Unraveling an Old Cloak: k-anonymity for Location Privacy

There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders of a query, thus achieving k-anonymity. This paper analyzes the effectiveness of k-anonymity approaches for protecting location privacy in the presence of various types of adversaries. The unraveling of the scheme unfolds the inconsistency between its components, mainly the cloaking mechanism and the k-anonymity metric. We show that constructing cloaking regions based on the users' locations does not reliably relate to location privacy, and argue that this technique may even be detrimental to users' location privacy. The uncovered flaws imply that existing k-anonymity scheme is a tattered cloak for protecting location privacy.

Published in:
ACM Workshop on Privacy in the Electronic Society (WPES)
Presented at:
ACM Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA, October 4, 2010

 Record created 2010-08-11, last modified 2018-01-28

External links:
Download fulltextFulltext
Download fulltextFulltext
Rate this document:

Rate this document:
(Not yet reviewed)