Unraveling an Old Cloak: k-anonymity for Location Privacy
There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders of a query, thus achieving k-anonymity. This paper analyzes the effectiveness of k-anonymity approaches for protecting location privacy in the presence of various types of adversaries. The unraveling of the scheme unfolds the inconsistency between its components, mainly the cloaking mechanism and the k-anonymity metric. We show that constructing cloaking regions based on the users' locations does not reliably relate to location privacy, and argue that this technique may even be detrimental to users' location privacy. The uncovered flaws imply that existing k-anonymity scheme is a tattered cloak for protecting location privacy.
ShokriTDFH-WPES10_1.pdf
openaccess
549.84 KB
Adobe PDF
35e473928b9a52db039341ea1fd13cbc
cdiaz-wpes-2010.ppt
openaccess
6.39 MB
Microsoft Powerpoint
ef7c0c6851cc6034ad35f7dc3c304fd3