Cloaking games in location based services

Gabriele Gianini, Ernesto Damiani

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

A prototypical case of data anonymization is location anonymization: here the most common data anonymization technique { k-anonymity { corresponds to cloaking and consists in providing to the potential attacker a large granularity view of the user location. However the anonymizer should take into account that if the landscape is not neutral - so that some user locations are more likely than others - then the attacker could perform some inferences over the data received and lower substantially the anonymity level with respect to the nominal one, associated to a specific cloak. Data anonymization can be considered a two players' game: given a user position, there are in general several cloaks of a given size that the anonymizer can provide to the potential attacker, furthermore upon receiving a cloak the latter can choose among different points where to deliver an attack; the outcome of the game for each participant depends not only on his own strategy, but also on the strategy of the other player. A specific pair of strategies will be considered a solution to the game if none of the players (who are considered fully rational) could gain benefit by leaving that behavior unilaterally. This solution can be used as a reference solution, to determine the size of the cloak suitable to fulfill specific anonymity constraints, or to determine the relative effectiveness of other obfuscation solutions. This paper extends the results introduced in a previous work and analyzes a new communication scenario.

Original languageBritish English
Title of host publicationProceedings of the 2008 ACM Workshop on Secure Web Services, SWS'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
Pages61-70
Number of pages10
DOIs
StatePublished - 2008
Event2008 ACM Workshop on Secure Web Services, SWS'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08 - Alexandria, VA, United States
Duration: 27 Oct 200831 Oct 2008

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference2008 ACM Workshop on Secure Web Services, SWS'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
Country/TerritoryUnited States
CityAlexandria, VA
Period27/10/0831/10/08

Keywords

  • Game theory
  • K-anonymity
  • Location based services

Fingerprint

Dive into the research topics of 'Cloaking games in location based services'. Together they form a unique fingerprint.

Cite this