{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:33:36Z","timestamp":1759091616449,"version":"3.41.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,8,17]],"date-time":"2015-08-17T00:00:00Z","timestamp":1439769600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM SIGLOG News"],"published-print":{"date-parts":[[2015,8,17]]},"abstract":"<jats:p>In this paper we report on our ongoing project aimed at protecting the privacy of the user when dealing with location-based services. The starting point of our approach is the principle of geo-indistinguishability, a formal notion of privacy that protects the user's exact location, while allowing approximate information -- typically needed to obtain a certain desired service -- to be released. We then present two mechanisms for achieving geo-indistinguishability, one generic to sanitize locations in any setting with reasonable utility, the other custom-built for a limited set of locations but providing optimal utility. Finally we extend our mechanisms to the case of location traces, where the user releases his location repeatedly along the day and we provide a method to limit the degradation of the privacy guarantees due to the correlation between the points. All the mechanisms were tested on real datasets and compared both among themselves and with respect to the state of the art in the field.<\/jats:p>","DOI":"10.1145\/2815493.2815499","type":"journal-article","created":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T01:17:49Z","timestamp":1585963069000},"page":"46-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Location privacy via geo-indistinguishability"],"prefix":"10.1145","volume":"2","author":[{"given":"Konstantinos","family":"Chatzikokolakis","sequence":"first","affiliation":[{"name":"\u00c9cole Polytechnique, France"}]},{"given":"Catuscia","family":"Palamidessi","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique, France"}]},{"given":"Marco","family":"Stronati","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique, France"}]}],"member":"320","published-online":{"date-parts":[[2015,8,17]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770560.1770566"},{"key":"e_1_2_1_3_1","unstructured":"J. Ball. 2014. Angry birds and 'leaky' phone apps targeted by NSA and GCHQ for user data. The Guardian. (2014). http:\/\/www.theguardian.com\/world\/2014\/jan\/27\/nsa-gchq-smartphone-app-angry-birds-personal-data. J. Ball. 2014. Angry birds and 'leaky' phone apps targeted by NSA and GCHQ for user data. The Guardian. (2014). http:\/\/www.theguardian.com\/world\/2014\/jan\/27\/nsa-gchq-smartphone-app-angry-birds-personal-data."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660345"},{"key":"e_1_2_1_6_1","unstructured":"Martin Brinkmann. 2014. Change your location in Firefox using Location Guard. http:\/\/www.ghacks.net\/2014\/12\/01\/change-the-default-geolocation-in-firefox-using-location-guard\/ Ghacks.net (2014). Martin Brinkmann. 2014. Change your location in Firefox using Location Guard. http:\/\/www.ghacks.net\/2014\/12\/01\/change-the-default-geolocation-in-firefox-using-location-guard\/ Ghacks.net (2014)."},{"key":"e_1_2_1_7_1","unstructured":"J. Brownlee. 2012. This creepy app isn't just stalking women without their knowledge it's a wake-up call about facebook privacy {update}. http:\/\/www.cultofmac.com\/157641\/this-creepy-app-isnt-just- stalking-women-without-their-knowledge-its-a-wake-up-call- about-facebook-privacy\/ Cult of Mac (2012). J. Brownlee. 2012. This creepy app isn't just stalking women without their knowledge it's a wake-up call about facebook privacy {update}. http:\/\/www.cultofmac.com\/157641\/this-creepy-app-isnt-just- stalking-women-without-their-knowledge-its-a-wake-up-call- about-facebook-privacy\/ Cult of Mac (2012)."},{"volume-title":"Proc. of PETS (LNCS)","author":"Chatzikokolakis Konstantinos","key":"e_1_2_1_8_1","unstructured":"Konstantinos Chatzikokolakis , Miguel E. Andr\u00e9s , Nicol\u00e1s E. Bordenabe , and Catuscia Palamidessi . 2013. Broadening the scope of Differential Privacy using metrics . In Proc. of PETS (LNCS) , Vol. 7981 . Springer , 82--102. Konstantinos Chatzikokolakis, Miguel E. Andr\u00e9s, Nicol\u00e1s E. Bordenabe, and Catuscia Palamidessi. 2013. Broadening the scope of Differential Privacy using metrics. In Proc. of PETS (LNCS), Vol. 7981. Springer, 82--102."},{"volume-title":"Proc. of PETS (LNCS)","author":"Chatzikokolakis Konstantinos","key":"e_1_2_1_9_1","unstructured":"Konstantinos Chatzikokolakis , Catuscia Palamidessi , and Marco Stronati . 2014. A Predictive Differentially-Private Mechanism for Mobility Traces . In Proc. of PETS (LNCS) , Vol. 8555 . Springer , 21--41. Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Marco Stronati. 2014. A Predictive Differentially-Private Mechanism for Mobility Traces. In Proc. of PETS (LNCS), Vol. 8555. Springer, 21--41."},{"key":"e_1_2_1_10_1","volume-title":"Constructing elastic distinguishability metrics for location privacy. CoRR abs\/1503.00756","author":"Chatzikokolakis Konstantinos","year":"2015","unstructured":"Konstantinos Chatzikokolakis , Catuscia Palamidessi , and Marco Stronati . 2015. Constructing elastic distinguishability metrics for location privacy. CoRR abs\/1503.00756 ( 2015 ). Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Marco Stronati. 2015. Constructing elastic distinguishability metrics for location privacy. CoRR abs\/1503.00756 (2015)."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382263"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_23"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.208"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660270"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.96"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2019316.2019320"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517853"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2071880.2071884"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.33"},{"volume-title":"Proc. of SSTD (LNCS)","author":"Khoshgozaran Ali","key":"e_1_2_1_28_1","unstructured":"Ali Khoshgozaran and Cyrus Shahabi . 2007. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy . In Proc. of SSTD (LNCS) , Vol. 4605 . Springer , 239--257. Ali Khoshgozaran and Cyrus Shahabi. 2007. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In Proc. of SSTD (LNCS), Vol. 4605. Springer, 239--257."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.269"},{"key":"e_1_2_1_30_1","unstructured":"Korben. 2015. G\u00e9olocalisation -- Restez ma\u00eetre de votre situation. http:\/\/korben.info\/geolocalisation-restez-maitre-de-votre-situation.html. (2015). Korben. 2015. G\u00e9olocalisation -- Restez ma\u00eetre de votre situation. http:\/\/korben.info\/geolocalisation-restez-maitre-de-votre-situation.html. (2015)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/10618600.1993.10474606","article-title":"Normal\/Independent Distributions and Their Applications in Robust Regression","volume":"2","author":"Lange K.","year":"1993","unstructured":"K. Lange and J. S. Sinsheimer . 1993 . Normal\/Independent Distributions and Their Applications in Robust Regression . J. of Comp. and Graphical Statistics 2 , 2 (1993), 175 -- 198 . K. Lange and J. S. Sinsheimer. 1993. Normal\/Independent Distributions and Their Applications in Robust Regression. J. of Comp. and Graphical Statistics 2, 2 (1993), 175--198.","journal-title":"J. of Comp. and Graphical Statistics"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.71"},{"key":"e_1_2_1_34_1","volume-title":"Aref","author":"Mokbel Mohamed F.","year":"2006","unstructured":"Mohamed F. Mokbel , Chi-Yin Chow , and Walid G . Aref . 2006 . The New Casper: Query Processing for Location Services without Compromising Privacy. In Proc. of VLDB. ACM , 763--774. Mohamed F. Mokbel, Chi-Yin Chow, and Walid G. Aref. 2006. The New Casper: Query Processing for Location Services without Compromising Privacy. In Proc. of VLDB. ACM, 763--774."},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Giri Narasimhan and Michiel Smid. 2007. Geometric spanner networks. CUP. Giri Narasimhan and Michiel Smid. 2007. Geometric spanner networks. CUP.","DOI":"10.1017\/CBO9780511546884"},{"volume-title":"Proc. of PETS (LNCS)","author":"Olteanu Alexandra-Mihaela","key":"e_1_2_1_36_1","unstructured":"Alexandra-Mihaela Olteanu , K\u00e9vin Huguenin , Reza Shokri , and Jean-Pierre Hubaux . 2014. Quantifying the Effect of Co-location Information on Location Privacy . In Proc. of PETS (LNCS) . Springer , 184--203. Alexandra-Mihaela Olteanu, K\u00e9vin Huguenin, Reza Shokri, and Jean-Pierre Hubaux. 2014. Quantifying the Effect of Co-location Information on Location Privacy. In Proc. of PETS (LNCS). Springer, 184--203."},{"key":"e_1_2_1_37_1","volume-title":"Proc. of MoST","author":"Primault Vincent","year":"2014","unstructured":"Vincent Primault , Sonia Ben Mokhtar , C\u00e9dric Lauradoux , and Lionel Brunie . 2014 . Differentially Private Location Privacy in Practice . In Proc. of MoST 2014. IEEE. Vincent Primault, Sonia Ben Mokhtar, C\u00e9dric Lauradoux, and Lionel Brunie. 2014. Differentially Private Location Privacy in Practice. In Proc. of MoST 2014. IEEE."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806794"},{"key":"e_1_2_1_39_1","unstructured":"J. R. Sack and J. Urrutia. 1999. Handbook of Computational Geometry. Elsevier. J. R. Sack and J. Urrutia. 1999. Handbook of Computational Geometry. Elsevier."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620550"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665946"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01721-6_5"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"},{"key":"e_1_2_1_47_1","first-page":"32","article-title":"GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory","volume":"33","author":"Zheng Yu","year":"2010","unstructured":"Yu Zheng , Xing Xie , and Wei-Ying Ma . 2010 . GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory . IEEE Data Eng. Bull. 33 , 2 (2010), 32 -- 39 . Yu Zheng, Xing Xie, and Wei-Ying Ma. 2010. GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory. IEEE Data Eng. Bull. 33, 2 (2010), 32--39.","journal-title":"IEEE Data Eng. Bull."}],"container-title":["ACM SIGLOG News"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815493.2815499","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815493.2815499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:14Z","timestamp":1750225394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815493.2815499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,17]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,8,17]]}},"alternative-id":["10.1145\/2815493.2815499"],"URL":"https:\/\/doi.org\/10.1145\/2815493.2815499","relation":{},"ISSN":["2372-3491"],"issn-type":[{"type":"electronic","value":"2372-3491"}],"subject":[],"published":{"date-parts":[[2015,8,17]]},"assertion":[{"value":"2015-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}