TY - GEN
T1 - Opaque
T2 - 25th IEEE International Conference on Data Engineering, ICDE 2009
AU - Lee, Ken C.K.
AU - Lee, Wang Chien
AU - Leong, Hong Va
AU - Zheng, Baihua
PY - 2009
Y1 - 2009
N2 - Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus raising privacy concerns. For instance, a path query that finds a path from a resident address to a clinic may lead to a deduction about "who is related to what disease ". To protect user privacy from accessing directions search services, we introduce the OPAQUE system, which consists of two major components: (1) an obfuscator that formulates obfuscated path queries by mixing true and fake sources/destinations; and (2) an obfuscated path query processor installed in the server for obfuscated path query processing. OPAQUE reduces the likelihood of path queries being revealed and allows retrieval of requested paths. We propose two types of obfuscated path queries, namely, independently obfuscated path query and shared obfuscated path query to strike a balance between privacy protection strength and query processing overhead, and to enhance privacy protection against collusion attacks.
AB - Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus raising privacy concerns. For instance, a path query that finds a path from a resident address to a clinic may lead to a deduction about "who is related to what disease ". To protect user privacy from accessing directions search services, we introduce the OPAQUE system, which consists of two major components: (1) an obfuscator that formulates obfuscated path queries by mixing true and fake sources/destinations; and (2) an obfuscated path query processor installed in the server for obfuscated path query processing. OPAQUE reduces the likelihood of path queries being revealed and allows retrieval of requested paths. We propose two types of obfuscated path queries, namely, independently obfuscated path query and shared obfuscated path query to strike a balance between privacy protection strength and query processing overhead, and to enhance privacy protection against collusion attacks.
UR - http://www.scopus.com/inward/record.url?scp=67649723391&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=67649723391&partnerID=8YFLogxK
U2 - 10.1109/ICDE.2009.218
DO - 10.1109/ICDE.2009.218
M3 - Conference contribution
AN - SCOPUS:67649723391
SN - 9780769535456
T3 - Proceedings - International Conference on Data Engineering
SP - 1271
EP - 1274
BT - Proceedings - 25th IEEE International Conference on Data Engineering, ICDE 2009
Y2 - 29 March 2009 through 2 April 2009
ER -