Databases Reference
In-Depth Information
sectors identified by the two radii connecting the centers of the areas with the
intersection points of original and obfuscated areas. 1
σ
2 r 2
sin σ + γ
sin γ = δπr · R
r 2
2
R 2
2
2 R 2
(5)
d = r cos 2 + R cos 2
r sin 2
= R sin 2
Solutions of this system can be obtained numerically.
Reducing the Radius
The third obfuscation technique consists in reducing the radius of a location
measurement from r to r , as showed in Fig. 1(c). The obfuscation effect is
produced by a correspondent reduction of the probability to find the real user
location within the returned area, whereas the joint pdf is fixed.
Let ( x u ,y u ) be the real user position coordinates, By assumption, the prob-
ability that the real user position falls in the location measurement of radius r
is P (( x u ,y u )
Area ( r, x, y )) = 1. When we obfuscate by reducing the radius,
an area of radius r
Area ( r ,x,y )) <
<r is returned, where P (( x u ,y u )
P (( x u ,y u )
Area ( r, x, y )), since a circular ring having pdf greater than zero
has been excluded.
With regard to relevances
R Tech and
R Priv , their relation can be defined
as:
P (( x u ,y u ) Area ( r ,x,y ))
P (( x u ,y u ) ∈ Area ( r, x, y )) ·R Tech =
r 2
r 2
with r <r
R Priv =
·R Tech ,
(6)
0, the radius of the obfuscated area r is
calculated from (1) and (6) as follows:
Given a privacy preference λ
r
λ +1
r =
This relation permits to generate the obfuscated area by reducing radius
r to radius r , which satisfies, according to our semantics, the user privacy
preference λ .
5 Integrating Obfuscation Techniques with LBAC
Systems
The definition of LBAC systems poses some architectural and functional is-
sues that w ere never studied before in the context of traditional access control
1 The system of equation (5) is presented in the most general form of two areas
with different radii (i.e., r and R ).
 
Search WWH ::




Custom Search