Cloaking with footprints to provide location privacy protection in location-based services
First Claim
1. A method for using a location-based service while preserving anonymity by continuous cloaking using footprints, the method comprising:
- determining a base trajectory associated with a device, the base trajectory comprising at least two points;
determining an anonymity level, K, associated with the device;
wherein the anonymity level, K, being determined based on a spatial region specified by a user of the device;
wherein the anonymity level, K, being determined by measuring popularity of the spatial region specified by the user of the device based on footprints collected from visitors to the spatial region, wherein the footprints include historical location samples;
computing a K-anonymity trajectory using the base trajectory, the anonymity level, and a set of historical trajectories comprising footprints of other users to thereby cloak time-series location samples for the device;
providing the K-anonymity trajectory to a location-based service to thereby preserve anonymity of the device and provide location privacy protection for the device;
wherein computing the K-anonymity trajectory comprises cloaking the base trajectory with a set of K−
1 trajectories; and
wherein the computing the K-anonymity trajectory comprises selecting a small set of trajectories from a database for cloaking.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for using a location-based service while preserving anonymity includes receiving a location associated with a mobile node, receiving an anonymity level associated with the mobile node, computing a region containing the location of the mobile node and a number of footprints based on the anonymity level, wherein each of the footprints from a different user, and providing the region to a location-based service to thereby preserve anonymity of the mobile node. A method also allow a mobile device or its user to specify the anonymity level by selecting a public region consistent with a user'"'"'s feelings towards desired privacy.
6 Citations
6 Claims
-
1. A method for using a location-based service while preserving anonymity by continuous cloaking using footprints, the method comprising:
-
determining a base trajectory associated with a device, the base trajectory comprising at least two points; determining an anonymity level, K, associated with the device; wherein the anonymity level, K, being determined based on a spatial region specified by a user of the device; wherein the anonymity level, K, being determined by measuring popularity of the spatial region specified by the user of the device based on footprints collected from visitors to the spatial region, wherein the footprints include historical location samples; computing a K-anonymity trajectory using the base trajectory, the anonymity level, and a set of historical trajectories comprising footprints of other users to thereby cloak time-series location samples for the device; providing the K-anonymity trajectory to a location-based service to thereby preserve anonymity of the device and provide location privacy protection for the device; wherein computing the K-anonymity trajectory comprises cloaking the base trajectory with a set of K−
1 trajectories; andwherein the computing the K-anonymity trajectory comprises selecting a small set of trajectories from a database for cloaking. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification