TACO: A Tree-based Approach to Customizing Location Obfuscation based on User Policies

06/16/2022
by   Primal Pappachan, et al.
0

A large body of literature exists for studying Location obfuscation in different contexts. However, the obfuscation functions generated by existing systems are not easily customizable by end users. Users might find it difficult to understand the parameters involved (e.g., obfuscation range and granularity of location representation) and set realistic trade-offs between privacy and utility. In this paper, we propose a new framework called, TACO, i.e., Tree-based Approach to Customizing location Obfuscation, which can generate location obfuscation functions that provide strong privacy guarantees while being easily customizable via user-specified policies. First, we develop a semantic representation of a given region using tree structure. These data structures assist users in specifying their privacy requirements using policies. Second, we design a rigorous privacy model based on Geo-Indistinguishability for TACO using this tree structure. Third, we implement enforcement techniques in TACO to translate user policies to appropriate parameters and generate a robust, customized obfuscation function for each user. Finally, we carry out experiments on real world datasets to evaluate the effectiveness of the framework under different settings.

READ FULL TEXT
research
05/04/2020

Customizable and Rigorous Location Privacy through Policy Graph

Location privacy has been extensively studied in the literature. However...
research
02/24/2020

Ensuring Privacy in Location-Based Services: A Model-based Approach

In recent years, the widespread of mobile devices equipped with GPS and ...
research
10/09/2017

Optimization of Privacy-Utility Trade-offs under Informational Self-determination

The pervasiveness of Internet of Things results in vast volumes of perso...
research
05/24/2018

Optimal noise functions for location privacy on continuous regions

Users of location-based services (LBSs) are highly vulnerable to privacy...
research
09/12/2018

A Tabula Rasa Approach to Sporadic Location Privacy

Attacks and defenses in the location privacy literature largely consider...
research
06/21/2019

n-VDD: Location Privacy Protection Based on Voronoi-Delaunay Duality

To date, location privacy protection is a critical issue in Location-Bas...
research
09/01/2019

A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace

Mobile devices with rich features can record videos, traffic parameters ...

Please sign up or login with your details

Forgot password? Click here to reset