TY - JOUR
T1 - Sensitivity analysis and countermeasures for transformation-based location obfuscation
AU - Gonzalez, L.
AU - Zurbarán, M.
AU - Wightman, P.
AU - Jabba, D.
AU - Jimeno, M.
AU - Zurek, E.
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014
Y1 - 2014
N2 - Development of location privacy protection mechanisms is one of the most important concerns in existing and future location-based information systems, due to the important value that users' locations have for ill-intentioned organizations that could break in and obtain this data. Transformation-based location obfuscation techniques are one of the best techniques available because they substantially alter the location of the user, without revealing the whereabouts of the routes, while being completely reversible. One example of this is the Matlock technique. Even though it has been proven that theoretically it can be reversed by solving a linear system, it is not clear to what extent one can feasibly obtain the original route or enough information to recreate it. This work performs an analysis on how sensitive Matlock really is to reverse engineering and how some countermeasures can decrease the accuracy of the estimations from a third party. The use of noise-based obfuscation is shown to be a useful tool to reduce the accuracy of the obfuscation matrix estimation.
AB - Development of location privacy protection mechanisms is one of the most important concerns in existing and future location-based information systems, due to the important value that users' locations have for ill-intentioned organizations that could break in and obtain this data. Transformation-based location obfuscation techniques are one of the best techniques available because they substantially alter the location of the user, without revealing the whereabouts of the routes, while being completely reversible. One example of this is the Matlock technique. Even though it has been proven that theoretically it can be reversed by solving a linear system, it is not clear to what extent one can feasibly obtain the original route or enough information to recreate it. This work performs an analysis on how sensitive Matlock really is to reverse engineering and how some countermeasures can decrease the accuracy of the estimations from a third party. The use of noise-based obfuscation is shown to be a useful tool to reduce the accuracy of the obfuscation matrix estimation.
UR - http://www.scopus.com/inward/record.url?scp=84931022239&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84931022239&partnerID=8YFLogxK
U2 - 10.1109/CCST.2014.6987048
DO - 10.1109/CCST.2014.6987048
M3 - Research Article
AN - SCOPUS:84931022239
SN - 1071-6572
JO - Proceedings - International Carnahan Conference on Security Technology
JF - Proceedings - International Carnahan Conference on Security Technology
M1 - 6987048
ER -