20 20

Transactions on
Data Privacy
Foundations and Technologies

http://www.tdp.cat


Articles in Press

Accepted articles here

Latest Issues

Year 2025

Volume 18 Issue 3
Volume 18 Issue 2
Volume 18 Issue 1

Year 2024

Volume 17 Issue 3
Volume 17 Issue 2
Volume 17 Issue 1

Year 2023

Volume 16 Issue 3
Volume 16 Issue 2
Volume 16 Issue 1

Year 2022

Volume 15 Issue 3
Volume 15 Issue 2
Volume 15 Issue 1

Year 2021

Volume 14 Issue 3
Volume 14 Issue 2
Volume 14 Issue 1

Year 2020

Volume 13 Issue 3
Volume 13 Issue 2
Volume 13 Issue 1

Year 2019

Volume 12 Issue 3
Volume 12 Issue 2
Volume 12 Issue 1

Year 2018

Volume 11 Issue 3
Volume 11 Issue 2
Volume 11 Issue 1

Year 2017

Volume 10 Issue 3
Volume 10 Issue 2
Volume 10 Issue 1

Year 2016

Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1

Year 2015

Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1

Year 2014

Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1

Year 2013

Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1

Year 2012

Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1

Year 2011

Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1

Year 2010

Volume 3 Issue 3
Volume 3 Issue 2
Volume 3 Issue 1

Year 2009

Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1

Year 2008

Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1


Volume 18 Issue 3


Protecting Whereabouts and Whatabouts for Check-in Based Location-Based Services

Osman Abul(a),(b),(*), Harun Gokce(b)

Transactions on Data Privacy 18:3 (2025) 113 - 133

Abstract, PDF

(a) Department of Computer Science, University of Sharjah, United Arab Emirates.

(b) Department of Computer Engineering, TOBB University of Economics and Technology, Turkey.

e-mail:oabul @sharjah.ac.ae; hgokce @etu.edu.tr


Abstract

Using diverse location-based services (LBSs), especially through mobile smart phones, have become a daily routine for many people. Location privacy is an important concern with each and every LBS request. Besides whereabouts, location disclosure provides attackers with whatabouts as well. Since each individual's location privacy needs are not the same, most solutions enable individualized location privacy profiles. In this work, as attack models and trustfulness of LBS providers are different, in the context of location check-ins, we provide a framework offering a palette of location privacy protection methods to be picked for each LBS provider/attacker. Depending on what to pro- tect per LBS provider, i.e., whereabouts and/or whatabouts, and attack model, i.e., weak or strong, we develop six privacy protection methods. A top-down location cloaking algorithm which is able to enforce the six protection methods is presented. An extensive experimental evaluation on two real datasets are performed.

* Corresponding author.


ISSN: 1888-5063; ISSN (Digital): 2013-1631; Web Site: http://www.tdp.cat/
Contact: Transactions on Data Privacy; Vicenç Torra; Umeå University; 90187 Umeå (Sweden); e-mail:tdp@tdp.cat
Note: TDP's web site does not use cookies. TDP does not keep information neither on IP addresses nor browsers. For the privacy policy access here.

 


Vicenç Torra, Last modified: 20 : 28 September 29 2025.