Browse > Article
http://dx.doi.org/10.12672/ksis.2012.20.4.093

K-Anonymity using Hierarchical Structure in Indoor Space  

Kim, Joon-Seok (부산대학교 컴퓨터공학과)
Li, Ki-Joune (부산대학교 컴퓨터공학과)
Publication Information
Abstract
Due to complexity of indoor space, the demand of Location Based Services (LBS) in indoor space is increasing as well as outdoor. However, it includes privacy problems of exposing personal location. Location K-anonymity technology is a method to solve the privacy problems with cloaking their locations by Anonymized Spatial Region(ASR). It guarantees K users within a region containing the location of a given user. However previous researches have dealt the problems based on Euclidean distance in outdoor space, and cannot be applied in indoor space where there are constraints of movement such as walls. For this reason, we propose in this paper a K-anonymity for cloaking indoor location in consideration of structures and representation of indoor space. The basic concept of our approach is to introduce a hierarchical structure as ASR for including K-1 users for cloaking their locations. We also proposed a cost model by K and attributes of hierarchical structure to analyze the performance of the method.
Keywords
Indoor Space; K-Anonymity; Hierarchical Structure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Becker and F. Durr, 2005, "On Location Models for Ubiquitous Computing," Personal and Ubiquitous Computing, vol. 9, no. 1, pp. 20-31.   DOI   ScienceOn
2 B. Gedik, and L. Liu, 2005, "Location Privacy in Mobile Systems: A Personalized Anonymization Model," In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pp. 620-629.
3 A. Gkoulalas-Divanis, P Kalnis and V.S. Verykios, 2010, "Providing K-anonymity in Location Based Services," ACM SIGKDD Explorations, vol. 12, no. 1, pp. 3-10.   DOI
4 M. Gruteser, and D. Grunwald, 2003, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31-42.
5 B. Hagedorn, M. Trapp, T. Glander, and J. Dollner, 2009, "Towards an Indoor Levelof- Detail Model for Route Visualization," In Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 692-697.
6 H. Hu and D. Lee, 2004, "Semantic Location Modeling for Location Navigation in Mobile Environment," In Proceedings of the 5th IEEE International Conference on Mobile Data Management, pp. 52-61.
7 P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias, 2007, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," The IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719-1733.   DOI
8 K. Li, 2008, "Indoor Space: A New Notion of Space," In Proceedings of the 8th International Symposium on Web and Wireless Geographical Information Systems, pp. 1-3.
9 M.F. Mokbel, C.Y. Chow, and W.G. Aref, 2006, "The New Casper: Query Processing for Location Services without Compromising Privacy," In Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763-774.
10 K. Richter, S. Winter and U. Ruetschi, 2009, "Constructing Hierarchical Representations of Indoor Spaces," In Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 686-691.
11 H. Samet, 1990, The Design and Analysis of Spatial Data Structures, p. 510, Addison-Wesley Series in Computer Science.
12 E. Stoel, K. Schoder and H.J. Ohlbach, 2008, "Applying Hierarchical Graphs to Pedestrian Indoor Navigation," In Proceedings of the 16th ACM SIGSpatial International Conference on Advances in Geographic Information Systems, pp. 54.
13 강혜영, 김준석, 황정래, 이기준, 2008, "셀룰러 공간에 존재하는 이동객체 궤적의 유사도 측정," 한국 GIS학회지, 제16권, 제3호, pp. 291-301.
14 김지희, 이아름, 김용기, 엄정호, 장재우, 2008, "위치기반 서비스에서 개인 정보 보호를 위한 Kanonymity 및 L-diversity를 지원하는 Cloaking기법," 한국공간정보시스템학회 논문지, 제10권, 제4호, pp. 1-10.
15 A. Machanavajjhala, D. Kifer, J. Gehrke and M. Venkitasubramaniam, 2007, "L-diversity: Privacy Beyond k-Anonymity," ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, pp. 3:1-3:52.
16 엄정호, 김지희, 장재우, 2009, "위치기반 서비스에서 개인 정보 보호를 위한 그리드를 이용한 Cloaking 영역 생성 알고리즘," 한국공간정보시스템학회 논문지, 제11권, 제2호, pp. 151-161.