skip to main content
10.1145/1579114.1579116acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

An efficient k-anonymous localization technique for assistive environments

Published:09 June 2009Publication History

ABSTRACT

In health assistive environments the possibility of knowing patient's position can be very important, since may represent a valid support to medical activities and assistance strategies. However, we cannot assume in general that the utility of having precise information about patients' location is stronger than the right of keeping private the access to some place and, more in general, the exact movements that patients do in the environment. Thus, besides the standard precise localization issue, we consider also the issue of providing approximate non-deterministic answers about patients' positions in such a way that privacy is protected but they can be anyway found with a small number of attempts. The solution enforces the general concept of k-anonymity, which we adapt in our context in a way different from the classical one. An important aspect of our technique is that it is strongly efficient and implementable via very cheap devices, which is a very relevant issue in pervasive environments where wireless devices with limited processing capability and power have to be utilized.

References

  1. A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46--55, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. R. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In Conference on Pervasive Computing and Communications Workshops, pages 127--131. IEEE Computer Society, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. In MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, pages 180--189, New York, NY, USA, 2001. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Buccafurri and G. Lax. A pervasive identification service for physical access control. In ICPS '08: Proceedings of the 5th international conference on Pervasive services, pages 65--68, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. C. W. C. C. Yang and T. Y. Chang. An improvement of the yang-shieh password authentication schemes. Applied Mathematics and Computation, 162:1391--1396, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C.-Y. Chow, M. F. Mokbel, and X. Liu. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In GIS '06: Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, pages 171--178, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. Classes and E. M. for Deterministic Random Number Generators (AIS 20, Version 2.0, 2 December 1999). http://www.bsi.de/zertifiz/zert/interpr/ais20e.pdf.Google ScholarGoogle Scholar
  8. B. für Sicherheit in der Informationstechnik. http://www.bsi.de/english/index.htm.Google ScholarGoogle Scholar
  9. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys '03: Proceedings of the 1st international conference on Mobile systems, applications and services, pages 31--42. ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. R. Hill. A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev., 9(2):40--60, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst., 7(4):387--414, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Krumm. Inference attacks on location tracks. In International Conference Pervasive on Pervasive Computing, Lecture Notes in Computer Science, pages 127--143. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Kumar. New remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic, 50(2):597--600, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770--772, Nov. 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Li, K. Sampigethaya, L. Huang, and R. Poovendran. Swing & swap: user-centric approaches towards maximizing location privacy. In WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society, pages 19--28, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y. Li and X. Zhang. Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications, 4:413--426, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. Peterson. Error-correcting codes. M.I.T. Press and John Wiley & Sons, 1961.Google ScholarGoogle Scholar
  18. M. Peyravian and C. Jeffries. Secure remote user access over insecure networks. Computer Communications, 29(5):660--667, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Rubin and N. Wright. Off-line generation of limited-use credit card numbers. In Proceedings of the Fifth International Conference on Financial Cryptography, pages 165--175, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. D. Rubin. Independent one-time passwords. In USENIX Journal of Computer Systems, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans, on Knowl. and Data Eng., 13(6):1010--1027, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. Caravan: Providing location privacy for vanet. In Embedded Security in Cars (ESCAR), 2005.Google ScholarGoogle Scholar
  23. A. Stubblefield, J. Ioannidis, and A. D. Rubin. A key recovery attack on the 802.11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur., 7(2):319--332, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. T. Xu and Y. Cai. Location anonymity in continuous location-based services. In GIS '07: Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems, pages 1--8, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An efficient k-anonymous localization technique for assistive environments

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        PETRA '09: Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
        June 2009
        481 pages
        ISBN:9781605584096
        DOI:10.1145/1579114

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 June 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader