International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 4 - Issue 11, November 2015 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Framework For Enhancing Privacy In Location Based Services Using K-Anonymity Model

[Full Text]



Jane Mugi, Michael Kimwele, George Okeyo.



Index Terms: Anonynizer, Anonymized Spatial Region, K-Anonymity, Location Based Services, Point of Interest.



Abstract: This paper presents a framework for enhancing privacy in Location Based Services using K-anonymity model. Users of location based services have to reveal their location information in order to use these services; however this has threatened the user privacy. K-anonymity approach has been studied extensively in various forms. However, it is only effective when the user location is fixed. When a user moves and continuously sends their location information, the location service provider can approximate user trajectory which poses a threat to the trajectory privacy of the user. This framework will ensure that user privacy is enhanced for both snapshot and continuous queries. The efficiency and effectiveness of the proposed framework was evaluated, the results indicate that the proposed framework has high success rate and good run time performance.



[1] Beresford A. R.& Frank .S(2004). Mix Zones: User Privacy in Location-Aware Services. Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on. IEEE, 2.

[2] S. Gambs, O.Heen&C. Potin (2011). A comparative privacy analysis of geosocial networks. In Proceedings of the 4th ACMSIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL ’11, pages 33–40, New York, NY, USA, ACM.

[3] .Mokbel, C. Chow,&W. G. Aref(2006.). The new Casper: Query Processing for location services without compromising privacy. In VLDB, pages 763–774.

[4] Mouratidis, k. & Yiu, M. L. (2010). Anonymous Query Processing in Road Networks. IEEE TKDE 22, 1,2–15.

[5] Kalnis, P., ghinita, G., mouratidis, k& papadias, (2007). Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE TKDE 19, 12, 1719–1733.

[6] Ghinita, P. Kalnis, and S. Skiadopoulos(, 2007). “PRIV ´ E: Anonymous Location-Based Queries in Distributed Mobile Systems,” in WWW, pp. 371–380. [18] )A Mobile Peer-to PeerSystem for Anonymous Location-Based Queries,” in SSTD, pp. 758–769

[7] Hashem, T., Kulik, L., Zhang, R(March 2010). Privacy preserving group nearest neighbor queries. In: Proceedings of the 13th International Conference on Extending Database Technology -EDBT ’10, New York, New York, USA, and ACM Press 489–500.

[8] Gkoulalas.V& mokbel,.F. (2009). Identifying unsafe routes for network-based trajectory privacy. In SDM pp. 942–953.
[9] Davison, M. R., Clarke, R., Smith, H. J., Langford, D., and Kuo, F Y(2003 ).“Information Privacy in a Globally Networked Society: Implications for IS Research,” Communications of the Association for Information Systems (12), pp. 341-365.

[10] Duckham, M. and Kulik, L. (2005). A formal model of obfuscation and negotiation for location privacy. In Proc. of the International Conference on Pervasive Computing.

[11] Olumofin Femi, K. Tysowski Piotr, Goldberg Ian, and Hengartner Urs(2010). Achieving efficient query privacy for location based services. In Privacy Enhancement Technologies (PETS),.

[12] Wei-Shinn Ku, Roger Zimmermann, Wen-Chih Peng, and Sushama Shroff(2007.)Privacy protected query processing on spatial networks. In ICDE Workshops, pages 215–220.

[13] Hu.H J. Xu, Q. Chen, and Z. Yang (2012). Authenticating location-based services without compromising location privacy. In Proc. SIGMOD, pages 301.

[14] Gkoulalas-divanis, a., verykios, v. S., and mokbel, M. F (2009) Identifying unsafe Routes for network-based trajectory privacy.

[15] Claudio Bettini, X. Sean Wang,&Sushil Jajodia(2005.). Protecting privacy against Location-based personal identification. In In 2nd VLDB Workshop SDM, pages185–199,

[16] Brinkhoff. K (2002,) “A Framework for Generating Network-Based Moving Objects,” (GeoInformatica, Vol.6 No.2, pp.153.

[17] Pingley.A W. Yu, N. Zhang, X. Fu, W. Zhao(2012). A context-aware scheme for privacy-preserving location-based services, Computer Networks, (56), 2551-2568.

[18] Pierangela.S(, 2001.) Pirotecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13:1010–1027.

[19] Marco Gruteser and Dirk Grunwal(2003). Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys ’03: Proceedings of the 1st international conference on Mobile systems, applications and services, pages.

[20] Man Yiu, Christian Jensen, Xuegang Huang, Hua Lu(2008). SpaceTwist: Managing the TradeOffs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. 24th International Conference on Data Engineering,

[21] Hao.T Wen Peng &Wang Lee (2007 ) .Protecting Moving Trajectories Using Dummies. International Workshop on Privacy Aware Location BasedMobile Services.

[22] Ghinita. G, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi & Kian Tan (2008). Private queries in Location Based Services: Anonymizers are not necessary. SIGMOD, 200831–42, New York, NY, USA,. ACM.

[23] Stenneth.L& Philip S. (2010.) Global Privacy and Transportation Mode Homogeneity Anonymization in Location Based Mobile Systems with Continuous Queries. 6th International Conference on Collaborative Computing: Networking, Applications and Work Sharing.

[24] Fuyu Liu, Kien Hua, Ying Cai(2009).Query l‐Diveristy in Location‐Based Services. International Conference On Mobile Data Management.

[25] Kido.H Y. Yanagisawa and T. Satoh (2005). Protection of Location Privacy using Dummies for Location-based Services. In ICPS

[26] Gisli R. Hjaltason , Hanan Samet, (1999)Ranking in Spatial Databases, .... Visual Information and Information Systems, p.317-324, June 02-04.

[27] Ashwin machanavajjhala, johannes gehrke, daniel kifer,muthuramakrishnanvenkitasubramaniam?( , 2006.)“l‐diversity: privacy beyond kanonymity.icde