporal constraints to meet his personalized privacy requirement. The experimental results show that CK can provide stringent privacy guarantees, strong robustness and high QoS (Quality of Service).