Document Type

Conference Proceeding



Format of Original

9 p.

Publication Date



Institute of Electrical and Electronics Engineers (IEEE)

Source Publication

Proceedings of the 34th Annual International Computer Software and Applications Conference

Source ISSN


Original Item ID

DOI: 10.1109/COMPSAC.2010.14


The challenge of preserving user’s location privacy is more important now than ever before with the proliferation of handheld devices and the pervasive use of location based services. To protect location privacy, we must ensure k-anonymity so that the user remains indistinguishable among k-1 other users. There is no better way but to use a location anonymizer (LA) to achieve k-anonymity. However, its knowledge of each user’s current location makes it susceptible to be a single-point-of-failure. In this paper, we propose a formal location privacy framework, termed SafeGrid that can work with or without an LA. In SafeGrid, LA is designed in such a way that it is no longer a single point of failure. In addition, it is resistant to known attacks and most significantly, the cloaking algorithm it employs meets reciprocity condition. Simulation results exhibit its better performance in query processing and cloaking region calculation compared with existing solutions. As an added feature, in SafeGrid a user has the option of not using LA, yet achieving as much obfuscation (deliberate degradation of location data) as needed without ever sacrificing performance gain.


Accepted version. Published as part of the proceedings of the conference, 34th Annual International Computer Software and Applications Conference, 2010: 82-91. DOI.

© 2010 IEEE. Reprinted, with permission, from Abir K Bekhet and Jaclene A Zauszniewski, Methodological Triangulation: an Approach to Understanding Data, 34th Annual International Computer Software and Applications Conference, and July 2010.

This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Marquette University’s products or services. Internal or personal use of this material is permitted.

However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to By choosing to view this document, you agree to all provisions of the copyright laws protecting it.